An Efficient Resource Allocation in Multiple Virtual Machines using Load Balancing Algorithm
International Journal of Communication and Media Science |
© 2015 by SSRG - IJCMS Journal |
Volume 2 Issue 3 |
Year of Publication : 2015 |
Authors : Sharmila.P and Muthuraj.S |
How to Cite?
Sharmila.P and Muthuraj.S, "An Efficient Resource Allocation in Multiple Virtual Machines using Load Balancing Algorithm," SSRG International Journal of Communication and Media Science, vol. 2, no. 3, pp. 1-7, 2015. Crossref, https://doi.org/10.14445/2349641X/IJCMS-V2I3P101
Abstract:
The cloud computing is based on the resource sharing to approach the communication over the network. It is a new trend emerging technology with high range of infrastructure requirements and resources. In cloud computing, many services are available for many users, therefore the load balancing is an important feature in environment of cloud computing. In this paper, we propose to clarify the resource allocation with firewall framework identify how far along users are in terms of cloud deployment, its applications, its benefits and challenges associated with cloud computing using load balancing algorithm in virtual machine with decentralized cloud firewall in cloud computing. An efficient load balancing scheme to guarantees the efficient resource utilization by resources provisioning to avoid the attacks using cloud decentralized firewall. Load balancing in virtual machine is a computer network king computer, computers, network associations, disk drives or central processing units. It aims to optimize the uses of resources, increases the throughput, reduce the response time and avoid the resource overloading. It increases the reliability through redundancy using multiple components with load balancing instead of a single component. Load balancing is usually furnished by dedicated software or hardware, such as a switch of multilayer or a Domain Name System server process.
Keywords:
Cloud computing, Load balancing algorithm, Firewall Framework, multiple virtual appliances, optimizing and resource allocation
References:
[1] Bhaskar. R, Deepu. S.R, “Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment”, Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012.
[2] Cao.J, Hwang.K, Li.K, and Zomaya.A, “Optimal multiserverconfiguration for profit maximization in cloud computing,” Paralleland Distributed Systems, IEEE Transactions on, no. in press,
[3] Dharmesh Kashyap, Jaydeep Viradiya, “A Survey Of Various Load Balancing Algorithms In Cloud Computing”, International Journal Of Scientific & Technology Research Volume 3, Issue 11, November 2014.
[4] Hamid Shoja And Hossein Nahid, “A Comparative Survey On Load Balancing Algorithms In Cloud Computing”, 5th ICCCNT 2014 July 11- 13, 2014, Hefei, China.
[5] Jagannathan.K, Markakis.M, Modiano.E, and Tsitsiklis.J.N,“Queue-length asymptotic for generalized max-weight schedulingin the presence of heavy-tailed traffic,” IEEE/ACM Transactionson Networking (TON), vol. 20, no. 4, pp. 1096–1111, 2012.
[6] Khakpour. A.R and Liu A. X, “First step toward cloud-based firewalling,” in Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on. IEEE, 2012, pp. 41–50.
[7] Khazaeiet.H al., “Performance of cloud centers with high degreeof virtualization under batch task arrivals,” Parallel and DistributedSystems, IEEE Transactions on, no. in press, 2013.
[8] Liu A.X, “Firewall policy change-impact analysis,” ACM Transactions on Internet Technology (TOIT), vol. 11, no. 4, p. 15, 2012.
[9] Mayanka Katyal and Atul Mishra, “A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment”, Article can be accessed online at http://www.publishingindia.com.
[10] Meng Liu, Shui Yu, Zhensheng Zhang,” A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization”, IEEE Transactions on Parallel and Distributed Systems,DOI 10.1109/TPDS.2014.2314672.
[11] Raza Abbas Haidri C. P. Katti, P. C. Saxena, “A Load Balancing Strategy for Cloud Computing”, Environment”, 978-1-4799-3140-8/14/$31.00 ©2014 IEEE.
[12] Rovniagin.D and Wool.A, “The geometric efficient matching algorithm for firewalls,” Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1, pp. 147–159, 2011.
[13] Salah.K, Elbadawi.K, and Boutaba.R, “Performance modeling and analysis of network firewalls,” Network and Service Management, IEEE Transactions on, vol. 9, no. 1, pp. 12–21, 2012.
[14] Subhadra Bose Shaw and Dr. A.K. Singh, “A Survey on Scheduling and Load Balancing Techniques in Cloud Computing Environment’, 2014 5th International Conference on Computer and Communication Technology (ICCCT).
[15] Wang.H, Wang .F, Liu.J, and Groen.J, “Measurement andutilization of customer-provided resources for cloud computing,”in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 442–450.
[16] Xiao.Z and Xiao.Y, “Security and privacy in cloud computing, ” IEEE Communications Surveys and Tutorials, no. in press, 2013.