Accepted Papers


  • An Energy-aware Workload Consolidation Scheduler on Cloud Distribution
    S.Jerina Begum, Dr.Saswati Mukherjee, Anna University Chennai, India
    ABSTRACT
    Cloud computing is offering utility-oriented IT services to users worldwide. The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of energy, contributing to high operational costs and carbon footprints to the environment. The two algorithms called the Energy-aware scheduling algorithm using Workload-aware Consolidation Technique (ESWCT) and the Energy aware Live Migration algorithm using Workload-aware Consolidation Technique (ELMWCT) is implemented. As opposed to traditional energy-aware scheduling algorithms, which often focus on only one-dimensional resource, the two algorithms are based on the fact that multiple resources (such as CPU, memory and network bandwidth) are shared by users concurrently in cloud data centers and heterogeneous workloads have different resource consumption characteristics. Both algorithms investigate the problem of consolidating heterogeneous workloads. Moreover, it executes all Virtual Machines (VMs) with the minimum amount of Physical Machines (PMs), and then power off unused physical servers to reduce power consumption.
  • Conserving the Battery Power of Smartphones through Computation Offloading
    N.Vaishnavo Devi, Dr.Saswati Mukherjee, Anna University Chennai, India
    ABSTRACT
    Smartphones are now capable of supporting a wide range of applications which demands an ever increasing computational power. It poses a challenge because smartphones are resource-constrained devices with limited computation battery power, memory, storage, and energy. Various studies have identified longer battery lifetime as the most desired feature of mobile systems. Longer battery life to be more important than all other features including storage, memory etc. Fortunately, the cloud computing technology offers virtually unlimited dynamic resources for computation, storage, and service provision. These restrictions may be alleviated by computation offloading by sending heavy computation to resourceful servers and receiving the results from these servers. Rather than running applications locally and directly requesting data from content providers, a mobile device can offload parts of their workload to the cloud, taking advantage of the abundant cloud resources to help gather, store, and process data for the mobile device. To overcome resource constraints on mobile devices, a general idea is to offload parts of resource-intensive tasks to the cloud. Since execution in the cloud is considerably faster than that on mobile devices, it is worth shipping code and data to the cloud and back to prolong the battery life and speed up the application.
  • Secure Data Sharing In Cloud Storage Using Key Aggregate Cryptosystem With Certificateless Encryption
    R. Anitha, S.Muthurajkumar, V.Pandiyaraju, Sai Ramesh, Rakesh, Anna University, Chennai, India.
    ABSTRACT
    The amount of data rapidly increases every year. Hence, there is a need for a new generation of techniques and tools to assist humans in storing and to share these voluminous amounts of data with others securely. Data sharing is an important functionality in cloud storage besides the convenience of not having to buy software programs and install them on your own servers, using cloud applications instead can be cheaper. A new public-key cryptosystems that produce constant-size ciphertexts that provides efficient delegation to decrypt any set of ciphertexts provided with a secure key for authorized users. The originality is that one can aggregate any set of secret keys and make them as compact as a single key, which includes the power of all the keys being aggregated. The secret key holder can use a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other files that are encrypted outside the ciphertext set remain confidential. This aggregate key can be conveniently sent to others or be stored in a smart card which has a very limited storage as the key size is constant.
  • Real Time Adaptive Transrating Service for Mobile Video Streaming
    Dhivya P, Dr.M.Vijayalakshmi, Anna University Chennai, India
    ABSTRACT
    Internet traffic generated from mobile devices has experienced a huge growth in the last few years. With the increasing popularity of streaming applications in mobile devices, video traffic generated from mobile devices is also increasing. One of the big challenge of streaming applications on mobile devices is the energy intensive behaviour of such applications. Wireless networks will always be bandwidth limited compared to fixed networks due to background noise, limited frequency spectrum, and varying degrees of network coverage and signal strength. In order to meet the bandwidth fluctuations, the rate adaption techniques are deployed at the application client which is already a resource poor device. Thus the energy intensive operations of transcoding adds overload and consumes more energy at the mobile devices. Hence, real-time transrating mechanism is used in this project, which contains HTTP live streaming protocol, a bandwidth recorder and segmenter and a coding mode transition state machine. In this mechanism, the variance in current network is observed according to the bandwidth evaluation results and based on the results, the appropriate media segment bit rate is calculated, which is transcoded into the segment to meet the current bandwidth conditions and it renders the users with appropriate media quality automatically through the HTTP redirection technique. Finally, bandwidth utilization rate is analyzed as the reference index of improvement in media quality.
  • Counteracting An Active Attack Within Manet By Exploiting Luby Transform Codes
    M. Lakshmi Priya, S.Madhu Priya, J.Mercy Faustina, Panimalar Institute of Technology, chennai, India
    ABSTRACT
    In this paper, we consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node is able to successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. We consider the problem of identifying malicious nodes that launch a pollution attack using SIEVE a decentralized, accurate and robust technique that exploits rateless codes which detect chunk integrity. Source nodes transmit data using Luby Transform codes (a class of rateless codes) and any legitimate node in a WMN executes a randomized and fully distributed detection mechanism to detect its malicious neighbors and it is isolated subsequently. Furthermore, an interesting trade-off between coding efficiency and SIEVE accuracy, completeness, and reactivity is discovered. We also show that SIEVE is efficient requiring low computational, memory, and communication resources.

 

 

AIRCC Library



Courtesy

Technically Sponsored by