Simultaneous optimization of replica in multi-cloud simulation
Keywords:
Cloud computing Replica, Data Segmentation, unicast, any cast, multicast, cloudsimAbstract
In this research paper, we analyze the replication and data partitions, if at any time a master replica has been set to handle all requests, we`ve talked about servers with high availability and primarily backup plans in their database. On the other hand, if a replication process a request and then redistributes it, it is a multi-primary plan. Transactional replication typically integrates server-to-server scenarios used in the report data from multiple sites would need to integrate high throughput, including improved scalability and availability, Data warehousing and heterogeneous data. Cloud computing is a set of security-control-based technologies and policies that comply with regulatory compliance rules and protect information related to cloud computing, data applications, and infrastructure. To transfer the current server cloud provider to another provider, the security should work according to the following numbers.
References
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013
Nancy J. King, V.T. Raja, “Protecting the privacy and security of sensitive customer data in the cloud”, computer law & security review28(2012)308e319
Abhishek Mohta ,Ravi Kant Sahu,Lalit Kumar Awasthi, “Robust Data Security for Cloud while using Third Party Auditor“,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 2, February 2012
Ronnie D. Caytiles and Sunguk Lee, “Security Considerations for Public Mobile Cloud Computing ”, international Journal of Advanced Science and Technology Vol. 44, July, 2012
Kangchan Lee, “Security Threats in Cloud Computing Environments”, International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012
Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani, “Towards secure mobile cloud computing: A survey”, Contents lists available at SciVerseScienceDirect Future Generation Computer Systems
Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou, “Towards Secure and Dependable Storage Services in Cloud Computing”, IEEE Transactions on Cloud Computing Date of Publication: April-June 2012 Volume: 5 , Issue: 2
M. K. F. H. Judith Hurwitz, Robin Bloor, “Cloud computing for dummies,” http://www.dummies.com/how-to/content/ cloud-computing-standards-organizations.html.
J. Han, W. Susilo, and Y. Mu, “Identity-based data storage in cloud computing,” Future Generation Computer Systems, vol. 29, no. 3, pp. 673–681, 2013.
L. M. Kaufman, “Data security in the world of cloud computing,” Security & Privacy, IEEE, vol. 7, no. 4, pp. 61–64, 2009.
C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” AcmSigact News, vol. 40, no. 2, pp. 81–86, 2009.
P. Kumar and H. S. Arri, “Data location in cloud computing,” International Journal for Science and Emerging Technologies with Latest Trends, vol. 5, no. 1, pp. 24–27, 2013.
“IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security,” http://www.eweek.com/c/a/Security/IBM-Uncovers-Encryption-Scheme-/ That-Could-Improve-Cloud-Security-Spam-Filtering-135413.
K. P. Puttaswamy, C. Kruegel, and B. Y. Zhao, “Silverline: toward data confidentiality in storageintensive cloud applications,” in Proceedings of the 2nd ACM Symposium on Cloud Computing, p. 10, 2011.
A. S. Team et al., “Amazon s3 availability event: July 20, 2008,” See: http://status. aws. amazon. com/s3-20080720. html, 2008.
K. Sharma and K. R. Singh, “Online data back-up and disaster recovery techniques in cloud computing: A review,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 5, pp. 249–254, 2012.
EmanM.Mohamed, Hatem S. Abdelkader, “Enhanced Data Security Model for Cloud Computing”, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May
K. R. C. Wang, Q. Wang and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. 17th International Workshop on Quality of Service (IWQoS ’09), pp. 1–9, 2009. N. I. of Standards and Technology (NIST). http://www.nist.gov/itl/cloud/.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.