Title :
Issues and challenges of scheduling and protection algorithms for proficient parallel data processing in cloud
Author :
Vijayaraj, N. ; Rajalakshmi, D. ; Sanoj, C.S.
Author_Institution :
Shri Angalamman Coll. of Eng. & Technol., Trichirapalli, India
Abstract :
In topical years one of the Cloud Services, Infrastructure-as-a-Service (IaaS) provides a compute resources for demand in various applications like Parallel Data Processing. Major Cloud computing companies have started to integrate frameworks for, making it easy for customers to access these services and to deploy their programs. However, the processing frameworks which are currently used have been designed for static, identical cluster setups and ignore the particular nature of a cloud. Consequently, the allocated compute resources may be insufficient for big parts of the submitted job and unnecessarily increase processing time and cost. However, the current algorithm does not consider the schedule and security during the job execution. In this paper we have focused on the issues and challenges of the scheduling & protection algorithm for proficient parallel data processing in real time cloud computing services. Our Algorithm contains all the concrete information required to schedule and execute the received job on the cloud. Each Execution is by default assigned to its own Execution Instance. The code is lightweight and portable; it makes a great random number generator for both Encryption and Decryption is designed to run data processing on a large number of jobs, and provide a high efficacy in real time cloud services.
Keywords :
cloud computing; parallel processing; IaaS; cloud computing companies; cloud services; execution instance; identical cluster setups; infrastructure-as-a-service; proficient parallel data processing; protection algorithms; random number generator; real time cloud services; scheduling algorithms; Algorithm design and analysis; Ciphers; Cloud computing; Encryption; Marine animals; Real-time systems; Servers; Cloud Computing; Resource Allocation; Scheduling Strategy; Security Algorithms;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
DOI :
10.1109/ICICES.2013.6508302