Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2022 | Article Id: DST-V1I1P105 DOI: https://doi.org/10.59232/DST-V1I1P105
Enhanced Fault Tolerant Cloud Architecture to Cloud based Computing using Both Proactive and Reactive Mechanisms
S.Veerapandi, R.Surendiran, K.Alagarsamy
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 28 May 2022 | 29 Jun 2022 | 09 Jul 2022 | 16 Jul 2022 |
Citation
S.Veerapandi, R.Surendiran, K.Alagarsamy. “Enhanced Fault Tolerant Cloud Architecture to Cloud based Computing using Both Proactive and Reactive Mechanisms.” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 32-40, 2022.
Abstract
Keywords
Fault isolation, Cloud based computing, Reliability, Availability, Fuzzy logic, Fuzzy genetic algorithm, Effective data sharing.
References
[1] Rajkumar Buyya et al., “Cloud Computing and Emerging it Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Soma Prathiba, and S. Sowvarnica, “Survey of Failures and Fault Tolerance in Cloud,” 2017 2nd International Conference on Computing and Communications Technologies, pp. 169–172, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] R. Surendiran, "Development of Multi Criteria Recommender System," SSRG International Journal of Economics and Management Studies, vol. 4, no. 1, pp. 31-35, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] V.M.Sivagami, K.S.Easwarakumar, “Survey on Fault Tolerance Techniques in Cloud Computing Environment,” International Journal of Scientific Engineering and Applied Science, vol. 1, no. 9, 2015.
[Google Scholar] [Publisher Link]
[5] Ms. Disha H. Parekh, and Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,” International Journal of Advanced Computer Science and Applications, vol. 4, no. 1, 2013.
[6] Zhengxiong Hou et al., “ASAAS: Application Software as a Service for High Performance Cloud Computing,” 12th IEEE International Conference on High Performance Computing and Communications, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Wei-Tek Tsai, Xin Sun, and Janaka Balasooriya, “Service-Oriented Cloud Computing Architecture,” Seventh International Conference on Information Technology, pp. 684-689, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[8] V. Subburaj et al., “DDos Defense Mechanism By Applying Stamps Using Cryptography,” International Journal of Computer Applications, vol. 1, no. 6, pp. 48-52, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Harpreet Kaur, and Amritpal Kaur, “A Survey on Fault Tolerance Techniques in Cloud Computing,” International Journal of Science, Engineering and Technology, vol. 3, no. 2, 2015.
[10] Anju Bala, and Inderveer Chana, ”Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing,” International Journal of Computer Science Issues, vol. 9, no. 1, 2012.
[11] A. M. Saleh, and J. H. Patel, “Transient-Fault Analysis for Retry Techniques,” IEEE Transactions on Reliability, vol. 37, no. 3, pp. 323–330, 1988.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Elvin Sindrilaru, Alexandru Costan, and Valentin Cristea, ”Fault Tolerance and Recovery in Grid Workflow Management Systems,” 2010 International Conference on Complex, Intelligent and Software Intensive Systems, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[13] R. Surendiran, "Secure Software Framework for Process Improvement," SSRG International Journal of Computer Science and Engineering, vol. 3, no. 12, pp. 19-25, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Benjamin Lussier et al., “Fault Tolerance in Autonomous Systems: How and How Much?” LAAS-CNRS 7 Avenue Du Colonel Roche, F-31077 Toulouse Cedex 04, France, 2005.
[Google Scholar] [Publisher Link]
[15] Jean-Clande Laprie, “Dependable Computing and Fault Tolerance: Concepts and Terminology,” LAASCNRS 7 Avenue Du Colonel Roche, 31400 Toulouse, France, 1985.
[16] Patel et al., International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 12 , pp. 573-576, 2013.
[17] Wenbing Zhao, P.M. Melliar, and L.E. Mose, ”Fault Tolerance Middleware for Cloud Computing,” 2010 Ieee 3rd International Conference on Cloud Computing, 2010.
[18] Raman Kumar, and Dr. Parveen Kumar, ”Review of Some Check pointing Schemes for Distributed and Mobile Computing,”Int. J. Advanced Networking and Applications, vol. 6, no. 6, pp. 2542-2548, 2015.
[19] Anju Bala, and Inderveer Chana, “Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing,” International Journal of Computer Science Issues, 2012.
[Google Scholar] [Publisher Link]
[20] Pawan Thakur Roohiali, ”Cloud Computing Architecture,” Cloud Computing 1st Edition New Delhi India Tech India Publication Series, 2014.
[21] Mladen A. Vouk, “Cloud Computing – Issues, Researchand Implementations,” Journal of Computing and Information Technology, vol. 16, no. 4, pp. 235–246, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[22] R. Surendiran, and K. Duraisamy, “An Approach in Semantic Web Information Retrieval,” SSRG International Journal of Electronics and Communication Engineering, vol. 1, no. 1, pp. 17-21, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Abhishek Bhavsar, and Ameya More, “A Holistic Approach to Autonomic Self‐Healing Distributed Computing System,” International Journal of Computer Applications, vol. 76, no. 3, 2013.