Академический Документы
Профессиональный Документы
Культура Документы
I. INTRODUCTION
Cloud processing empowers the administration of and performance. Replication is basically utilized in
tremendous IT administrations that is being intensive data applications in which the data ought to
developed on the topmost of topographically be shared and required to be gained from distinctive
distributed domains and shared it entirely [1-10]. sites, placed over various topographical domains.
Thus, for better execution and for better reliability, Replication builds accessibility of the data [37]. If a
the assets (resources) ought to be replicated over portion of the sites capturing the information about
redundant positions as well as it utilizes the the file failure at the time of the request, the request
redundant frameworks [11-16]. To deploy the data will be provided from any other sites handling the
traffics exponential increment and to optimize the replicas (copies) of the specific file [38]. Beyond this,
datacenter frameworks bandwidth and energy a few the replication technique also enhances the entire
data replication techniques is established. Handling system performance where the request from users is
the replicas over numerous sites obviously increases possible to be satisfied over closest sites maintaining
the execution thus by diminishing the current access the demanded data files replicas. This process
delay and by the elimination of unique failure point maximizes the system's response time as well as the
[17-26]. In order to maintain the replicas of data, few access time. Finally, the replication will also increase
frameworks, namely the networking devices and the reliability of the system. By chance the corruption
storage devices are being demanded. Beyond this, it of any of the data files replica, or else it fails because
is necessary to synchronize the currently generated of few criteria the request from users can be provided
new replicas and any of the progressions created over over the different site which is being non-corrupted
one of the locales (sites) required to be copied onto that maintains the specific replicas [39-46].
another position [27-35].
II. SYSTEM MODEL
Data center framework intakes more energy and thus
it turns out to be non-utilized. The utilized assets The illustrations in Figure.1 depicts the multi-level
(resources) get to be depleted without including the hierarchical, heterogeneous cloud framework
extra expense. Thus, by the availability of flexible comprises of various virtual machines, brokers, host,
services together with better performance and replica catalogs, users and replica managers. By
tremendous data availability turns to be a necessary nature the data centers are basically heterogeneous.
demand that ought to be met in different situations. In Various Service Providers controls the data centers.
order to face this demand, the term replication is The Service Providers mainly choose about the
utilized [36]. Data replication is the method of replication strategies, replication cost and various
maintaining data files multiple copies over multiple issues associated with the data centers configuration.
sites thus to enhance better availability, reliability, Every data center is comprised with different hosts.
The host is referred to as a physical machine which is Dynamic Cost-Aware Re-replication and Re-
being ought to administer various virtual machines. adjusting Strategy (DCR2S) towards a heterogeneous
In order to access the data file, the user transmits the cloud computing framework [49-56]. To begin with
demand (request) to the broker. The position of each these proposed algorithms initially it ought to be
data files replicas is maintained by replica catalog. designed with heterogeneous cloud framework to
Because of this the broker initially transmits the comprehend the replication cost, availability of the
request to the replica catalog in order to access the file, and framework availabilities relationship. The
list of data centers holding the data files that is being introduced algorithm includes three strides and these
requested [47]. strides can be utilized to replicate the data files. At
the initial stride, the more popular or efficient data
After the acceptance of the data centers list capturing file was selected depending upon the intensity of
the details about the data file that is being requested, access together with that the decision has been
the request is then scheduled to the neighbor data generated to decide the event when the replication
center by the broker. Hereby the replica manager is in function should be invoked [57-65]. At the second
charge for the generation of new replicas over stride, the new replicas ought to be established for the
various domains. The replica manager is additionally preferred data file thus to face the availability needs.
in charge of removing the unused as well as old
replicas. The block is referred to as the fundamental III. RESULTS AND DISCUSSIONS
unit of storage in a data center.
Here, we have plotted the graph for all the three
3.1 Dynamic Cost-Aware Re-replication and Re- techniques with the varying number of replicas in x-
adjusting Strategy axis and the corresponding parameters in y-axis. The
performance evaluation is carried out with five
On cloud frameworks, together with the accessibility, different parameters namely the SBER (System Byte
fault maintenance, performance, the replication Effective Rate), Load, Response time, Latency and
expense also turns to be a critical component. The Fault Ratio.
method [48] proposed an algorithm referred to as
Figure.2 and 3 delineates the percentage of load analysis was performed to identify the efficient
balance when the number of replicas is maximized technique from the three different techniques taken
for about 5 nodes. When number of replicas is for experimental analysis. Finally, EPA [3] when
increased in the node, the maintenance of load in compared with ADRS [1]and DCR2S [2] provides
node turns to be difficult. better performance after evaluating it with different
parameters.
IV. CONCLUSION
REFERENCE
In this comparative study, we have presented an
extensive analysis of three different data replication [1] Anand Nayyar, Vikram Puri,
strategies on a cloud environment. The performance Nhu Gia Nguyen, Dac Nhuong Le, Smart
study of these three data replication techniques was Surveillance Robot for the Real Time
carried out in terms five different parameters. Here, Monitoring and Control System in
the analysis has been made with the help of by Environment and Industrial Applications,
varying the number of nodes from 5 to 10 with Advances in Intelligent System and
respect to number of replicas. For all the different Computing, pp 229-243, Springer
analysis, graphs were plotted and the detailed
[2] Ezhilarasu, P., & Krishnaraj, N. (2015). Science, Engineering and Computer
Applications of Finite Automata in Lexical Technology, 5(5), 116.
Analysis and as a Ticket Vending Machine–A [12] Huyen, D.T.T., Binh, N.T., Tuan, T.M.,
Review. Int. J. Comput. Sci. Eng. Nguyen, G.N, Dey, N., Son, L.H, Analyzing
Technol, 6(05), 267-270. trends in hospital-cost payments of patients
[3] Agrawal, U., Arora, J., Singh, R., Gupta, D., using ARIMA and GIS: Case study at the
Khanna, A., & Khamparia, A. (2020). Hybrid Hanoi Medical University Hospital, Vietnam,
Wolf-Bat Algorithm for Optimization of Journal of Medical Imaging and Health
Connection Weights in Multi-layer Informatics, 7(2), pp. 421-429.
Perceptron. ACM Transactions on Multimedia [13] Prasanna, S., & Maran, E. (2015). Stock
Computing, Communications, and Market Prediction Using Clustering with
Applications (TOMM), 16(1s), 1-20. Meta-Heuristic Approaches. Gazi University
[4] Prasanna, S., & Ezhilmaran, D. (2016). Journal of Science, 28(3).
Association rule mining using enhanced [14] Pustokhina, I. V., Pustokhin, D. A., Rodrigues,
apriori with modified GA for stock J. J., Gupta, D., Khanna, A., Shankar, K., ... &
prediction. International Journal of Data Joshi, G. P. (2020). Automatic Vehicle
Mining, Modelling and Management, 8(2), License Plate Recognition using Optimal K-
195-207. Means with Convolutional Neural Network for
[5] Pustokhina, I. V., Pustokhin, D. A., Gupta, D., Intelligent Transportation Systems. IEEE
Khanna, A., Shankar, K., & Nguyen, G. N. Access.
(2020). An effective training scheme for deep [15] Namasudra, S. (2018). Cloud computing: A
neural network in edge computing enabled new era. Journal of Fundamental and Applied
Internet of medical things (IoMT) Sciences, 10(2).
systems. IEEE Access, 8, 107112-107123. [16] Uthayakumar, J., Elhoseny, M., & Shankar, K.
[6] Shankar, K., Zhang, Y., Liu, Y., Wu, L., & (2020). Highly Reliable and Low-Complexity
Chen, C. H. (2020). Hyperparameter tuning Image Compression Scheme Using
deep learning for diabetic retinopathy fundus Neighborhood Correlation Sequence
image classification. IEEE Access, 8, 118164- Algorithm in WSN. IEEE Transactions on
118173. Reliability.
[7] Joshi, G. P., Perumal, E., Shankar, K., Tariq, [17] Deepalakshmi, P., & Shankar, K. (2020). Role
U., Ahmad, T., & Ibrahim, A. (2020). Toward and Impacts of Ant Colony Optimization in
Blockchain-Enabled Privacy-Preserving Data Job Shop Scheduling Problems: A Detailed
Transmission in Cluster-Based Vehicular Analysis. Evolutionary Computation in
Networks. Electronics, 9(9), 1358. Scheduling, 11-35.
[8] Saračević, M. H., Adamović, S. Z., Miškovic, [18] Ashwin, M., Kamalraj, S., & Azath, M.
V. A., Elhoseny, M., Maček, N. D., Selim, M. (2019). Multi objective trust optimization for
M., & Shankar, K. (2020). Data Encryption for efficient communication in wireless M
Internet of Things Applications Based on learning applications. Cluster
Catalan Objects and Two Combinatorial Computing, 22(5), 10687-10695.
Structures. IEEE Transactions on Reliability. [19] Ezhilarasu, P., & Krishnaraj, N. (2015).
[9] Namasudra, S., & Roy, P. (2017). Time saving Double Substring based Classification for
protocol for data accessing in cloud Nondeterministic Finite Automata. Indian
computing. IET Communications, 11(10), Journal Of Science And Technology, 8, 26.
1558-1565. [20] Amira S. Ashour, Samsad Beagum, Nilanjan
[10] Elsir, A., Elsier, O., Abdurrahman, A., & Dey, Ahmed S. Ashour, Dimitra Sifaki
Mubarakali, A. (2019). Privacy Preservation in Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le,
Big Data with Data Scalability and Efficiency Fuqian Shi (2018), Light Microscopy Image
Using Efficient and Secure Data Balanced De-noising using Optimized LPA-ICI Filter,
Scheduling Algorithm. Neural Computing and Applications,
[11] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V. Vol.29(12), pp 1517–1533, Springer, ISSN:
(2015). Applications of finite automata in text 0941-0643.
search-a review. International Journal of [21] Prasanna, S., Govinda, K., & Kumaran, U. S.
(2012). An Evaluation study of Oral Cancer
Detection using Data Mining Classification [30] Namasudra, S., Roy, P., Vijayakumar, P.,
Techniques. International Journal of Advanced Audithan, S., & Balusamy, B. (2017). Time
Research in Computer Science, 3(1). efficient secure DNA based access control
[22] Sankhwar, S., Gupta, D., Ramya, K. C., Rani, model for cloud computing
S. S., Shankar, K., & Lakshmanaprabu, S. K. environment. Future Generation Computer
(2020). Improved grey wolf optimization- Systems, 73, 90-105.
based feature subset selection with fuzzy [31] Lakshmanaprabu, S. K., Shankar, K., Rani, S.
neural classifier for financial crisis S., Abdulhay, E., Arunkumar, N., Ramirez, G.,
prediction. Soft Computing, 24(1), 101-110. & Uthayakumar, J. (2019). An effect of big
[23] Namasudra, S., & Deka, G. C. (2018). data technology with ant colony optimization
Introduction of DNA computing in based routing in vehicular ad hoc networks:
cryptography. In Advances of DNA computing Towards smart cities. Journal of cleaner
in cryptography (pp. 1-18). Chapman and production, 217, 584-593.
Hall/CRC. [32] Namasudra, S., & Deka, G. C. (Eds.).
[24] Mubarakali, A., Srinivasan, K., Mukhalid, R., (2018). Advances of DNA computing in
Jaganathan, S. C., & Marina, N. (2020). cryptography. CRC Press.
Security challenges in internet of things: [33] Mubarakali, A., Ashwin, M., Mavaluru, D., &
Distributed denial of service attack detection Kumar, A. D. (2020). Design an attribute
using support vector machine‐based expert based health record protection algorithm for
systems. Computational Intelligence. healthcare services in cloud
[25] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu environment. Multimedia Tools and
Nguyen, Vikrant Bhateja, Suresh Chandra Applications, 79(5), 3943-3956.
Satapathy (2017), Optimizing Feature [34] Dey, N., Ashour, A.S., Chakraborty, S., Le,
Selection in Video-based Recognition using D.-N., Nguyen, G.N, Healthy and unhealthy
Max-Min Ant System for the Online Video rat hippocampus cells classification: A neural
Contextual Advertisement User-Oriented based automated system for Alzheimer disease
System, Journal of Computational Science, classification, Journal of Advanced
Elsevier ISSN: 1877-7503. Vol.21, pp.361- Microscopy Research, 11(1), pp. 1-10
370. [35] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
[26] Ezhilarasu, P., Thirunavukkarasu, E., Hybrid Soft Computing Approach for
Karuppusami, G., & Krishnaraj, N. (2015). Prediction of Cancer in Colon Using
Single substring based classification for Microarray Gene Data. Current Signal
nondeterministic finite automata. International Transduction Therapy, 11(2).
Journal on Applications in Information and [36] Namasudra, S., Deka, G. C., Johri, P.,
Communication Engineering, 1(10), 29-31. Hosseinpour, M., & Gandomi, A. H. (2020).
[27] Bhateja, V., Gautam, A., Tiwari, A., Nhu, The revolution of blockchain: State-of-the-art
N.G., Le, D.-N, Haralick features-based and research challenges. Archives of
classification of mammograms using SVM, Computational Methods in Engineering.
Advances in Intelligent Systems and [37] Goel, N., Grover, B., Gupta, D., Khanna, A.,
Computing, Volume 672, 2018, Pages 787- & Sharma, M. (2020). Modified Grasshopper
795. Optimization Algorithm for detection of
[28] Latha, A., Prasanna, S., Hemalatha, S., & Autism Spectrum Disorder. Physical
Sivakumar, B. (2019). A harmonized trust Communication, 101115.
assisted energy efficient data aggregation [38] Prasanna, S., Narayan, S., NallaKaruppan, M.
scheme for distributed sensor K., Anilkumar, C., & Ramasubbareddy, S.
networks. Cognitive Systems Research, 56, (2019). Iterative Approach for Frequent Set
14-22. Mining Using Hadoop Over Cloud
[29] Krishnaraj, N., Elhoseny, M., Lydia, E. L., Environment. In Smart Intelligent Computing
Shankar, K., & ALDabbas, O. (2020). An and Applications (pp. 399-405). Springer,
efficient radix trie‐based semantic visual Singapore.
indexing model for large‐scale image retrieval [39] Le, D.-N.a, Kumar, R.b, Nguyen, G.N.,
in cloud environment. Software: Practice and Chatterjee, J.M.d, Cloud Computing and
Experience.