Reference Hub2
Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity

Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity

S. Kirthica, Rajeswari Sridhar
Copyright: © 2018 |Volume: 14 |Issue: 2 |Pages: 16
ISSN: 1548-3657|EISSN: 1548-3665|EISBN13: 9781522542797|DOI: 10.4018/IJIIT.2018040103
Cite Article Cite Article

MLA

Kirthica, S., and Rajeswari Sridhar. "Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity." IJIIT vol.14, no.2 2018: pp.43-58. http://doi.org/10.4018/IJIIT.2018040103

APA

Kirthica, S. & Sridhar, R. (2018). Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity. International Journal of Intelligent Information Technologies (IJIIT), 14(2), 43-58. http://doi.org/10.4018/IJIIT.2018040103

Chicago

Kirthica, S., and Rajeswari Sridhar. "Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity," International Journal of Intelligent Information Technologies (IJIIT) 14, no.2: 43-58. http://doi.org/10.4018/IJIIT.2018040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

One of the principle features on which cloud environments operate is the scaling up and down of resources based on users' needs, called elasticity. This feature is limited to the cloud's physical resources. This article proposes to enhance the elasticity of a cloud in an intelligent manner by communicating with an optimal external cloud (EC) and borrowing additional resources from it when the cloud runs out of resources. This inter-cloud communication is secured by a model whose structure is similar to the Kerberos protocol. To choose the optimal EC for a particular request of a user, a list of parameters, collectively termed as RePVoCRaD, are enumerated. Once chosen, trust is established with the chosen EC and inter-cloud communication begins. While existing works deal with third parties to establish or secure inter-cloud communication, this work is novel in that there is absence of third parties in the entire process, thereby reducing security threats and additional costs involved. Evaluating this work based on turnaround time and transaction success rate, in a real-time cloud environment, it is seen that the cloud's elasticity is so enhanced that it successfully accommodates its users' additional demands by the fastest means possible.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.