Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim
{"title":"A Secure Agent Based Architecture for Resource Allocation in Cloud Computing","authors":"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim","doi":"10.1109/ICITCS.2016.7740307","DOIUrl":null,"url":null,"abstract":"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on IT Convergence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2016.7740307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.