scispace - formally typeset
Search or ask a question
Author

Sourav Banerjee

Bio: Sourav Banerjee is an academic researcher from Kalyani Government Engineering College. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 9, co-authored 40 publications receiving 298 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new cloudlet allocation policy with suitable load balancing technique that helps in distributing the cloudlets to the virtual machines (VMs) equally likely to their capacity which makes the system more active, alive, and balanced is highlighted.
Abstract: Cloud computing has emerged as a dominant and transformational paradigm in Information technology domain over the last few years. It begins to affect a multitude of industries such as government, finance, telecommunications, and education. The Quality of Service (QoS) of a cloud service provider is an important research field which encompasses different critical issues such as efficient load balancing, response time optimization, completion time improvement, makespan improvement, and reduction in wastage of bandwidth, accountability of the overall system. This paper highlights a new cloudlet allocation policy with suitable load balancing technique that helps in distributing the cloudlets to the virtual machines (VMs) equally likely to their capacity which makes the system more active, alive, and balanced. This reduces the completion time of the cloudlet(s) as well as reduces the makespan of the VM(s) and the host(s) of a data center. Eventually, this proposed work improves the QoS. The experimental results obtained using CloudSim 3.0.3 toolkit extending few base classes are compared and analyzed with several existing allocation policies.

87 citations

Journal ArticleDOI
TL;DR: A new power-aware VM selection policy has been proposed in this research that helps in VM selection for migration and has been further evaluated using trace-based simulation environment.
Abstract: With the rapid demand for service-oriented computing in association with the growth of cloud computing technologies, large-scale virtualized data centers have been established throughout the globe. These huge data centers consume power at a large scale that results in a high operational cost. The massive carbon footprint from the energy generators is another great issue to deal global warming. It is essential to lower the rate of carbon emission and energy consumption as much as possible. The live-migration-enabled dynamic virtual machine consolidation results in high energy saving. But it also incurs the violation of service level agreement (SLA). Excessive migration may lead to performance degradation and SLA violation. The process of VM selection for migration plays a vital role in the domain of energy-aware cloud computing. Using VM selection policies, VMs are selected for migration. A new power-aware VM selection policy has been proposed in this research that helps in VM selection for migration. The proposed power-aware VM selection policy has been further evaluated using trace-based simulation environment.

39 citations

Proceedings ArticleDOI
15 Mar 2012
TL;DR: This work presents the implementation of an efficient Quality of Service (QoS) based smart-scheduler along with Backfill strategy based light weight Virtual Machine Scheduler for dispatching jobs.
Abstract: Cloud computing aims on delivery of fault tolerant, scalable and reliable infrastructure to host Internet based application services. Our work presents the implementation of an efficient Quality of Service (QoS) based smart-scheduler along with Backfill strategy based light weight Virtual Machine Scheduler for dispatching jobs. The user centric smart-scheduler deals with selection of proper resources to execute high level jobs. The system centric Virtual Machine (VM) scheduler optimally dispatches the jobs to processors for better resource utilization. We also present our proposals on scheduling heuristics that can be incorporated at data center level for selecting ideal host for VM creation. Here Pollaczek-Khintchine (M/G/1) queuing model with non - preemptive priority and single server has been used to build an advanced job-scheduling system, assuming that Cloud-users' jobs come to the server following Poisson distribution while the process time to each job by the server has a general distribution. The implementation can be further extended at the host level, using load balancing in cloud environment.

27 citations

Book ChapterDOI
01 Jan 2014
TL;DR: A conductance algorithm for effective allocation of Cloudlet to the VMs in a Datacenter by taking into consideration of power and capacity of VMs, and length of Cloudlets is proposed.
Abstract: Cloud Computing offers various remotely accessible services to users either free or on payment A major issue with Cloud Service Providers (CSP) is to maintain Quality of Service (QoS) The QoS encompasses different parameters, like, smart job allocation strategy, efficient load balancing, response time optimization, reduction in wastage of bandwidth, accountability of the overall system, best Virtual Machine (VM) (which reduce the overall execution time of the requested Cloudlets) selection etc The Datacenter Broker (DCB) policy helps binding a Cloudlet with a VM An efficient DCB policy reduces the overall execution time of a Cloudlet Allocating cloudlets properly to the appropriate VMs in a Datacenter makes a system active, alive and balanced In present study, we proposed a conductance algorithm for effective allocation of Cloudlets to the VMs in a Datacenter by taking into consideration of power and capacity of VMs, and length of Cloudlets Experimental results obtained using CloudSim toolkit under heavy loads, establishes performance supremacy of our proposed algorithm over existing DCB algorithm

26 citations

Journal ArticleDOI
TL;DR: This paper proposes a vehicle theft detection framework using a decentralized and secure platform to increase the security level of the vehicle and presents 2-Step Authentication (2SA) and unauthorized access detection algorithms.
Abstract: Nowadays, vehicle theft has been increased drastically all over the world. The prevention of vehicle theft is essential to enhance vehicle security. A large number of vehicles have been stolen for the lack of essential foundation and administration of a secure platform. Several existing systems were developed to protect the vehicle from unauthorized access. But, they suffer from various limitations such as data security, the possibility of cybercriminals activities, leakage of personal information, and centralized System. We propose a vehicle theft detection framework using a decentralized and secure platform to increase the security level of the vehicle. Blockchain and smart contracts are used to provide the security of the stored data on the ledger and authenticate a genuine user automatically with greater accuracy. In this paper, we present 2-Step Authentication (2SA) and unauthorized access detection algorithms. The 2SA ensures the secure accessibility of the application by providing the randomly token chosen by the user. The proposed framework can provide vehicle security and owner’s privacy. In this proposed framework, more than one person can drive the vehicle authorizing by the vehicle owner without hampering stored data in the vehicle device.

24 citations


Cited by
More filters
Book ChapterDOI
04 Oct 2019
TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies arc not made or distributed for direct commercial advantage.
Abstract: Usually, a proof of a theorem contains more knowledge than the mere fact that the theorem is true. For instance, to prove that a graph is Hamiltonian it suffices to exhibit a Hamiltonian tour in it; however, this seems to contain more knowledge than the single bit Hamiltonian/non-Hamiltonian.In this paper a computational complexity theory of the “knowledge” contained in a proof is developed. Zero-knowledge proofs are defined as those proofs that convey no additional knowledge other than the correctness of the proposition in question. Examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity. These are the first examples of zero-knowledge proofs for languages not known to be efficiently recognizable.

1,962 citations

Journal ArticleDOI
TL;DR: The survey identifies and analyzes the advantages and risks that the use of cloud computing may have for the main stakeholders in education, and identifies and discusses the main technical and domain-specific research challenges, thus facilitating researchers the task of finding relevant issues, in which they can focus their efforts.
Abstract: This paper surveys the state of the art on the use and research of cloud computing in education following a systematic methodology. After a comprehensive search of the scientific literature, 112 works were selected for the review. The survey identifies and analyzes the advantages and risks that the use of cloud computing may have for the main stakeholders in education, which can be useful to identify the scenarios in which the use of cloud computing in an educational context may have significant advantages. Furthermore, the survey categorizes and discusses the main technical and domain-specific research challenges, thus facilitating researchers the task of finding relevant issues, in which they can focus their efforts. We review 112 scientific works on cloud computing in education up to 2012.The survey takes into account the main educational stakeholders.Advantages and risks of cloud in education are categorized and exemplified.We identify and discuss promising technical and domain-specific research issues.

262 citations

Journal ArticleDOI
TL;DR: A meta-analysis of 176 published cases of neonatal SARS-CoV-2 infections that were defined by at least one positive nasopharyngeal swab and/or the presence of specific IgM shows that 70% and 30% of infections are due to environmental and vertical transmission, respectively.
Abstract: A number of severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) infections have been reported in neonates. Here, we aim to clarify the transmission route, clinical features and outcomes of these infections. We present a meta-analysis of 176 published cases of neonatal SARS-CoV-2 infections that were defined by at least one positive nasopharyngeal swab and/or the presence of specific IgM. We report that 70% and 30% of infections are due to environmental and vertical transmission, respectively. Our analysis shows that 55% of infected neonates developed COVID-19; the most common symptoms were fever (44%), gastrointestinal (36%), respiratory (52%) and neurological manifestations (18%), and lung imaging was abnormal in 64% of cases. A lack of mother-neonate separation from birth is associated with late SARS-CoV-2 infection (OR 4.94 (95% CI: 1.98-13.08), p = 0.0002; adjusted OR 6.6 (95% CI: 2.6-16), p < 0.0001), while breastfeeding is not (OR 0.35 (95% CI: 0.09-1.18), p = 0.10; adjusted OR 2.2 (95% CI: 0.7-6.5), p = 0.148). Our findings add to the literature on neonatal SARS-CoV-2 infections.

218 citations

Journal ArticleDOI
TL;DR: A systematic literature review of the existing load balancing techniques proposed so far and the advantages and disadvantages associated with several load balancing algorithms have been discussed and the important challenges of these algorithms are addressed so that more efficientload balancing techniques can be developed in future.

202 citations

Journal ArticleDOI
TL;DR: A state-of-the-art review of issues and challenges associated with existing load-balancing techniques for researchers to develop more effective algorithms is presented.
Abstract: With the growth in computing technologies, cloud computing has added a new paradigm to user services that allows accessing Information Technology services on the basis of pay-per-use at any time and any location. Owing to flexibility in cloud services, numerous organizations are shifting their business to the cloud and service providers are establishing more data centers to provide services to users. However, it is essential to provide cost-effective execution of tasks and proper utilization of resources. Several techniques have been reported in the literature to improve performance and resource use based on load balancing, task scheduling, resource management, quality of service, and workload management. Load balancing in the cloud allows data centers to avoid overloading/underloading in virtual machines, which itself is a challenge in the field of cloud computing. Therefore, it becomes a necessity for developers and researchers to design and implement a suitable load balancer for parallel and distributed cloud environments. This survey presents a state-of-the-art review of issues and challenges associated with existing load-balancing techniques for researchers to develop more effective algorithms.

120 citations