scispace - formally typeset
Search or ask a question
Author

Sunirmal Khatua

Other affiliations: Jadavpur University
Bio: Sunirmal Khatua is an academic researcher from University of Calcutta. The author has contributed to research in topics: Cloud computing & Energy consumption. The author has an hindex of 10, co-authored 64 publications receiving 388 citations. Previous affiliations of Sunirmal Khatua include Jadavpur University.


Papers
More filters
Posted Content
TL;DR: This research aims towards proposing a new trusted and collaborative agent-based two-tier framework, titled WAY (Who Are You?), to protect cloud resources and ensure security and privacy both at the service provider level as well as at the user level in a cloud environment.
Abstract: In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect user's sensitive information from other users and hackers that may cause data leakage in cloud storage. Having this security challenge in mind, this paper focuses on the development of a more secure cloud environment, to determine the trust of the service requesting authorities by using a novel VM (Virtual Machine) monitoring system. Moreover, this research aims towards proposing a new trusted and collaborative agent-based two-tier framework, titled WAY (Who Are You?), to protect cloud resources. The framework can be used to provide security in network, infrastructure, as well as data storage in a heterogeneous cloud platform. If the trust updating policy is based on network activities, then the framework can provide network security. Similarly, it provides storage security by monitoring unauthorized access activities by the Cloud Service Users (CSU). Infrastructure security can be provided by monitoring the use of privileged instructions within the isolated VMs. The uniqueness of the proposed security solution lies in the fact that it ensures security and privacy both at the service provider level as well as at the user level in a cloud environment.

58 citations

Proceedings ArticleDOI
25 Oct 2010
TL;DR: The proposed architecture, named as Monitoring & Optimizing Virtual Resources (MOVR) architecture, manages and optimizes the usage of the resources required by a cloud application considering auto deployment, auto scaling and auto recovery of the provisioned resources for the application.
Abstract: One of the key factors behind successful deployment of Cloud for on demand services is the optimal utilization of its virtual resources. A poorly managed cloud application may lead to huge cost which is even more than the cost of physical deployment. The most important issues in Cloud are the scalability and availability. A highly scalable deployment may lead to poor resource utilization whereas a low scalable deployment may lead to unavailability of services. This paper proposes architecture for optimal utilization of such resources considering both scalability and availability. The proposed architecture, named as Monitoring & Optimizing Virtual Resources (MOVR) architecture, manages and optimizes the usage of the resources required by a cloud application considering auto deployment, auto scaling and auto recovery of the provisioned resources for the application.

55 citations

Book ChapterDOI
26 Aug 2013
TL;DR: In this article, the authors study various checkpointing schemes to increase the reliability over spot instances and devise a novel checkpointing scheme on top of application-centric resource provisioning framework that increases the reliability while reducing the cost significantly.
Abstract: In late 2009, Amazon introduced spot instances to offer their unused resources at lower cost with reduced reliability. Amazon's spot instances allow customers to bid on unused Amazon EC2 capacity and run those instances for as long as their bid exceeds the current spot price. The spot price changes periodically based on supply and demand of spot instances, and customers whose bid exceeds it gain access to the available spot instances. Customers may expect their services at lower cost with spot instances compared to on-demand or reserved. However the reliability is compromised since the instances (IaaS) providing the service (SaaS) may become unavailable at any time without any notice to the customer. In this paper, we study various checkpointing schemes to increase the reliability over spot instances. Also we devise a novel checkpointing scheme on top of application-centric resource provisioning framework that increases the reliability while reducing the cost significantly.

39 citations

Journal ArticleDOI
TL;DR: Extensive simulations using real-world traces and comparison with state-of-art strategies show that the proposed VM consolidation approach substantially reduces energy consumption within a data center while delivering suitable QoS.
Abstract: The large-scale virtualized Cloud data centers consume huge amount of electrical energy leading to high operational costs and emission of greenhouse gases. Virtual machine (VM) consolidation has been found to be a promising approach to improve resource utilization and reduce energy consumption of the data center. However, aggressive consolidation of VMs tends to increase the number of VM migrations and leads to over-utilization of hosts. This in turn affects the quality of service (QoS) of the applications running in the VMs. Thus, reduction in energy consumption and at the same time ensuring proper QoS to the Cloud users are one of the major challenges among the researchers. In this paper, we have proposed an energy efficient and QoS-aware VM consolidation technique in order to address this problem. We have used Markov chain-based prediction approach to identify the over-utilized and under-utilized hosts in the data center. We have also proposed an efficient VM selection and placement policy based on linear weighted sum approach to migrate the VMs from over-utilized and under-utilized hosts considering both energy and QoS. Extensive simulations using real-world traces and comparison with state-of-art strategies show that our VM consolidation approach substantially reduces energy consumption within a data center while delivering suitable QoS.

28 citations

Journal ArticleDOI
TL;DR: A thorough study of the various techniques that help in minimization of energy consumption in data centers is conducted and approaches to reduce the same are proposed, eventually making the environment greener.
Abstract: The technology, cloud computing, in present days, is vastly used due to the services it provides and the ease with which they can be availed. The enormous development of the Internet technology is due to the advent of the concept of cloud. Along with its benefits, cloud computing brings along itself a detrimental side effect, i.e., carbon emission. This is due to the massive energy consumption in the cloud data centers. Reduction in energy consumption in cloud is thus one of the major challenges among the researchers. This work conducts a thorough study of the various techniques that help in minimization of energy consumption in data centers. It also explores and proposes approaches to reduce the same, eventually making the environment greener. In the proposed work, prediction mechanism has been adopted and implemented on the existing Minimization of Migration (MM) policy for large history data set, followed by dynamic thresholding mechanism in place of static thresholds. Rigorous simulations have been conducted, and the results show reduction in cloud data center energy consumption.

26 citations


Cited by
More filters
01 Jun 2012
TL;DR: SPAdes as mentioned in this paper is a new assembler for both single-cell and standard (multicell) assembly, and demonstrate that it improves on the recently released E+V-SC assembler and on popular assemblers Velvet and SoapDeNovo (for multicell data).
Abstract: The lion's share of bacteria in various environments cannot be cloned in the laboratory and thus cannot be sequenced using existing technologies. A major goal of single-cell genomics is to complement gene-centric metagenomic data with whole-genome assemblies of uncultivated organisms. Assembly of single-cell data is challenging because of highly non-uniform read coverage as well as elevated levels of sequencing errors and chimeric reads. We describe SPAdes, a new assembler for both single-cell and standard (multicell) assembly, and demonstrate that it improves on the recently released E+V-SC assembler (specialized for single-cell data) and on popular assemblers Velvet and SoapDeNovo (for multicell data). SPAdes generates single-cell assemblies, providing information about genomes of uncultivatable bacteria that vastly exceeds what may be obtained via traditional metagenomics studies. SPAdes is available online ( http://bioinf.spbau.ru/spades ). It is distributed as open source software.

10,124 citations

Journal ArticleDOI
01 Dec 2014
TL;DR: This work proposes a classification of techniques for automating application scaling in the cloud into five main categories: static threshold-based rules, control theory, reinforcement learning, queuing theory and time series analysis, and uses this classification to carry out a literature review of proposals.
Abstract: Cloud computing environments allow customers to dynamically scale their applications. The key problem is how to lease the right amount of resources, on a pay-as-you-go basis. Application re-dimensioning can be implemented effortlessly, adapting the resources assigned to the application to the incoming user demand. However, the identification of the right amount of resources to lease in order to meet the required Service Level Agreement, while keeping the overall cost low, is not an easy task. Many techniques have been proposed for automating application scaling. We propose a classification of these techniques into five main categories: static threshold-based rules, control theory, reinforcement learning, queuing theory and time series analysis. Then we use this classification to carry out a literature review of proposals for auto-scaling in the cloud.

688 citations

Journal ArticleDOI
TL;DR: This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture.

340 citations

Journal ArticleDOI
TL;DR: CCAF multi-layered security blends with policy, services and business activities, and can be beneficial for volume, velocity, and veracity of big data services operated in the cloud.

288 citations