Optimizing Migration of the Application Data in Cloud Environment Using ACO Algorithm and RSA Encryption

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Taking the advantages of the capabilities offered by cloud computing requires either an application to be built especially for it, or for existing application to migrated to it. The main focus on migrate the application data with speedily and accurately. Migrating data to the cloud creates a series of technical, architectural and legal challenges which resolved by using following algorithms. Organize such efforts into a set of migration schemes and connect them with a list of reusable solution for application data migration in form of packets. At last, define an application data migration methodology and demonstrate how it can be used in practice.

Authors and Affiliations

Deepika , Amanpreet Kaur

Keywords

Related Articles

 Analytical Review of Feature Extraction Techniques for Automatic Speech Recognition

 Speech recognition is a multileveled pattern recognition task, in which acoustical signals are examined and structured into a hierarchy of sub word units (e.g., phonemes), words, phrases, and sentences. Each l...

Cuckoo Search based Optimal Elliptic Curve Cryptography (OECC) for Text Encryption

Abstract : The Cryptography converts our original text information into non understandable form of text that is cipher text which is more powerful because which is not understandable. . In this work we are implemented th...

 Holistic and Procedural Features for Authenticating Users

 Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Var...

 Survey of different Web Application Attacks & Its Preventive Measures

 Securing web is like securing our nation. Our whole world is Internet dependent In each sector internet is very much essential. So, internet security is very much promising task for us. More than 80% attacks are...

 An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks

 Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than theirown rightful packet for enhancing network performance. It happens due to the availability of some selfish...

Download PDF file
  • EP ID EP112703
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Deepika, Amanpreet Kaur (2016). Optimizing Migration of the Application Data in Cloud Environment Using ACO Algorithm and RSA Encryption. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 66-70. https://europub.co.uk./articles/-A-112703