A SURVEY ON OPTIMIZED CLOUD INSTANCE MANAGEMENT STRATEGIES USING AMAZON EC2
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
Cloud computing has become more and more popular now a day. This is due to the fact that it is highly compatible to provide an effective and efficient service to customers on demand. This is due to the benefits from cloud computing. The main characteristics of cloud computing are high performance, scalability, high computing power, cheap cost of services, accessibility and availability of cloud services. The cloud vendors are getting a steady growth in recent times. This growth rate is up to 50% in recent years. Some of the cloud computing providers are Amazon web services, rack space hosting, windows Azure. The aim behind this survey is that how effectively system can optimize cloud instance management so that both the cloud providers and clients gets benefits. For this purpose an Automated Cloud Instance Management System which controls all the services provided by cloud service provider. This system can automate the start and stop instances at the specified indicated times, if required at a click system can start or stop an instance at any time. The images of each instance called AMIs can be created at a single click. The custom reports can be generated based on the run time of each instances. The Run log of each instance can be stored to monitor the cloud service provider service. Billing calculation reports for each instance so that there is no loss per month for us. Each week running hour calculations reports makes our clients feel better about our company. Automated Cloud Instance Management System contains a Cost and utilization optimization mechanism on a set of running Amazon EC2 instances. Proposed system receives information on the currently used instance types and proposes a new set of instances for serving the same load that minimizes cost and maximizes utilization and performance efficiency.
Authors and Affiliations
Febin J, Suma Sira Jacob, Kezi Selva Vijila
PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS
Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by...
Optimization of Region and Power with Routability Constrained Flip Flop Joining Process
The main factor considered during designing the in low power and high performance was the power consumption. It plays an important role in the above mentioned region. The concept of multi-bit flip–flop assembled structur...
Cost Effective Disaster Finding Using Supervised Learning Methods On Hadoop
Streams of data is collected and the required information is separated from these data is known as data mining. Various data sources are combined for processing to provide further consistent, precise and important inform...
HIGHLY ACCURATE RECOGNITION OF BODY MASS INDEX AND HUMAN DIABETICS THROUGH SENSORS
Monitoring of diabetics and BMI (Body Mass Index) is used in many medical field and research applications. This paper suggests a method for performing highly accurate recognition of pressure, sugar, he...
A Model for Trusted Cloud Computing with Remote Attestation
Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...