Paper Title : Computer-Based Resource Allocation System in a Dynamic Environment Using Real-Time Traffic Light System
ISSN : 2394-2231
Year of Publication : 2021
10.29126/23942231/IJCT-v8i5p4
MLA Style: Computer-Based Resource Allocation System in a Dynamic Environment Using Real-Time Traffic Light System " Oyebola Akande, Yaw Mensah, Funmilayo A. Kasali, Wumi Ajayi " Volume 8 - Issue 5 September-October , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Computer-Based Resource Allocation System in a Dynamic Environment Using Real-Time Traffic Light System " Oyebola Akande, Yaw Mensah, Funmilayo A. Kasali, Wumi Ajayi " Volume 8 - Issue 5 September-October , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
With the hazardous progression of unstructured information, scattered restrict improvement receives an outstanding path of action of notion and higher progress. Regardless, in current gathering configuration, customers statistics is definitely saved in cloud people. In other words, clients change their tune on facts and face the risk of security leave. old age security affirmation plans are in the cutting-edge scenario and have been saved from being converted to a different design progression, regardless those guides of movement of structures can't viably limit assault from the cloud expert. To choose this problem, have a will whilst the whole lot is stated in achieved endorse a 3-layer gathering device saved up dimness figuring. Every appropriated restrict and protect the confirmation of statistics will be experienced by the coordinated gadget. In addition, Hash-Solomon coding is presented as a way to separate records into completely different portions. We'll put a bit of information in place device and mist registration at that point to preserve the security, additionally, stored up cycle data, this situation will confirm the association diploma look up in cloud, mist and nearby laptop. thru the speculative thriving appraisal and research assessment, the sensibility of our issue has been stunning, that is on an extremely essential degree a liberal circulate up to current passed on restrict subject matter is the onlooker of the advancing years scattered figuring improvement
Reference
[1] P. Mell and T. Grance, "The NIST definition of distributed computing," Nat. Inst. Stand. Technol., vol. 53, no. 6, pp. 50–50, 2009. [2] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A study of portable distributed computing: Architecture, applications, and approaches," Wireless Commun. Portable Comput., vol. 13, n[1] P. Mell and T. Grance, "The NIST definition of distributed computing," Nat. Inst. Stand. Technol., vol. 53, no. 6, pp. 50–50, 2009. [2] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A study of portable distributed computing: Architecture, applications, and approaches," Wireless Commun. Portable Comput., vol. 13, no. 18, pp. 1587–1611, 2013. [3] J. Pursue, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and data transfer capacity assignment in programming defined network (sdn) and cloudcomputingenvironments,"inProc.IEEEInt.Con f.Commun.,2014, pp. 2969–2974. [4] H. Li, W. Sun, F. Li, and B. Wang, "Secure and protection safeguarding information stockpiling administration openly cloud," J. Comput. Res. Create., vol. 51, no. 7, pp. 1397–1409, 2014. [5]Y.Li,T.Wang,G.Wang,J.Liang,andH.Chen,"Effic ientdatacollection in sensor-cloud framework with various versatile sinks," in Proc. Adv. Serv. Comput., tenth Asia-Pac. Serv. Comput. Conf., 2016, pp. 130–143. [6] L. Xiao, Q. Li, and J. Liu, "Overview on secure distributed storage," J. Information Acquis. Cycle., vol. 31, no. 3, pp. 464–472, 2016. [7] R. J. McEliece and D. V. Sarwate, "On sharing insider facts and reed-solomon codes," Commun. ACM, vol. 24, no. 9, pp. 583–584, 1981. [8] J. S. Board, "T1: Erasure codes for capacity applications," in Proc. fourth USENIX Conf. Record Storage Technol., 2005, pp. 1–74. [9]R.Kulkarni,A.Forster,andG.Venayagamoorthy," Computational knowledge in wirelesss ensornet works:Asurvey," IEEE Commun. Surv. Tuts., vol. 13, no. 1, pp. 68–96, First Quarter 2011. [10] Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, "A privacy preserving and duplicate prevention content-based picture recovery plot in distributed computing," IEEE Trans. Inf. Criminology Security, vol. 11, no. 11, pp. 2594– 2608, Nov. 2016. [11] J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, "A protected cloud-helped metropolitan information sharing structure for omnipresent urban communities," Pervasive Mobile Comput., vol. 41, pp. 219–230, 2017. [12]Z.Fu,F.Huang,K.Ren,J.Weng,andC.Wang,"Priv acy-preservingsmart semantic inquiry dependent on calculated charts over encoded reevaluated information," IEEE Trans. Inf. Crime scene investigation Security, vol. 12, no. 8, pp. 1874– 1884, Aug. 2017. [13] J. Hou, C. Piao, and T. Fan, "Protection safeguarding distributed storage design research," J. Hebei Acad. Sci., vol. 30, no. 2, pp. 45–48, 2013. [14] Q. Hou, Y. Wu, W. Zheng, and G. Yang, "A strategy on assurance of client dataprivacyincloudstorageplatform,"J.Comput.Res. Develop.,vol.48, no. 7, pp. 1146–1154, 2011. [15] P. Barham et al., "Xen and the craft of virtualization," ACM SIGOPS Oper. Syst. Fire up., vol. 37, no. 5, pp. 164–177, 2003. [16] G. Feng, "An information security assurance plan of distributed storage," vol. 14, no. 12, pp. 174–176, 2015. [17] Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, "Toward efficient multikeyword fluffy inquiry over scrambled rethought information with exactness improvement,"IEEETrans.Inf.ForensicsSecurity,vol .11,no.12,pp.2706–2716, Dec. 2016. [18] Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Empowering customized search over scrambled reevaluated information with efficiency improvement," IEEE Trans. Equal Distrib. Syst., vol. 27, no. 9, pp. 2546–2559, Sep. 2016. [19] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A protected and dynamic multikeyword positioned search conspire over encoded cloud information," IEEE Trans. Equal Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016. [20] Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C.- N. Yang, "Empowering semantic pursuit dependent on reasonable charts over encoded reevaluated information," IEEE Trans. Serv. Comput.. [Online]. Accessible: http://doi.ieeecomputersociety.org/10.1109/TSC.20 16.2622697 [21]G.Kulkarni,R.Waghmare,R.Palwe,V.Waykule, H.Bankar,andK.Koli, "Distributed storage design," in Proc. seventh Int. Conf. Telecommun. Syst., Serv., Appl., 2012, pp. 76–81. [22] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Protection safeguarding public examining for secure distributed storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013. [23] J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, "An efficient public reviewing convention with novel unique design for cloud information," IEEE Trans. Inf. Crime scene investigation Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017. [24] L. Wei et al., "Security and protection for capacity and calculation in distributed computing," Inf. Sci., vol. 258, pp. 371–386, 2014. [25]R.Atan,A.M.Talib,andM.A.A.Murad,"Formulat ingasecuritylayerof cloud information stockpiling structure dependent on multi specialist framework design," GSTF J. Comput., vol. 1, no. 1, pp. 121– 124, 2014. [26] M. Z. A. Bhuiyan, T. Wang, T. Hayajneh, and G. M. Weiss, "Keeping up the harmony among protection and information respectability in web of things," in Proc. Int. Conf. Oversee. Eng., Softw. Eng. Serv. Sci., 2017, pp. 177–182. [27] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Mist figuring and its part in the web of things," in Proc. first Edition MCC Workshop Mobile Cloud Comput, 2012, pp. 13–16. [28] J. Yick, B. Mukherjee, and D. Ghosal, "Remote sensor network overview," Comput. Netw., vol. 52, no. 12, pp. 2292–2330, 2008. [29] T. Wang et al., "Boosting ongoing real time features dependent on a multi-workers organizing structure," Comput. Netw., vol. 93, pp. 199–212, 2015. [30] Alrammahi, Maghrib Abidalreda, and Harleen Kaur. "Development of Advanced Encryption Standard (AES) Cryptography Algorithm for Wi-Fi Security Protocol." International Journal of Advanced Research in Computer Science 5.3 (2014)
Keywords
— Security threats, Malware protection, Performance, Fog computing, Wireless security