Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Computing with Mobile-Fi Technology Using Transposition and Substitution Cipher in Job Scheduling

V. B. Kirubanand

Abstract


A network that distributes the information among computer systems contains a blend up of both wired and wireless interface devices. These devices play a vital part in routing and switching the data packets in the system. The use of MOBILE-FI Wireless tool technology holds the properties of allocating the activities of computer systems. Such allocated data storage technique was soon after enhanced with a procedure of centralized database storage called Cloud Computing Architecture System. Thus all the client demands are aptly responded from the server.

The standard Cloud Computing Architecture has been scrutinized with various network devices. This part of the research work is an implementation of multi mechanism hybrid model for successful and using Transposition and Substitutions Cipher method which will be protected data transmission.


Keywords


Cloud Computing Architecture, Mobile-Fi Wireless Device, Job Scheduling, Markov Model, Transposition, Substitutions.

Full Text:

PDF

References


Andrew D. Ker "Steg-analysis of Embedding in Two Least-Significant Bits" IEEE Transactions on Information Forensics and Security, Vol. 2, pp 662-672, 2007

Arora K.L. “Two client server bulk service queuing processes Opns.,Vol. 12, PP 286 - 294, 1964.

Chobrolu. S, A. Abraham, P. Johnson, feature detection and ensemble design of intrusion detection systems, Elsevier, Computer and Security , Vol. 24, pp. 195 – 207, 2005.

Denteneer, T.J.J., J.S.H. van Leeuwaarden, J.A.C. Resing ,“Bounds for a discrete-time multi erverueue with an application to cablenetworks”, In proceedings of ITC 18, Elsevier, Berlin pp. 601- 612, 2003.

Dimitris C. Psichogios and Lyle H. Ungar "A Hybrid Neural Network-First Principles Approach to Process Modeling"

Gabor Imre, Agnes Bogardi-Meszoly, Hassan Charaf "Measuring and Modelling the Effect of the application tuning parameters on performance" 4th Slovakian- Hungarian Joint Symposium on Applied Machine Intelligence, 2006.

Gohain, R. and Borthakur, A. “On difference equation technique applied to bulk service queue with the server”, Pure and Applied Mathematics Science: X(1-2) PP 42-46 1979

Lee H.W., Chung, D.L., Lee, S.S and chae, K.C (1997), “client server unavailability reduces mean waiting time in some batch service queuing systems”, Computer and Ops. Res., Vol. 24, pp. 559-567.

Mohammed Ali Bani Younes, Aman Jantan, A new Stegonagraphy Approach for image encryption exchange by using the LSB insertion, Integration Journal of Computer Science and Network Security, Vol 8. No.6, pp 247-254. 2008.

Ramaraj. E and S. Karthikeyan, “A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking” Journal of Computer Science, 2: PP 672-675, 2006.

Ross. J. Anderson, Fabian A.P. Petitcolas, On the Limits of stegonography, IEEE Journal of Selected Areas in communication 16(4), pp. 474-481, 1998.

Samuel Kounev, Alejandro Buchman "Performance Modelling of Distrubuted E-Business Applications using Queuing Perti Nets" IEEE International, 2003

Stamatelopoulos F., Roussopoulos N. and Maglaris B. "Using a DBMS for Hierarchical Network Management" 1995.

V.B.Kirubanand,S.Palaniammal, Performance Modeling in cloud computing architecture network comparison of Hub,Switch and Bluetooth Technology using Markov Agorithm and Queuing petrinets with the securityof steganography .International journal of advanced networking and applications.Volume: 01,Issue:05,pages:331-336.March-April 2010.

V.B.Kirubanand,S.Palaniammal, Performance Modeling in Comparison of Switch andBluetooth Technology by using Markov Algorithm and Queuing Petrinets with the security of Steganography, Far East Journal of Experimental and Theorwetical Artificial Intelligence. Volume 4, No:1, 2009, pages:33-43, March 2009.

V.B.Kirubanand, S.Palaniammal, A Hybrid model in comparing the performance of wired nd Wireless Technologies by using the Markov algorithm and Queuing Petrinets, International journal of computer application, No:4 Article-1, Pub: Foundation of computer Science, 2010.

V.B.Kirubanand, S. Palaniammal, Performance Modeling of Cloud computing architecture with Mobile-Fi Application Using Queuing Petri nets by Markov Algorithm with Security of Cryptography, International Journal Network and Computer Engineering ISSN 0975-6485 Volume 1 Number 1(2010) pp. 1-9, 2010.

BenniPurnama, A New modified Caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Elseveir, Procedia computer science, Vol.59, 2015, pages, 195-204.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.