Please use this identifier to cite or link to this item:
|Title:||MOBILIM : INTEGRATED LICENSE MANAGEMENT & ECONOMIC RESOURCE ALLOCATION FOR CLOUD COMPUTING|
|Authors:||Thorat, Pankaj B.|
|Keywords:||ELECTRONICS AND COMPUTER ENGINEERING|
|Abstract:||Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. It refers to applications delivered as services over the Internet as well as to the actual cloud infrastructure — namely, the hardware and systems software in data centers that provide these services. Cloud computing is on-demand computing in which the computing resources are owned and managed by a service provider and the users access the resources via the Internet. But cloud computing potential doesn't begin and end with the personal computer's transformation into a thin client. The mobile platform is going to be heavily impacted by this technology as well. License management and economic resource allocation is a major issue faced by cloud computing paradigm. In this dissertation we propose MobiLim, a framework which addresses major problems related to license management and economic resource allocation in cloud computing. This framework named MobiLim is managed by independent software vendor (ISVs), who controls access to the resource provider resources. MobiLim provides a secure and robust license management solution as well as allocate resources economically to the customers. MobiLim acts as an intermediate entity between customer and resource provider which accepts customers request for the resources. If MobiLim is capable of allocating the resource to customer then it performs negotiation over price between customer and resource provider. If the negotiation is successful then MobiLim grants a valid license to the customer. A license allows the customer to gain access to the resource provider resource which customer needs. The proposed framework is modular due to which it is possible to make it more robust and secure with the help of advanced cryptographic techniques. The framework is tested with a set of customer requests and the results validate correctness of proposed framew|
|Appears in Collections:||MASTERS' DISSERTATIONS (E & C)|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.