{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:24:43Z","timestamp":1760171083818},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"abstract":"<p>One of the principle features on which cloud environments operate is the scaling up and down of resources based on users' needs, called elasticity. This feature is limited to the cloud's physical resources. This article proposes to enhance the elasticity of a cloud in an intelligent manner by communicating with an optimal external cloud (EC) and borrowing additional resources from it when the cloud runs out of resources. This inter-cloud communication is secured by a model whose structure is similar to the Kerberos protocol. To choose the optimal EC for a particular request of a user, a list of parameters, collectively termed as RePVoCRaD, are enumerated. Once chosen, trust is established with the chosen EC and inter-cloud communication begins. While existing works deal with third parties to establish or secure inter-cloud communication, this work is novel in that there is absence of third parties in the entire process, thereby reducing security threats and additional costs involved. Evaluating this work based on turnaround time and transaction success rate, in a real-time cloud environment, it is seen that the cloud's elasticity is so enhanced that it successfully accommodates its users' additional demands by the fastest means possible.<\/p>","DOI":"10.4018\/ijiit.2018040103","type":"journal-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T16:37:28Z","timestamp":1525970248000},"page":"43-58","source":"Crossref","is-referenced-by-count":3,"title":["Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity"],"prefix":"10.4018","volume":"14","author":[{"given":"S.","family":"Kirthica","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Anna University, Chennai, India"}]},{"given":"Rajeswari","family":"Sridhar","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Anna University, Chennai, India"}]}],"member":"2432","reference":[{"key":"IJIIT.2018040103-0","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"IJIIT.2018040103-1","first-page":"135","article-title":"Intercloud exchanges and roots topology and trust blueprint.","author":"D.Bernstein","year":"2011","journal-title":"11th International Conference on Internet Computing"},{"key":"IJIIT.2018040103-2","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-1-4419-5906-5_145","article-title":"Digital signature standard","author":"D.Boneh","year":"2011","journal-title":"Encyclopedia of cryptography and security"},{"key":"IJIIT.2018040103-3","doi-asserted-by":"crossref","unstructured":"Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. In Algorithms and architectures for parallel processing (pp. 13\u201331). Springer.","DOI":"10.1007\/978-3-642-13119-6_2"},{"key":"IJIIT.2018040103-4","doi-asserted-by":"publisher","DOI":"10.1145\/1734160.1734162"},{"key":"IJIIT.2018040103-5","unstructured":"CSMIC - Carnegie Mellon University. (2014). Service measurement index framework version 2.1. Retrieved Dec 21, 2016, from http:\/\/csmic.org\/downloads\/SMI_Overview_ TwoPointOne.pdf\/"},{"key":"IJIIT.2018040103-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.006"},{"key":"IJIIT.2018040103-7","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2168"},{"key":"IJIIT.2018040103-8","doi-asserted-by":"publisher","DOI":"10.4018\/jiit.2011040102"},{"key":"IJIIT.2018040103-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2015100101"},{"issue":"7","key":"IJIIT.2018040103-10","first-page":"99","article-title":"Provisioning rapid elasticity by light-weight live resource migration.","volume":"2","author":"S.Kirthica","year":"2015","journal-title":"International Journal of Modern Trends in Engineering and Research"},{"key":"IJIIT.2018040103-11","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2208-8_26"},{"key":"IJIIT.2018040103-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_7"},{"key":"IJIIT.2018040103-13","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2015100103"},{"key":"IJIIT.2018040103-14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.44"},{"key":"IJIIT.2018040103-15","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"IJIIT.2018040103-16","first-page":"124","article-title":"The eucalyptus open-source cloud-computing system.","author":"D.Nurmi","year":"2009","journal-title":"9th IEEE\/ACM International Symposium on Cluster Computing and the Grid (CCGRID)"},{"key":"IJIIT.2018040103-17","doi-asserted-by":"crossref","unstructured":"Owens, D. (2010). Securing elasticity in the cloud. Communications of the ACM, 53(6), 46\u201351.","DOI":"10.1145\/1743546.1743565"},{"key":"IJIIT.2018040103-18","unstructured":"Parameswaran, A., & Chaddha, A. (2009). Cloud interoperability and standardization. SETlabs briefings, 7(7), 19\u201326."},{"key":"IJIIT.2018040103-19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"IJIIT.2018040103-20","doi-asserted-by":"crossref","unstructured":"Rochwerger, B., Breitgand, D., Epstein, A., Hadas, D., Loy, I., Nagin, K., Tordsson, J., Ragusa, C., Villari, M., Clayman, S., Levy, E., Maraschini, A., Massonet, P., Mu\u00f1oz, H., & Tofetti, G. (2011). RESERVOIR - When one cloud is not enough. IEEE computer, 44(3), 44\u201351.","DOI":"10.1109\/MC.2011.64"},{"key":"IJIIT.2018040103-21","unstructured":"Rogers, S. J. (2013). Kerberos and SAS\u00ae 9.4: A Three-Headed Solution for Authentication. SAS Institute Inc. Retrieved Dec 23, 2016, from http:\/\/support.sas.com\/resources\/papers\/ proceedings13\/476-2013.pdf"},{"key":"IJIIT.2018040103-22","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"IJIIT.2018040103-23","unstructured":"Varia, J. (2011). Architecting for the Cloud: Best Practices. Amazon Web Services. Retrieved Dec 23, 2016, from https:\/\/media.amazonwebservices.com\/AWS_Cloud_Best_Practices.pdf"},{"key":"IJIIT.2018040103-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["International Journal of Intelligent Information Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=205669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:49:50Z","timestamp":1651880990000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJIIT.2018040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijiit.2018040103","relation":{},"ISSN":["1548-3657","1548-3665"],"issn-type":[{"value":"1548-3657","type":"print"},{"value":"1548-3665","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}