2022
DOI: 10.1155/2022/3365392
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of Modified Blowfish Technique with Honey Bee Behavior Optimization for Load Balancing in Cloud System Environment

Abstract: Cloud computing is a system that allows data to be saved in the cloud on a virtual worker. Outsiders and virtual machines in the cloud worker supplier played a critical part in efficiently storing and accessing information. Security, access control, and load balancing are critical challenges in cloud engineering. In the past, various solutions for adjusting cloud load have been proposed. Operator-based burden adjustment calculation surpassed all other offered CPU use, cost, and idle time strategies. The produc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 63 publications
0
8
0
Order By: Relevance
“…Rani et al 28 proposed a honey‐bee behavior and modified blowfish optimization (HBB‐MBFOA)‐based load balancing approach for attaining uniform distribution of workload in the cloud scenario. It was proposed with the capability of the preventing the problems of operator‐based burden adjustment calculating load balancing strategies in terms of idle time, cost, and CPU utilization.…”
Section: Related Workmentioning
confidence: 99%
“…Rani et al 28 proposed a honey‐bee behavior and modified blowfish optimization (HBB‐MBFOA)‐based load balancing approach for attaining uniform distribution of workload in the cloud scenario. It was proposed with the capability of the preventing the problems of operator‐based burden adjustment calculating load balancing strategies in terms of idle time, cost, and CPU utilization.…”
Section: Related Workmentioning
confidence: 99%
“…Te given image is subsampled to save memory and network trafc, the smaller the input image, the lesser the sensitivity. Te pooling layer, like the convolutional layer, links the outputs of many neurons [35][36][37][38], using a pooling layer when sampling may result in a smaller dataset while increasing processing performance. Te image is gathered in a 2 × 2 window in this experiment.…”
Section: Startmentioning
confidence: 99%
“…The Blowfish (BF) method is used here as part of the process of encrypting data. BF is a blockcipher with a symmetric key that has a key length that may vary from 32-448 bits and a block size that can be up to 64 bits [22]. The BF encryption system was completely open-source, so anybody could use it without paying a fee, and it wasn't protected by any patents.…”
Section: Encryption Using Blowfishmentioning
confidence: 99%