Reference Hub1
Verification and Identification Approach to Maintain MVCC in Cloud Computing

Verification and Identification Approach to Maintain MVCC in Cloud Computing

Niharika Singh, Upasana Lakhina, Ajay Jangra, Priyanka Jangra
Copyright: © 2017 |Volume: 7 |Issue: 4 |Pages: 19
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522515043|DOI: 10.4018/IJCAC.2017100103
Cite Article Cite Article

MLA

Singh, Niharika, et al. "Verification and Identification Approach to Maintain MVCC in Cloud Computing." IJCAC vol.7, no.4 2017: pp.41-59. http://doi.org/10.4018/IJCAC.2017100103

APA

Singh, N., Lakhina, U., Jangra, A., & Jangra, P. (2017). Verification and Identification Approach to Maintain MVCC in Cloud Computing. International Journal of Cloud Applications and Computing (IJCAC), 7(4), 41-59. http://doi.org/10.4018/IJCAC.2017100103

Chicago

Singh, Niharika, et al. "Verification and Identification Approach to Maintain MVCC in Cloud Computing," International Journal of Cloud Applications and Computing (IJCAC) 7, no.4: 41-59. http://doi.org/10.4018/IJCAC.2017100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

MultiVersion concurrency control is maintained over transactional database systems for secure, fast and efficient access to the shared data file implementation scenario. Most of the services and application offered in cloud world are real-time, which entails optimized compatibility service environment between master and slave clusters. In the paper, offered methodology supports replication and triggering methods intended for data consistency and dynamicity. Here, cluster based communication is set up for processing. Intercommunication among different clusters is administered through middleware besides slave intra-communication is handled by verification and identification protection. The proposed approach incorporates resistive flow to handle high impact systems that identifies and verifies multiple processes. Statistical analysis determines that the new scheme reduces the overheads from different master and slave servers as they are co-located in clusters which allow increased horizontal and vertical scalability of resources.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.