Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Ch. Siva Rama Krishna, B. Tarakeswara Rao, B. Sathyanarayana Reddy

Ch. Siva Rama Krishna, Tarakeswara B Rao and Sathyanarayana B Reddy. Article: Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF). International Journal of Computer Applications 133(1):8-12, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Ch. Siva Rama Krishna and B. Tarakeswara Rao and B. Sathyanarayana Reddy},
	title = {Article: Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {1},
	pages = {8-12},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


The greater part of the present cloud computing platforms offer Infrastructure as a Service (IaaS) model, which expects to procurement fundamental virtualized computing assets as on interest and element Services. By the by, a single cloud does not have boundless assets to offer to its clients, consequently the thought of an Inter-Cloud environment where a cloud can utilize the infrastructure assets of different clouds. Because of vendor lock-in snags in broad daylight cloud computing the capacity to define transferable cloud-based Services is pivotal yet has not yet been comprehended palatably. . The genuine cutting edge cloud services configuration does not methodically manage how to define, send and work cross-platform competent cloud services. This is mainly because of the inherent multifaceted nature of the field and contrasts in subtle elements between a lot of existing open and private cloud infrastructures. In any case, there is no basic structure in presence that permits the service proprietors to consistently procurement even some essential services across different cloud Service Providers, to address the above issues I recommend Virtualized Private cloud with versatile system, which drives the displayed issues, thus keeping in mind the end goal to give the boundless services, it will demonstrate high security, data accessibility, data integrity with elite.


  1. A. Rowstron, P. Druschel, Pastry: Scalable, decentralized object location,and routing for Large-Scale Peer-to-Peer systems, in: Middleware 2001, 2001.
  2. B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, J. D. Kubiatowicz, Tapestry: a resilient global-scale overlay for service deployment, Selected Areas in Communications, IEEE Journal on.
  3. P. ”Maymounkov, D. Mazi`eres, ”kademlia: A peer-to-peer information system based on the xor metric”, in: ”Revised Papers from the First International Workshop on Peer-to-Peer Systems”, ”Springer-Verlag”,”2002”.
  4. J. Douceur, The sybil attack, in: Peer-to-Peer Systems, Springer Berlin / Heidelberg, 2002.
  5. D. Taylor, T. Wu, N. Mavrogiannopoulos, T. Perrin, Using the Secure Remote Password (SRP) Protocol for TLS Authentication, RFC 5054, 2007.
  6. A. S. Dan Boneh, B. Waters, Functional encryption: a new vision for public-key cryptography, Commun. ACM 55 (11) (2012) 56–64.
  7. Barr, J. (2010) Host Your Web Site in the Cloud: Amazon Web Services Mad Easy. Sitepoint.
  8. Kratzke, N. (2012) Cloud Computing Costs and Benefits—An IT Management Point of View. In: Ivanov, I., van Sinderen,M. and Shiskov, B., Eds., Cloud Computing and Services Sciences, Springer, New York, 185-203.
  9. Kratzke, N. (2011) Overcoming Ex Ante Cost Intransparency of Clouds—Using System Analogies and a Corresponding Cost Estimation Model. CLOSER 2011—1st International Conference on Cloud Computing and Services Science (Special Session on Business Systems and Aligned IT Services—BITS 2011), Noordwijkerhout, 7-9 May 2011, 707-716.
  10. Satzger, B., Hummer, W., Inzinger, C., Leitner, P. and Dustdar, S. (2013) Winds of Change: From Vendor Lock-In to the Meta Cloud. Internet Computing, IEEE, 17, 69-73.
  11. Amazon Web Services (2014) Whitepaper “Overview of Amazon Web Services”.
  12. DMTF, CIMI (Cloud Infrastructure Management Interface) (2014) Last Access 30th June 2014.
  13. (The Ruby Cloud Services Library) (2014) Last Access 30th June 2014.
  14. de Alfonso, C., Caballer, M., Alvarruiz, F., Molto, G. and Hernandez, V. (2011) Infrastructure Deployment over the Cloud. Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (Cloud-Com), Athens, 29 November-1 December 2011, 517-521.
  15. Juve, G. and Deelman, E. (2011) Automating Application Deployment in Infrastructure Clouds. Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom), Athens, 29 November-1 December 2011, 658-665.
  16. Lenk, A., Danschel, C., Klems, M., Bermbach, D. and Kurze, T. (2011) Requirements for an IaaS Deployment Language in Federated Clouds. Proceedings of SOCA, Irvine, 12-14 December 2011, 1-4.


Cloud Computing, Vendor Lock-In, Cross-Platform, Interclub Virtual adaptive framework