Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

New Design and achievement of IPTV Service Delivery through Virtualizationv

M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women

Usage of IPTV Service conveyance through Virtualization is of pragmatic enthusiasm toward numerous applications, for example, locating an IPTV Service conveyance disappointment. The interruption location is characterized as an instrument for an IPTV Service conveyance through virtualization to discover the presence of immoral, mistaken, or atypical moving assailant (intruder)s. In this examination IPTV conveys the television content over a web Convention foundation. Virtualized cloud-based Services will advantage of statically multiplexing crosswise over applications to yield paramount expense reserve funds to the administrator the cloud based IPTV give bring down a supplier's expenses of constant IPTV benefits through a virtualized IPTV structural planning and through sagacious time moving of Service conveyance. It exploits the distinctions in the due dates connected with Live television versus Video-on-Demand (VoD) to successfully multiplex these Services.

RATNAKUMARI M,D.RAVIKIRAN."New Design and achievement of IPTV Service Delivery through Virtualizationv". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 06,pp.414-420, DECEMBER - 2014, URL :,

Keywords : Orchestrator, Set Top Box, Video on Demand, Interactive TV, Live TV, D-Server

*1+ “Optimizing Cloud Resources for Delivering IPTV
Services through Virtualization”,Vaneet Aggarwal,
Vijay Gopalakrishnan, Rittwik Jana, K. K.
Ramakrishnan, Vinay A. Vaishampayan AT&T Labs –
Research, 180 Park Ave, Florham Park, NJ, 07932
[2] D.Banodkar, K..K. Ramakrishnan, S.
Kalyanaraman, A. Gerber, and O. Spatscheck,
“Multicast instant channel change in IPTV system,” in
Proceedings of IEEE COMSWARE, January 2008.
*3+ “Microsoft tv: Iptv edition,” http:// www.
microsoft. com/tv/IPTVEdition .mspx.
[4] H. A. Lagar-Cavilla, J. A. Whitney, A. Scannell, R.
B. P. Patchin, S.M.Rumble, E. de Lara, M. Brudno, and
M. Satyanarayanan, “SnowFlock:Virtual Machine
Cloning as a First Class Cloud Primitive,” ACM
Transactions on Computer Systems (TOCS), 2011.
[5] V. Aggarwal, V. Gopalakrishnan, R. Jana, K. K.
Ramakrishnan, and V. Vaishampayan, “Exploiting
Virtualization for Delivering Cloud-based IPTV
Services,” in Proc. of IEEE INFOCOM (miniconference), Shanghai, April 2011.
[6] R. Urgaonkar, U. Kozat, K. Igarashi, and M. J.
Neely, “Dynamic resource allocation and power
management in virtualized data centers,”in
Proceedings of IEEE IFIP NOMS, March 2010.
[7] P. Ning, S. D. C. di Vimercati, and P. F. Syverson
(2007), Eds. ACM,pp. 598–609.
[8] A. Juels and B. S. K. Jr. (2007), Pors: proofs of
retrievability for large files, in ACMConference on
Computer and Communications Security
[9] G. Ateniese, R. D. Pietro, L. V. Mancini, and G.
Tsudik (2008), Scalable and efficient provable data
possession, in Proceedings of the 4th international
conference on Security and privacy in communication
netowrks, SecureComm, pp. 1–10.
[10] C. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and
R. Tamassia (2009), Dynamic provable data
possession, in ACM Conference on Computer and
Communications Security, pp. 213–222.
[11] H. Shacham and B. Waters (2008), Compact
proofs of retrievability, in ASIACRYPT, ser. Lecture
Notes in Computer Science, J. Pieprzyk, Ed., vol. 5350.
Springer, pp. 90–107.
[12] Q. Wang, C.Wang, J. Li, K. Ren, and W. Lou
(2009), Enabling public verifiability and data
dynamics for storage security in cloud computing, in
ESORICS, ser. Lecture Notes in Computer Science,
vol. 5789. Springer, pp. 355–370.
[13] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.
S. Yau (2011), Dynamic audit services for integrity
verification of outsourced storages in clouds, in SAC,
pp. 1550–1557.
[14] K. D. Bowers, A. Juels, and A. Oprea (2009), Hail:
a high-availability and integrity layer for cloud storage, in ACM Conference on Computer and
Communications Security, pp. 187–198.
[15] Y. Dodis, S. P. Vadhan, and D. Wichs (2009),
Proofs of retrievability via hardness amplification, in
TCC, ser. Lecture Notes in Computer Science, vol.
5444. Springer, pp. 109–127.
[16] L. Fortnow, J. Rompel, and M. Sipser (1988), On
the power of multiprover interactive protocols, in
Theoretical Computer Science, pp. 156–161.
[17] Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen
(Oct 2011), Collaborative integrity verification in
hybrid clouds, in IEEE Conference on the 7th
International Conference on Collaborative
Computing: Networking, Applications and
Worksharing, CollaborateCom, Orlando, Florida,
USA, 15-18, pp. 197–206.
[18] D. Boneh and M. Franklin (2001), Identity-based
encryption from the weil pairing, in Advances in
Cryptology (CRYPTO’2001), vol. 2139 of LNCS, , pp.
[19]O. Goldreich (2001), Foundations of
Cryptography: Basic Tools. Cambridge University


Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal