Pub Date : 2019-07-18DOI: 10.1504/IJGUC.2019.10022672
L. N. Omran, Kadry Ali Ezzat, Alaa Bayoumi, A. Darwish, A. Hassanien
This paper aims to design a prototype of the real-time patient control system. The proposed framework is used to quantify the physical parameters of the patient such as the temperature of the body, rate of heartbeat and ECG observation with the assistance of sensors. The collected data is sent to the cloud, then to the nurse station, specialist and the patient tablet or the web application. In this framework, the patient's health is checked consistently and the data obtained through the networks are transmitted. If any irregularity is noticed from the patient's signs, it will be sent to nurses and doctors for any suggestions to help the patient. The system is implemented through Arduino advanced controller and simulation results are obtained. The Smart Intensive Care Unit (SICU) provides a new way for health monitoring of patients in order to improve healthcare systems and patients' care and safety. The cloud system is provided by a group of micro-services hosted in many servers the simulate a small cloud system. To secure the patient's data through this framework is provided by using OAuth server to authenticate the users and the sensors and generate the tokens. This system can assist doctors and nurses to achieve their missions and improve the healthcare system.
{"title":"IoT-based intensive care secure framework for patient monitoring and tracking","authors":"L. N. Omran, Kadry Ali Ezzat, Alaa Bayoumi, A. Darwish, A. Hassanien","doi":"10.1504/IJGUC.2019.10022672","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022672","url":null,"abstract":"This paper aims to design a prototype of the real-time patient control system. The proposed framework is used to quantify the physical parameters of the patient such as the temperature of the body, rate of heartbeat and ECG observation with the assistance of sensors. The collected data is sent to the cloud, then to the nurse station, specialist and the patient tablet or the web application. In this framework, the patient's health is checked consistently and the data obtained through the networks are transmitted. If any irregularity is noticed from the patient's signs, it will be sent to nurses and doctors for any suggestions to help the patient. The system is implemented through Arduino advanced controller and simulation results are obtained. The Smart Intensive Care Unit (SICU) provides a new way for health monitoring of patients in order to improve healthcare systems and patients' care and safety. The cloud system is provided by a group of micro-services hosted in many servers the simulate a small cloud system. To secure the patient's data through this framework is provided by using OAuth server to authenticate the users and the sensors and generate the tokens. This system can assist doctors and nurses to achieve their missions and improve the healthcare system.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"os-11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-18DOI: 10.1504/IJGUC.2019.10022663
Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr
The developing interest for utilising the Cloud Computing (CC) has expanded the energy consumption of data centres which has become a critical issue. High energy consumption not only is translated to high operational cost but also reduces the profit margin for the cloud providers and leads to high carbon emissions, which are not environmentally friendly. Therefore, there is a need for energy-saving solutions to minimise the negative impact of CC. This research proposes an Energy Saving Load Balancing (ESLB) technique that plans to make energy saving in the cloud server while keeping up the Service Level Agreement (SLA), which includes the Quality of Service (QoS) between the cloud service provider and cloud customers. This proposed technique aims to enhance the performance, resources' utilisation and reduce the both of energy consumption and carbon dioxide in order to mitigate the negative impact of CC on the environment.
{"title":"An adaptive technique for cost reduction in cloud data centre environment","authors":"Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr","doi":"10.1504/IJGUC.2019.10022663","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022663","url":null,"abstract":"The developing interest for utilising the Cloud Computing (CC) has expanded the energy consumption of data centres which has become a critical issue. High energy consumption not only is translated to high operational cost but also reduces the profit margin for the cloud providers and leads to high carbon emissions, which are not environmentally friendly. Therefore, there is a need for energy-saving solutions to minimise the negative impact of CC. This research proposes an Energy Saving Load Balancing (ESLB) technique that plans to make energy saving in the cloud server while keeping up the Service Level Agreement (SLA), which includes the Quality of Service (QoS) between the cloud service provider and cloud customers. This proposed technique aims to enhance the performance, resources' utilisation and reduce the both of energy consumption and carbon dioxide in order to mitigate the negative impact of CC on the environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"45 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-18DOI: 10.1504/ijguc.2019.101996
T. Enokido, Dilawaer Duolikun, M. Takizawa
Server cluster systems equipped with virtual machines are widely used to realise scalable and high-performance computing systems. In order to satisfy application requirements like response time, processing loads of virtual machines have to balance with one another in a server cluster. In addition to achieve the performance objectives, the total electric energy of a server cluster to perform application processes has to be reduced. In this paper, the Energy Consumption Laxity Based (ECLB) algorithm is proposed to allocate computation type application processes to virtual machines in a server cluster so that the total electric energy of the server cluster and response time of each process can be reduced. We evaluate the ECLB algorithm compared with basic Round-Robin (RR) algorithm. Evaluation results show the average total electric energy of a server cluster and average response time of each process in the ECLB algorithm can be more reduced than in the RR algorithm.
{"title":"The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments","authors":"T. Enokido, Dilawaer Duolikun, M. Takizawa","doi":"10.1504/ijguc.2019.101996","DOIUrl":"https://doi.org/10.1504/ijguc.2019.101996","url":null,"abstract":"Server cluster systems equipped with virtual machines are widely used to realise scalable and high-performance computing systems. In order to satisfy application requirements like response time, processing loads of virtual machines have to balance with one another in a server cluster. In addition to achieve the performance objectives, the total electric energy of a server cluster to perform application processes has to be reduced. In this paper, the Energy Consumption Laxity Based (ECLB) algorithm is proposed to allocate computation type application processes to virtual machines in a server cluster so that the total electric energy of the server cluster and response time of each process can be reduced. We evaluate the ECLB algorithm compared with basic Round-Robin (RR) algorithm. Evaluation results show the average total electric energy of a server cluster and average response time of each process in the ECLB algorithm can be more reduced than in the RR algorithm.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-16DOI: 10.1504/IJGUC.2019.10022144
Nelson L. Santos, Salvatore Lentini, E. Grosso, B. Ghita, G. Masala
The advancements in virtualisation and distributed computing have allowed the cloud paradigm to become very popular among users and resources. It allows companies to save costs on infrastructure and maintenance and to focus on the development of products. However, this fast-growing paradigm has brought along some concerns from users, such as the integrity and security of the data, particularly in environments where users rely entirely on providers to secure their data. This paper explores different techniques to fragment data on the cloud and prevent direct unauthorised access to the data. It explores their performance on a cloud instance, where the total time to perform the operation, including the upload and download of the data, is considered. Results from this experiment indicate that fragmentation algorithms show better performance compared to encryption. Moreover, when combining encryption with fragmentation, there is an increase in the security, with the trade-off of the performance.
{"title":"Performance analysis of data fragmentation techniques on a cloud server","authors":"Nelson L. Santos, Salvatore Lentini, E. Grosso, B. Ghita, G. Masala","doi":"10.1504/IJGUC.2019.10022144","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022144","url":null,"abstract":"The advancements in virtualisation and distributed computing have allowed the cloud paradigm to become very popular among users and resources. It allows companies to save costs on infrastructure and maintenance and to focus on the development of products. However, this fast-growing paradigm has brought along some concerns from users, such as the integrity and security of the data, particularly in environments where users rely entirely on providers to secure their data. This paper explores different techniques to fragment data on the cloud and prevent direct unauthorised access to the data. It explores their performance on a cloud instance, where the total time to perform the operation, including the upload and download of the data, is considered. Results from this experiment indicate that fragmentation algorithms show better performance compared to encryption. Moreover, when combining encryption with fragmentation, there is an increase in the security, with the trade-off of the performance.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022143
Philip T. Moore, H. Pham
Healthcare provision faces many demand and resource challenges. Addressing these challenges requires effective patient management which may be achieved using autonomic health monitoring systems. However, such monitoring has been limited to 'smart-homes'; we propose extending the 'smart-home' to a wider 'smart-environment' which conflates 'smart-homes' with the 'smart-city' (in an interconnected environment) based on the fog computing paradigm. We introduce our low latency fog computing model which is designed to enable 'real-time' patient monitoring with situational awareness, pervasive consciousness, and related data analytic solutions. Illustrative scenarios are presented along with a 'real-world' example of a proposed 'smart-environment'. Context-awareness and decision support are considered with a proposed implementation strategy and a 'real-world' case study in the healthcare domain. While the proposed fog model and implementation strategy is predicated on healthcare domain, the proposed fog computing model will generalise to other medical conditions and domains of interest.
{"title":"A fog computing model for pervasive connected healthcare in smart environments","authors":"Philip T. Moore, H. Pham","doi":"10.1504/IJGUC.2019.10022143","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022143","url":null,"abstract":"Healthcare provision faces many demand and resource challenges. Addressing these challenges requires effective patient management which may be achieved using autonomic health monitoring systems. However, such monitoring has been limited to 'smart-homes'; we propose extending the 'smart-home' to a wider 'smart-environment' which conflates 'smart-homes' with the 'smart-city' (in an interconnected environment) based on the fog computing paradigm. We introduce our low latency fog computing model which is designed to enable 'real-time' patient monitoring with situational awareness, pervasive consciousness, and related data analytic solutions. Illustrative scenarios are presented along with a 'real-world' example of a proposed 'smart-environment'. Context-awareness and decision support are considered with a proposed implementation strategy and a 'real-world' case study in the healthcare domain. While the proposed fog model and implementation strategy is predicated on healthcare domain, the proposed fog computing model will generalise to other medical conditions and domains of interest.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022135
Roberta Calegari, E. Denti, S. Mariani, Andrea Omicini
The widespread diffusion of low-cost computing devices, along with improvements of cloud computing platforms, is paving the way towards a whole new set of opportunities for Internet of Things (IoT) applications and services. Varying degrees of intelligence are required for supporting adaptation and self-management: yet, they should be provided in a light-weight, easy to use and customisable highly-interoperable way. In this paper we explore Logic Programming as a Service (LPaaS) as a novel and promising re-interpretation of distributed logic programming in the IoT era. After introducing the reference context and motivating scenarios of LPaaS as an effective enabling technology for intelligent IoT, we define the LPaaS general architecture, and discuss two different prototype implementations - as a web service and as an agent in a multi-agent system (MAS), both built on top of the tuProlog system, which provides the required interoperability and customisation. We finally showcase the LPaaS potential through two case studies, designed as simple examples of the motivating scenarios.
{"title":"Logic programming as a service in multi-agent systems for the Internet of Things","authors":"Roberta Calegari, E. Denti, S. Mariani, Andrea Omicini","doi":"10.1504/IJGUC.2019.10022135","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022135","url":null,"abstract":"The widespread diffusion of low-cost computing devices, along with improvements of cloud computing platforms, is paving the way towards a whole new set of opportunities for Internet of Things (IoT) applications and services. Varying degrees of intelligence are required for supporting adaptation and self-management: yet, they should be provided in a light-weight, easy to use and customisable highly-interoperable way. In this paper we explore Logic Programming as a Service (LPaaS) as a novel and promising re-interpretation of distributed logic programming in the IoT era. After introducing the reference context and motivating scenarios of LPaaS as an effective enabling technology for intelligent IoT, we define the LPaaS general architecture, and discuss two different prototype implementations - as a web service and as an agent in a multi-agent system (MAS), both built on top of the tuProlog system, which provides the required interoperability and customisation. We finally showcase the LPaaS potential through two case studies, designed as simple examples of the motivating scenarios.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115781966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022124
C. Kondapalli, Srikanth Khanna, V. Chandrasekaran, P. K. Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra
Super-resolution (SR) is the method of obtaining high-resolution (HR) images or image sequences from one or more low-resolution (LR) images of a scene. Huang et al. in 2015 proposed a transformed self-exemplar internal database technique which takes advantage of fractal nature in an image by expanding patch search space using geometric variations. This method fails if there is no patch redundancy within and across image scales and also if there is a failure in detecting vanishing points (VP) which are used to determine perspective transformation between LR image and its sub-sampled form. In this paper, we expand the patch search space by taking advantage of temporal dimension of image frames in the scene video and also use an efficient vanishing point (VP) detection technique by Lezama et al. in 2014 and are thereby able to successfully super-resolve even the failure cases of Huang et al. and an overall improvement in PSNR. We also focused on reducing the computation time by exploiting the embarrassingly parallel nature of the algorithm. We achieved a speedup of six on multi-core, up to 11 on GPU, around 16 on hybrid platform of multi-core and GPU by parallelising the proposed algorithm. Using our hybrid implementation, we achieved 32x super-resolution factor in limited time.
{"title":"GPU accelerated video super resolution using transformed spatio-temporal exemplars","authors":"C. Kondapalli, Srikanth Khanna, V. Chandrasekaran, P. K. Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra","doi":"10.1504/IJGUC.2019.10022124","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022124","url":null,"abstract":"Super-resolution (SR) is the method of obtaining high-resolution (HR) images or image sequences from one or more low-resolution (LR) images of a scene. Huang et al. in 2015 proposed a transformed self-exemplar internal database technique which takes advantage of fractal nature in an image by expanding patch search space using geometric variations. This method fails if there is no patch redundancy within and across image scales and also if there is a failure in detecting vanishing points (VP) which are used to determine perspective transformation between LR image and its sub-sampled form. In this paper, we expand the patch search space by taking advantage of temporal dimension of image frames in the scene video and also use an efficient vanishing point (VP) detection technique by Lezama et al. in 2014 and are thereby able to successfully super-resolve even the failure cases of Huang et al. and an overall improvement in PSNR. We also focused on reducing the computation time by exploiting the embarrassingly parallel nature of the algorithm. We achieved a speedup of six on multi-core, up to 11 on GPU, around 16 on hybrid platform of multi-core and GPU by parallelising the proposed algorithm. Using our hybrid implementation, we achieved 32x super-resolution factor in limited time.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022146
Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry
Software defined network (SDN) is an emerging technology that decouples the control plane from data plane in its network architecture. This architecture exposes new threats that are absent in the traditional IP network. The man at the end attack (MATE) is one of the serious attacks against SDN controller. The MATE attacker does his/her malicious activities by exploiting the nature of messages between the controller and switches which are involved in requests and replies. This paper proposes a new detection method for MATE attack. We also used the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) model in the classification of a four-dimensional model to determine which attacks can be considered as MATE. Furthermore, we determine the behaviour of MATE attacker in SDN after control has been taken from the controller to help in the detection and prevention of the MATE attack.
软件定义网络(SDN)是一种新兴的技术,它在网络架构上将控制平面和数据平面解耦。这种架构暴露了传统IP网络中不存在的新威胁。终端人攻击(man at The end attack, MATE)是针对SDN控制器的严重攻击之一。MATE攻击者通过利用控制器和交换机之间涉及请求和应答的消息的性质来进行恶意活动。本文提出了一种新的MATE攻击检测方法。我们还在四维模型的分类中使用了欺骗、篡改、拒绝、信息披露、拒绝服务和特权提升(STRIDE)模型来确定哪些攻击可以被认为是MATE。此外,我们确定了从控制器获得控制后SDN中MATE攻击者的行为,以帮助检测和预防MATE攻击。
{"title":"The analysis of man at the end attack behaviour in software defined network","authors":"Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry","doi":"10.1504/IJGUC.2019.10022146","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022146","url":null,"abstract":"Software defined network (SDN) is an emerging technology that decouples the control plane from data plane in its network architecture. This architecture exposes new threats that are absent in the traditional IP network. The man at the end attack (MATE) is one of the serious attacks against SDN controller. The MATE attacker does his/her malicious activities by exploiting the nature of messages between the controller and switches which are involved in requests and replies. This paper proposes a new detection method for MATE attack. We also used the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) model in the classification of a four-dimensional model to determine which attacks can be considered as MATE. Furthermore, we determine the behaviour of MATE attacker in SDN after control has been taken from the controller to help in the detection and prevention of the MATE attack.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126648464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022145
O. Datskova, W. Shi
Large tasks running on grids and clouds have introduced a need for stability guarantees from geographically spanning resources, where failures are handled pre-emptively. Detecting performance inefficiencies in such cases is difficult. While individual services implement fault-tolerance, the behaviour of interacting failures within tightly-coupled systems is less understood. This paper describes an approach to modelling performance of production tasks running within the ALICE grid. We provide an overview of the ALICE data and software workflow for production jobs. Event states are then constructed, based on data centre job, computing, storage and user behaviour. We then address the question of analysing failures within the context of operational instabilities, occurring in production grid environments. The results demonstrate that operational issues can be detected and described according to the principle service layers involved. This can guide users, central and data centre experts to take action in advance of service failure effects.
{"title":"Large-scale data processing software and performance instabilities within HEP grid environments","authors":"O. Datskova, W. Shi","doi":"10.1504/IJGUC.2019.10022145","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022145","url":null,"abstract":"Large tasks running on grids and clouds have introduced a need for stability guarantees from geographically spanning resources, where failures are handled pre-emptively. Detecting performance inefficiencies in such cases is difficult. While individual services implement fault-tolerance, the behaviour of interacting failures within tightly-coupled systems is less understood. This paper describes an approach to modelling performance of production tasks running within the ALICE grid. We provide an overview of the ALICE data and software workflow for production jobs. Event states are then constructed, based on data centre job, computing, storage and user behaviour. We then address the question of analysing failures within the context of operational instabilities, occurring in production grid environments. The results demonstrate that operational issues can be detected and described according to the principle service layers involved. This can guide users, central and data centre experts to take action in advance of service failure effects.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-25DOI: 10.1504/IJGUC.2019.10022127
Anita Choudhary, M. C. Govil, Girdhari Singh, L. Awasthi, E. Pilli
In cloud environments, the overload leads to performance degradation and Service Level Agreement (SLA) violation while underload results in inefficient utilisation of resources and needless energy consumption. Dynamic Virtual Machine (VM) consolidation is considered as an effective solution to deal with both overload and underload problems. However, dynamic VM consolidation is not a trivial solution as it can also lead to violation of negotiated SLA due to runtime overheads in VM migration. Further, dynamic VM consolidation approaches need to answer many questions such as (i) when to migrate a VM? (ii) which VM is to be migrated? and (iii) where to migrate the selected VM? In this work, efforts are made to develop a comprehensive approach to achieve better solution to above discussed problems. In the proposed approach, future forecasting methods for host overload detection are explored; a fuzzy logic based VM selection approach that enhances the performance of VM selection strategy is developed; and a VM placement algorithm based on destination CPU utilisation is also developed. The performance evaluation of the proposed approaches is carried out on CloudSim toolkit using PlanetLab data set. The simulation results have exhibited significant improvement in the number of VM migrations, energy consumption, and SLA violations.
{"title":"Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation","authors":"Anita Choudhary, M. C. Govil, Girdhari Singh, L. Awasthi, E. Pilli","doi":"10.1504/IJGUC.2019.10022127","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022127","url":null,"abstract":"In cloud environments, the overload leads to performance degradation and Service Level Agreement (SLA) violation while underload results in inefficient utilisation of resources and needless energy consumption. Dynamic Virtual Machine (VM) consolidation is considered as an effective solution to deal with both overload and underload problems. However, dynamic VM consolidation is not a trivial solution as it can also lead to violation of negotiated SLA due to runtime overheads in VM migration. Further, dynamic VM consolidation approaches need to answer many questions such as (i) when to migrate a VM? (ii) which VM is to be migrated? and (iii) where to migrate the selected VM? In this work, efforts are made to develop a comprehensive approach to achieve better solution to above discussed problems. In the proposed approach, future forecasting methods for host overload detection are explored; a fuzzy logic based VM selection approach that enhances the performance of VM selection strategy is developed; and a VM placement algorithm based on destination CPU utilisation is also developed. The performance evaluation of the proposed approaches is carried out on CloudSim toolkit using PlanetLab data set. The simulation results have exhibited significant improvement in the number of VM migrations, energy consumption, and SLA violations.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}