scholarly journals Optimized Mechanism for Resource Sharing in Cloud

The cloud computing paradigm has settled to a stable stage. Due to its enormous advantages, services based on cloud computing are getting more and more attraction and adoption by diversified sectors of society. Because of its pay per use model, people prefer to execute various data crunching operations on high end virtual machines. Optimized resource management however becomes critical in such scenarios. Poor management of cloud resources may affect not only customer satisfaction but also wastage of available cloud infrastructure. An optimized resource sharing mechanism for collaborated cloud computing environments is suggested here. The suggested resource sharing technique solves starvation issue in inter cloud load balancing context. In case of occurrence of starvation problem, the suggested technique resolves the issue by switching under loaded and overloaded virtual machines between intra cloud and inter cloud computing environment.

Author(s):  
I. P. Oladoja ◽  
O. S. Adewale ◽  
S. A. Oluwadare ◽  
E. O. Oyekanmi

Cloud computing environments provide an apparition of infinite computing resources to cloud users so that they can increase or decrease resource consumption rate according to their demands. In the Cloud, computing resources need to be allocated and scheduled in a way that providers can achieve high resource utilization and users can meet their applications’ performance requirements with minimum expenditure. Due to these different intentions, there is the need to develop a scheduling algorithm to outperform appropriate allocation of tasks on resources. The paper focuses on the resource optimization using a threshold-based tournament selection probability for virtual machines used in the execution of tasks. The proposed approach was designed to create metatask and the proposed algorithm used was Median-Based improved Max-Min algorithm. The experimental results showed that the algorithm had better performance in terms of makespan, utilization of resources and throughput. The load balance of tasks was also fairly distributed on the two datacenters.


2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.


Author(s):  
Hassan Takabi ◽  
James B.D. Joshi ◽  
Gail-Joon Ahn

Cloud computing paradigm has recently gained tremendous momentum. It has been found very promising for significant cost reduction and the increased operating efficiencies in computing. However, security and privacy issues pose as the key roadblock to its rapid adoption. In this chapter, the authors present the security and privacy challenges in Cloud computing environments and discuss how they are related to various delivery and deployment models, and are exacerbated by the unique aspects of Clouds. The authors also propose a comprehensive security framework for Cloud computing environments and discuss various approaches to address the challenges, existing solutions and future work needed to provide a trustworthy Cloud computing environment.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


2013 ◽  
pp. 814-834
Author(s):  
Hassan Takabi ◽  
James B.D. Joshi

Cloud computing paradigm is still an evolving paradigm but has recently gained tremendous momentum due to its potential for significant cost reduction and increased operating efficiencies in computing. However, its unique aspects exacerbate security and privacy challenges that pose as the key roadblock to its fast adoption. Cloud computing has already become very popular, and practitioners need to provide security mechanisms to ensure its secure adoption. In this chapter, the authors discuss access control systems and policy management in cloud computing environments. The cloud computing environments may not allow use of a single access control system, single policy language, or single management tool for the various cloud services that it offers. Currently, users must use diverse access control solutions available for each cloud service provider to secure data. Access control policies may be composed in incompatible ways because of diverse policy languages that are maintained separately at every cloud provider. Heterogeneity and distribution of these policies pose problems in managing access policy rules for a cloud environment. In this chapter, the authors discuss challenges of policy management and introduce a cloud based policy management framework that is designed to give users a unified control point for managing access policies to control access to their resources no matter where they are stored.


2018 ◽  
pp. 951-963 ◽  
Author(s):  
Samer Alhawari ◽  
Mufleh Amin AL Jarrah ◽  
Wa'el Hadi

With the significant advances in Information and Communications Technology (ICT) over the last half a century, the Cloud computing paradigm is one of the most discussed topics in the field of ICT today. Additionally, Cloud computing has a critical role in today's business world. Without risk management processes embedded into innovative technology that supports Cloud computing, businesses are setting themselves up for a fall. Hence, in this paper, the authors propose a conceptual model of implementing risk management processes into a Cloud computing environment. It highlights the different processes of risk management (risk identification, risk analysis, risk planning, risk execution, and risk monitoring) and how their existence can affect the Cloud environment to ensure proper protection of data and information in order to ensure Cloud networks and connections are secure.


Author(s):  
Punit Gupta ◽  
Ravi Shankar Jha

With increase of information sharing over the internet or intranet, we require techniques to increase the availability of shared resource over large number of users trying to access the resources at the same time. Many techniques are being proposed to make access easy and more secure in distributed environment. Information retrieval plays an important to serve the most reliant data in least waiting, this chapter discuses all such techniques for information retrieval and sharing over the cloud infrastructure. Cloud Computing services provide better performance in terms of resource sharing and resource access with high reliability and scalability under high load.


2012 ◽  
Vol 2 (3) ◽  
pp. 86-97
Author(s):  
Veena Goswami ◽  
Sudhansu Shekhar Patra ◽  
G. B. Mund

Cloud computing is a new computing paradigm in which information and computing services can be accessed from a Web browser by clients. Understanding of the characteristics of computer service performance has become critical for service applications in cloud computing. For the commercial success of this new computing paradigm, the ability to deliver guaranteed Quality of Services (QoS) is crucial. Based on the Service level agreement, the requests are processed in the cloud centers in different modes. This paper analyzes a finite-buffer multi-server queuing system where client requests have two arrival modes. It is assumed that each arrival mode is serviced by one or more Virtual machines, and both the modes have equal probabilities of receiving service. Various performance measures are obtained and optimal cost policy is presented with numerical results. The genetic algorithm is employed to search the optimal values of various parameters for the system.


2019 ◽  
Vol 11 (3) ◽  
pp. 69 ◽  
Author(s):  
Aris Leivadeas ◽  
George Kesidis ◽  
Mohamed Ibnkahla ◽  
Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.


Sign in / Sign up

Export Citation Format

Share Document