scholarly journals Energy Efficient Resource Allocation in Cloud Computing

Cloud service provider in cloud environment will provide or provision resource based on demand from the user. The cloud service provider (CSP) will provide resources as and when required or demanded by the user for execution of the job on the cloud environment. The CSP will perform this in a static and dynamic manner. The CSP should also consider various other factors in order to provide the resources to the user, the prime among that will be the Service Level Agreement (SLA), which is normally signed by the user and cloud service provider during the inception phase of service. There are many algorithm which are used in order to allocate resources to the user in cloud environment. The algorithm which is proposed will be used to reduce the amount of energy utilized in performing various job execution in cloud environment. Here the energy utilized for execution of various jobs are taken into account by increasing the number of virtual machines that are used on a single physical host system. There is no thumb rule to calculate the number of virtual machines to be executed on a single host. The same can be derived by calculating the amount of space, speed required along with the time to execute the job on a virtual machine. Based up on this we can derive the number of Virtual machine on a single host system. There can be 10 virtual machines on a single system or even 20 number of virtual machines on single physical system. But if the same is calculated by the equation then the result will be exactly matching with the threshold capacity of the physical system[1]. If more number of physical systems are used to execute fewer virtual machines on each then the amount of energy consumed will be very high. So in order to reduce the energy consumption , the algorithm can be used will not only will help to calculate the number of virtual machines on single physical system , but also will help to reduce the energy as less number of physical systems will be in need[2].

Author(s):  
Trinathbasu Miriyala ◽  
JKR Sastry

<p><span lang="EN-US">Cloud computing technologies are being used by many who need computing resources such as software, platform and infrastructure as per their business requirements in terms of provisioning and pay for the usage as per actual consumption of the services based on the SLA signed by the user and cloud service provider. Software running on a physical machine is being provided as services to the end users. For the reasons of cost economies access to software that uses a database is being provided to multiple users. The access to the software is provided either directly or through a virtual machine. The software being provided as service uses the same database for many of the users who have requisitioned for the same. As a result, there could be encroachments by the users into the data of others. There is a need to secure the data belonging to several users while all of them access the data using the same application. In this paper an efficient method is presented for securing the data processed by software which is offered as a service to multiple users either directly or through virtual machines.    </span></p>


In today's era, cloud computing is very popular and the most widly used technique to store the data. As we know more than 75% of the data that is used in internet services and applications is being stored on the maximum cloud only. Where our data is stored in the cloud, it is called data center, there are two important roles in cloud computing technology, one is cloud customer and the other is cloud service provider. The complete control and monitoring at the public data center is of the service provider itself, the user is kept away from the information of the location of the data center and its access credentials. This means that the user has absolutely no information about the virtual machine hard disk, and their access locations. Whenever any forensic inquiry comes in the cloud environment, the Investigator and forensic expert first have to find out about the virtual machine disk and its location in the cloud, which is a very challenging and difficult task in the cloud environment. In this paper we have developed a new process that detects virtual machines using data hiding techniques. To prove this new algorithm, we have performed an experiment using Oracle VirtualBox 6.0 on OpenSUSE virtual machine.


Author(s):  
Sovban Nisar ◽  
Deepika Arora

A structural design in which virtual machines are implicated and connect to the cloud service provider is called cloud computing. On the behalf of the users, the virtual machines connect to the cloud service provider. The uncertainties overload the virtual machines. The genetic algorithm is implemented for the migration of virtual machine in the earlier study. The genetic algorithm is low depicts latency within the network is high at the time of virtual machine migration. The genetic algorithm is implemented for virtual machine migration in this study. The proposed algorithm is applied in MATLAB in this work. The obtained results are compared with the results of earlier algorithm. Various parameters like latency, bandwidth consumption, and space utilization are used to analyze the achieved results.


2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


2019 ◽  
Vol 8 (3) ◽  
pp. 1457-1462

Cloud computing technology has gained the attention of researchers in recent years. Almost every application is using cloud computing in one way or another. Virtualization allows running many virtual machines on a single physical computer by sharing its resources. Users can store their data on datacenter and run their applications from anywhere using the internet and pay as per service level agreement documents accordingly. It leads to an increase in demand for cloud services and may decrease the quality of service. This paper presents a priority-based selection of virtual machines by cloud service provider. The virtual machines in the cloud datacenter are configured as Amazon EC2 and algorithm is simulated in cloud-sim simulator. The results justify that proposed priority-based virtual machine algorithm shortens the makespan, by 11.43 % and 5.81 %, average waiting time by 28.80 % and 24.50%, and cost of using the virtual machine by 21.24% and 11.54% as compared to FCFS and ACO respectively, hence improving quality of service.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Virtual Machine Image (VMI) is the building block of cloud infrastructure. It encapsulates the various applications and data deployed at the Cloud Service Provider (CSP) end. With the leading advances of cloud computing, comes the added concern of its security. Securing the Cloud infrastructure as a whole is based on the security of the underlying Virtual Machine Images (VMI). In this paper an attempt has been made to highlight the various risks faced by the CSP and Cloud Service Consumer (CSC) in the context of VMI related operations. Later, in this article a formal model of the cloud infrastructure has been proposed. Finally, the Ethereum blockchain has been incorporated to secure, track and manage all the vital operations of the VMIs. The immutable and decentralized nature of blockchain not only makes the proposed scheme more reliable but guarantees auditability of the system by maintaining the entire VMI history in the blockchain.


Author(s):  
Suneeta Mohanty ◽  
Prasant Kumar Pattnaik ◽  
G. B. Mund

<p>Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as the winner by the auctioneer (Cloud Service Provider) to gain more. In this auction mechanism, individual bid values are revealed to the auctioneer in order to select the winner as a result of which privacy of bid values are lost. In this paper, we proposed an auction scheme to select the winner without revealing the individual bid values to the auctioneer to maintain privacy of bid values. The winner will get the access to the bundle of VM instances. This  scheme relies on a set of cryptographic protocols including Oblivious Transfer (OT) protocol and Yao’s protocol to maintain privacy of bid values.</p>


2021 ◽  
Vol 8 (7) ◽  
pp. 7-13
Author(s):  
Badr Almutairi ◽  

As workloads increase in the industry so does the requirement for IT resources. IT companies are now shifting from in-house data centers to cloud-based IT services such as IAAS, PAAS, and SAAS which can offer flexibility at different levels to the developers of the applications working on different projects. Lots of researchers have contributed to migrating virtual machines migration from one cloud service provider to the other in case of backup as a service and other related services. Some of the previous works by some researchers focus on the migration of SAAS and PAAS onto different cloud service provider platforms. This research work focuses on the mitigation and migration of IAAS, PAAS, and SAAS services of the cloud. My contribution in this research will be in how to avoid loss of data during mitigation and migration of the VM from one Hypervisor environment to the other hypervisor environment on a physical machine infrastructure. This will help SME’s to provide end-user access to their data without worrying about the losses which may have incurred if the Mitigation process was not carried out carefully while migrating VM’s from one bare metal Hypervisor environment to the other bare metal Hypervisor environment.


Sign in / Sign up

Export Citation Format

Share Document