scholarly journals An Examination of Different Scheduling Algorithms in Cloud Computing

Rapid growth in the use of cloud base service comes up with so many challenges. Service providers of cloud base service looking for the best solution to these challenges. Users of service sends the request for a particular task so at a time number of request sends by different users for different task, this all task need to be complete in a particular time is one of the biggest challenges in cloud computing It is defined as a workflow scheduling. Parallel other key points are better utilization of resources, reduce make span time, energy-saving and many more consider as QoS parameters. Researchers conduct so many Qos parameter oriented research to make it efficient The Aim of this review paper is to provide systemic review and better understating of ongoing research on different approaches and service providers always looking for better solutions of challenges to maintain service level.

2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


2012 ◽  
pp. 185-202
Author(s):  
David Pym ◽  
Martin Sadler

Cloud computing ecosystems of service providers and consumers will become a significant part of the way information services are provided, allowing more agile coalitions, cost savings and improved service delivery. Existing approaches to information security do not readily extend to this complex multi-party world. The authors argue for a mathematical model-based framework for the analysis and management of information stewardship that makes explicit both the expectations and responsibilities of cloud stakeholders and the design assumptions of systems. Such a framework supports integrated economic, technology, and behavioural analyses, so providing a basis for a better understanding of the interplay between preferences, policies, system design, regulations, and Service Level Agreements. The authors suggest approaches to constructing economic, technology, and behavioural models and discuss the challenges in integrating them.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2021 ◽  
Author(s):  
Kashif Mehboob Khan ◽  
Junaid Arshad ◽  
Waheed Iqbal ◽  
Sidrah Abdullah ◽  
Hassan Zaib

AbstractCloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such as availability and response times. Service Level Agreements (SLAs) are a mechanism to communicate and enforce such guarantees typically represented as service level objectives (SLOs), and financial penalties are imposed on SLO violations. Due to delays and inaccuracies caused by manual processing, an automatic method to periodically verify SLA terms in a transparent and trustworthy manner is fundamental to effective SLA monitoring, leading to the acceptance and credibility of such service to the customers of cloud services. This paper presents a blockchain-based distributed infrastructure that leverages fundamental blockchain properties to achieve immutable and trustworthy SLA monitoring within cloud services. The paper carries out an in-depth empirical investigation for the scalability of the proposed system in order to address the challenge of transparently enforcing real-time monitoring of cloud-hosted services leveraging blockchain technology. This will enable all the stakeholders to enforce accurate execution of SLA without any imprecisions and delays by maintaining an immutable ledger publicly across blockchain network. The experimentation takes into consideration several attributes of blockchain which are critical in achieving optimum performance. The paper also investigates key characteristics of these factors and their impact to the behaviour of the system for further scaling it up under various cases for increased service utilization.


Author(s):  
David Pym ◽  
Martin Sadler

Cloud computing ecosystems of service providers and consumers will become a significant part of the way information services are provided, allowing more agile coalitions, cost savings and improved service delivery. Existing approaches to information security do not readily extend to this complex multi-party world. The authors argue for a mathematical model-based framework for the analysis and management of information stewardship that makes explicit both the expectations and responsibilities of cloud stakeholders and the design assumptions of systems. Such a framework supports integrated economic, technology, and behavioural analyses, so providing a basis for a better understanding of the interplay between preferences, policies, system design, regulations, and Service Level Agreements. The authors suggest approaches to constructing economic, technology, and behavioural models and discuss the challenges in integrating them.


Cloud computing or in other words, shared computing is a unique way of sharing resources via the Internet. It combines and extends features of parallel processing, grid computing, and distributed computing. Cloud Computing environments provide a competent way to schedule and process various jobs on remote machines. Rather than relying on local machines, Cloud users access services remotely via high-speed networks. Various users submitting jobs to be processed to Cloud would expect Quality of Service (QoS). So, currently, many researchers are proposing various heuristics that provide QoS to cloud users. The job scheduler is responsible for scheduling various jobs to its best-matched resource to achieve desired QoS. There are Service Level Agreements (SLAs) between Cloud Service Providers (CSPs) and Cloud users, which need to be followed by both the parties. Benefits would be affected in case of not complying with SLAs. In this paper various SLAs like Hard SLA, Best Effort SLA and Soft SLA are proposed. Jobs with required QoS parameters like Reliability, Execution Time and Priority are submitted to the scheduler. QoS of resources is determined by parameters like Reliability, Job Completion Time and the Cost of the resource. Schedulers then assign the Job to the best-matched resource according to specified SLA. Simulation is performed for First Fit and Best Fit heuristic approaches. Performances of both the heuristic approaches are evaluated with performance parameters like Average Resource Utilization (ARU), Success Rate of Jobs (SR) and Total Completion Time (TCT). This research work is useful for various organizations that provide various Cloud services to users who seek different levels of QoS for various applications.


Author(s):  
Sriperambuduri Vinay Kumar ◽  
◽  
M. Nagaratna ◽  

Cloud computing model has evolved to deliver resources on pay per use model to businesses, service providers and end-users. Workflow scheduling has become one of the research trends in cloud computing as many applications in scientific, business, and big data processing can be expressed in the form of a workflow. The scheduling aims to execute scientific or synthetic workloads on the cloud by utilizing the resources by meeting QoS requirements, makespan, energy and cost. There has been extensive research in this area to schedule workflow applications in a distributed environment, to execute background tasks in IoT applications, event-driven and web applications. This paper focuses on the comprehensive survey and classification of workflow scheduling algorithms designed for the cloud.


The Cloud Service which is provided generates access to the present resources by service level agreements (SLA) which is formal , and they require proper balanced infrastructures in order to maximize the quality of service (QoS). They try to minimize and provide offer to the count of violations that are offered by the Service Level Agreements. The paper emphasizes on a proper or area of risk assessment which is specific to the applications related to cloud computing. The methods which are present within a framework that is to be used by service providers related to cloud and consumers related service in order to provide assessment of risk in case of deployment of service and the related operation. The paper also puts emphasis on the different stages which are involved in the lifecycle of services where assessment of risk takes place. This leads in the design and implementation of risk models which are in correspondence. The risk puts an impact on the architectural components providing special emphasis on management which is holistic to provide support at operation of services has been described. The assessor which is related to risk has been proven to be effective by various evaluation provided through the experiments and its implementation which needs to be integrated in a toolkit environment provided by cloud computing


2020 ◽  
Vol 26 (6) ◽  
pp. 40-51
Author(s):  
Muhammad Faraz Manzoor ◽  
Adnan Abid ◽  
Muhammad Shoaib Farooq ◽  
Naeem A. Azam ◽  
Uzma Farooq

Cloud computing has become a very important computing model to process data and execute computationally concentrated applications in pay-per-use method. Resource allocation is a process in which the resources are allocated to consumers by cloud providers based on their flexible requirements. As the data is expanding every day, allocating resources efficiently according to the consumer demand has also become very important, keeping Service Level Agreement (SLA) between service providers and consumers in prospect. This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. In the light of the uniqueness of the models and techniques, the main aim of the resource allocation is to limit the overhead/expenses associated with it. This research aims to present a comprehensive, structured literature review on different aspects of resource allocation in cloud computing, including strategic, target resources, optimization, scheduling and power. More than 50 articles, between year 2007 and 2019, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and they are reviewed under clearly defined objectives. It presents a topical taxonomy of resource allocation dimensions, and articles under each category are discussed and analysed. Lastly, salient future directions in this area are discussed.


2019 ◽  
Vol 12 (3) ◽  
pp. 27
Author(s):  
Sara Moazzezi Eftekhar ◽  
Witold Suryn

In recent years, we have witnessed a marked rise in the number of cloud service providers with each offering a plethora of cloud services with different objectives. Gaining confidence for cloud technology adoption as well as selecting a suitable cloud service provider, both require a proper evaluation of cloud service trust characteristics. Hence, the evaluation of cloud services before used by the customer is of utmost importance. In this article, we adapt the extracted trust characteristics from both system and software quality standards and cloud computing standards, for evaluating cloud services. Moreover, we derive measures for each trust characteristics to evaluate the trustworthiness of different cloud service providers, and generalize these trust measures for any type of cloud services (e.g. Software as a Service, Platform as a Service, and Infrastructure as a Service). Our work thereby demonstrates a way to apply generalized trust measures for cloud services and therefore contributes to a better understanding of cloud services to evaluate their quality characteristics. As part of our ongoing research, the results of this study will be used to develop a comprehensive cloud trust model.


Sign in / Sign up

Export Citation Format

Share Document