An API for Development of User-Defined Scheduling Algorithms in Aneka PaaS Cloud Software

Author(s):  
Rajinder Sandhu ◽  
Adel Nadjaran Toosi ◽  
Rajkumar Buyya

Cloud computing provides resources using multitenant architecture where infrastructure is created from one or more distributed datacenters. Scheduling of applications in cloud infrastructures is one of the main research area in cloud computing. Researchers have developed many scheduling algorithms and evaluated them using simulators such as CloudSim. Their performance needs to be validated in real-time cloud environments to improve their usefulness. Aneka is one of the prominent PaaS software which allows users to develop cloud application using various programming models and underline infrastructure. This chapter presents a scheduling API developed for the Aneka software platform. Users can develop their own scheduling algorithms using this API and integrate it with Aneka to test their scheduling algorithms in real cloud environments. The proposed API provides all the required functionalities to integrate and schedule private, public, or hybrid cloud with the Aneka software.

Author(s):  
Osama Harfoushi

Beside the increasing trend of cloud computing and mobile applications, the use of cloud based mobile learning applications is also mounting. Almost every e-commerce service provider offers cloud based mobile learning applications so that they can target more visitors and ultimately increase their sales. The usability of cloud based mobile applications is not only grounded in e-commerce platforms but it also ease out mobile learning processes. Most of the educational institutes are now offering cloud based mobile applications so their students can navigate to their knowledge portal more easily and download relevant material or submit assignments respectively. The main research area of this article is to explore how cloud based mobile learning applications can be utilized more effectively and what impact they imply on its users. Also, this research compares the mobile learning methods versus traditional learning methods. The study is evidence from Jordan and the major part of the research will be carried out through surveying literature, reports, content, and national and international databases in order to critically discuss the interactions between clouds based mobile learning application and user experiences. Published researches, published reports, books and articles has been included in the review.  Review of literature shows that mobile cloud computing is rising in Jordan and have significant impact on mobile learning of Jordanian students. Further, M-learning indeed an innovative tool for learning and it helps the users in many ways. In traditional learning, students used to spend their money on books and other written content. Findings of this study are helpful for the educational institution so they will come to know about user experiences of utilizing these cloud based mobile applications.


2012 ◽  
Vol 9 (3) ◽  
pp. 67-83 ◽  
Author(s):  
Stephen S. Yau ◽  
Ho G. An ◽  
Arun Balaji Buduru

In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitive data from unauthorized access by all entities, including service providers. The proposed approach ensures that users’ sensitive data can be protected from their service providers even if the users do not have full cooperation from their service providers.


Author(s):  
Dinkan Patel ◽  
Anjuman Ranavadiya

Cloud Computing is a type of Internet model that enables convenient, on-demand resources that can be used rapidly and with minimum effort. Cloud Computing can be IaaS, PaaS or SaaS. Scheduling of these tasks is important so that resources can be utilized efficiently with minimum time which in turn gives better performance. Real time tasks require dynamic scheduling as tasks cannot be known in advance as in static scheduling approach. There are different task scheduling algorithms that can be utilized to increase the performance in real time and performing these on virtual machines can prove to be useful. Here a review of various task scheduling algorithms is done which can be used to perform the task and allocate resources so that performance can be increased.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.


2021 ◽  
Vol 4 (1) ◽  
pp. 39-47
Author(s):  
Farshad Rezaei ◽  
◽  
Shamsollah Ghanbari

Cloud computing is a new technology recently being developed seriously. Scheduling is an essential issue in the area of cloud computing. There is an extensive literature concerning scheduling in the area of distributed systems. Some of them are applicable for cloud computing. Traditional scheduling methods are unable to provide scheduling in cloud environments. According to a simple classification, scheduling algorithms in the cloud environment are divided into two main groups: batch mode and online heuristics scheduling. This paper focuses on the trust of cloud-based scheduling algorithms. According to the literature, the existing algorithm examinee latest algorithm is related to an algorithm trying to optimize scheduling using the Trust method. The existing algorithm has some drawbacks, including the additional overhead and inaccessibility to the past transaction data. This paper is an improvement of the trust-based algorithm to reduce the drawbacks of the existing algorithms. Experimental results indicate that the proposed method can execute better than the previous method. The efficiency of this method depends on the number of nods and tasks. The more trust in the number of nods and tasks, the more the performance improves when the time cost increases


2014 ◽  
Vol 513-517 ◽  
pp. 1332-1336 ◽  
Author(s):  
Ying Yidu Xiong ◽  
Yan Yan Wu

Resource schedule Strategy is the core technology of cloud computing. PSO algorithm is one of dynamic adaptation resource scheduling algorithms to cloud computing. The virtual machines and the hosts can be scheduled reasonable by adjusting parameters. The resource can be scheduled quickly because of the dynamic trend calculation of PSO algorithm, to ensure real-time of the Cloud Calculation.


Author(s):  
Nane Kratzke

This paper presents a review of cloud application architectures and its evolution. It reports observations being made during the course of a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect we learned a lot about commonalities and differences from plenty of different cloud applications which might be of value for cloud software engineers and architects. Throughout the course of the research project we analyzed industrial cloud standards, performed systematic mapping studies of cloud-native application related research papers, performed action research activities in cloud engineering projects, modeled a cloud application reference model, and performed software and domain specific language engineering activities. Two major (and sometimes overlooked) trends can be identified. First, cloud computing and its related application architecture evolution can be seen as a steady process to optimize resource utilization in cloud computing. Second, this resource utilization improvements resulted over time in an architectural evolution how cloud applications are being build and deployed. A shift from monolithic servce-oriented architectures (SOA), via independently deployable microservices towards so called serverless architectures is observable. Especially serverless architectures are more decentralized and distributed, and make more intentional use of independently provided services. In other words, a decentralizing trend in cloud application architectures is observable that emphasizes decentralized architectures known from former peer-to-peer based approaches. That is astonishing because with the rise of cloud computing (and its centralized service provisioning concept) the research interest in peer-to-peer based approaches (and its decentralizing philosophy) decreased. But this seems to change. Cloud computing could head into future of more decentralized and more meshed services.


2020 ◽  
Vol 3 (4) ◽  
pp. 47-59
Author(s):  
Ahmed A. Hamed ◽  
Rabah A. Ahmed

The importance of hybrid cloud computing has become a reality in recent years for large and medium enterprises and even at the individual level, which increases the need for many improvements in its availability level. One of the most important things that affects availability is the task scheduling process. Task scheduling is subject to many scheduling algorithms and these algorithms differ in terms of performance and purpose, the most important aspects being improved by using an appropriate scheduling algorithm is the total execution time(makespane) and also the success rate and downtime live migration. Because working on a cloud computing environment is costly and complex, we have simulated a hybrid cloud environment using reliable and accurate simulation and used Directed acyclic graph(DAG) as a workflow application. In this paper we will compare scheduling and planning algorithms for cloud computing environment by implementing a framework using (workflowsim) based on (cloudsim) simulator in order to choose the best algorithm to verify the possibility of improving availability.


Sign in / Sign up

Export Citation Format

Share Document