• Title/Summary/Keyword: Cloud Computing Architecture

Search Result 189, Processing Time 0.023 seconds

Software Architecture of the Grid for implementing the Cloud Computing of the High Availability (고가용성 클라우드 컴퓨팅 구축을 위한 그리드 소프트웨어 아키텍처)

  • Lee, Byoung-Yup;Park, Jun-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.19-29
    • /
    • 2012
  • Currently, cloud computing technology is being supplied in various service forms and it is becoming a ground breaking service which provides usage of storage service, data and software while user is not involved in technical background such as physical location of service or system environment. cloud computing technology has advantages that it can use easily as many IT resources as it wants freely regardless of hardware issues required by a variety of systems and service level required by infrastructure. Also, since it has a strength that it can choose usage of resource about business model due to various internet-based technologies, provisioning technology and virtualization technology are being paid attention as main technologies. These technologies are ones of important technology elements which help web-based users approach freely and install according to user environment. Therefore, this thesis introduces software-related technologies and architectures in an aspect of grid for building up high availability cloud computing environment by analysis about cloud computing technology trend.

Deep Learning-Based Dynamic Scheduling with Multi-Agents Supporting Scalability in Edge Computing Environments (멀티 에이전트 에지 컴퓨팅 환경에서 확장성을 지원하는 딥러닝 기반 동적 스케줄링)

  • JongBeom Lim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.399-406
    • /
    • 2023
  • Cloud computing has been evolved to support edge computing architecture that combines fog management layer with edge servers. The main reason why it is received much attention is low communication latency for real-time IoT applications. At the same time, various cloud task scheduling techniques based on artificial intelligence have been proposed. Artificial intelligence-based cloud task scheduling techniques show better performance in comparison to existing methods, but it has relatively high scheduling time. In this paper, we propose a deep learning-based dynamic scheduling with multi-agents supporting scalability in edge computing environments. The proposed method shows low scheduling time than previous artificial intelligence-based scheduling techniques. To show the effectiveness of the proposed method, we compare the performance between previous and proposed methods in a scalable experimental environment. The results show that our method supports real-time IoT applications with low scheduling time, and shows better performance in terms of the number of completed cloud tasks in a scalable experimental environment.

A Specification and Exchange Method for Supporting SLA in SaaS Environment (SaaS 환경에서 SLA 보장을 위한 명세 및 교환 방법)

  • Nam, Taewoo;Kang, Taejun;Jang, Moonsoo;An, Youngmin;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.26 no.2
    • /
    • pp.45-52
    • /
    • 2013
  • A cloud computing service provider must assure Service Level Agreement (SLA) to provide reliable and consistent quality of service to a user. The SLA is a contract between the user and the service provider that connects to assure constant level such as availability to target provided service. The cloud computing is classified into IaaS, PaaS, and SaaS according to IT resources of the various cloud service. The existing SLA is difficult to reflect quality factors of service because it only considers factors about the physical Network environment. In this paper, we suggest the UDDI-based interchange process with the architecture and the specification language having a XML schema for the SLA specification. The quality requirements of SaaS are defined by a proposed specification language in the cloud environment. It is stored in the repository of a quality specification and exchanged on during the service binding time based on the exchange architecture.

  • PDF

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

The Service-Oriented Metaphor Deciphered

  • Draheim, Dirk
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.4
    • /
    • pp.253-275
    • /
    • 2010
  • In this article we review the metaphor of service-oriented architecture for enterprise computing. In typical definitions service-oriented architecture appears as a single message and a consistent roadmap for building flexible software system landscapes. But it is not. Different communities have elaborated different SOA (service-oriented architecture) concepts to address different problem areas, i.e., enterprise application integration, business-to-business, business process management, and software productizing. If software architects and software managers are aware of these strands of SOA when talking about SOA in their projects they can avoid misunderstandings and detours better. This article contributes a clarification of the different strands of SOA concepts and technologies and their mutual dependencies and identifies particular SOA concepts as instances of more general software engineering principles.

GreenIoT Architecture for Internet of Things Applications

  • Ma, Yi-Wei;Chen, Jiann-Liang;Lee, Yung-Sheng;Chang, Hsin-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.444-461
    • /
    • 2016
  • A power-saving mechanism for smartphone devices is developed by analyzing the features of data that are received from Internet of Things (IoT) sensors devices to optimize the data processing policies. In the proposed GreenIoT architecture for power-saving in IoT, the power saving and feedback mechanism are implemented in the IoT middleware. When the GreenIoT application in the power-saving IoT architecture is launched, IoT devices collect the sensor data and send them to the middleware. After the scanning module in the IoT middleware has received the data, the data are analyzed by a feature evaluation module and a threshold analysis module. Based on the analytical results, the policy decision module processes the data in the device or in the cloud computing environment. The feedback mechanism then records the power consumed and, based on the history of these records, dynamically adjusts the threshold value to increase accuracy. Two smart living applications, a biomedical application and a smart building application, are proposed. Comparisons of data processed in the cloud computing environment show that the power-saving mechanism with IoT architecture reduces the power consumed by these applications by 24% and 9.2%.

Research on Cloud Computing-Based SME Informatization Platform Policy (정부의 클라우드 컴퓨팅 기반 중소기업 정보화 플랫폼 정책 연구)

  • Han, Hyun-Soo;Yang, Hee-Dong;Kim, Kiho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.117-128
    • /
    • 2014
  • In this paper, we proposed the necessary government policies for the SME's informatization as the computing environment evolves towards cloud computing. We started with the review of the current SME's computing environment and limitations of current policies, and then addressed the new roles, visions, and missions of the government for the SME informatization. Based upon these arguments, we proposed the mid-term vision and designed the architecture for the cloud computing-based services for SMEs. The major contribution of this paper is to extend the enterprise-based informatization strategies to the context of the government policies so that the government can adopt our arguments as guidelines for the future policies.

A Design of Measuring impact of Distance between a mobile device and Cloudlet (모바일 장치와 클라우드 사이 거리의 영향 측정에 대한 연구)

  • Eric, Niyonsaba;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.232-235
    • /
    • 2015
  • In recent years, mobile devices are equipped with functionalities comparable to those computers. However, mobile devices have limited resources due to constraints, such as low processing power, limited memory, unpredictable connectivity, and limited battery life. To enhance the capacity of mobile devices, an interesting idea is to use cloud computing and virtualization techniques to shift the workload from mobile devices to a computational infrastructure. Those techniques consist of migrating resource-intensive computations from a mobile device to the resource-rich cloud, or server (called nearby infrastructure). In order to achieve their goals, researchers designed mobile cloud applications models (examples: CloneCloud, Cloudlet, and Weblet). In this paper, we want to highlight on cloudlet architecture (nearby infrastructure with mobile device), its methodology and discuss about the impact of distance between cloudlet and mobile device in our work design.

  • PDF

Data Processing Architecture for Cloud and Big Data Services in Terms of Cost Saving (비용절감 측면에서 클라우드, 빅데이터 서비스를 위한 대용량 데이터 처리 아키텍쳐)

  • Lee, Byoung-Yup;Park, Jae-Yeol;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.570-581
    • /
    • 2015
  • In recent years, many institutions predict that cloud services and big data will be popular IT trends in the near future. A number of leading IT vendors are focusing on practical solutions and services for cloud and big data. In addition, cloud has the advantage of unrestricted in selecting resources for business model based on a variety of internet-based technologies which is the reason that provisioning and virtualization technologies for active resource expansion has been attracting attention as a leading technology above all the other technologies. Big data took data prediction model to another level by providing the base for the analysis of unstructured data that could not have been analyzed in the past. Since what cloud services and big data have in common is the services and analysis based on mass amount of data, efficient operation and designing of mass data has become a critical issue from the early stage of development. Thus, in this paper, I would like to establish data processing architecture based on technological requirements of mass data for cloud and big data services. Particularly, I would like to introduce requirements that must be met in order for distributed file system to engage in cloud computing, and efficient compression technology requirements of mass data for big data and cloud computing in terms of cost-saving, as well as technological requirements of open-source-based system such as Hadoop eco system distributed file system and memory database that are available in cloud computing.