DOI QR코드

DOI QR Code

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments

  • Lim, JongBeom (Dept. of Game & Multimedia Engineering, Korea Polytechnic University) ;
  • Yu, HeonChang (Dept. of Computer Science & Engineering, Korea University) ;
  • Gil, Joon-Min (School of Information Technology Engineering, Daegu Catholic University)
  • 투고 : 2018.08.31
  • 심사 : 2018.10.22
  • 발행 : 2018.12.31

초록

Recently, computational intelligence has received a lot of attention from researchers due to its potential applications to artificial intelligence. In computer science, computational intelligence refers to a machine's ability to learn how to compete various tasks, such as making observations or carrying out experiments. We adopted a computational intelligence solution to monitoring residual resources in cloud computing environments. The proposed residual resource monitoring scheme periodically monitors the cloud-based host machines, so that the post migration performance of a virtual machine is as consistent with the pre-migration performance as possible. To this end, we use a novel similarity measure to find the best target host to migrate a virtual machine to. The design of the proposed residual resource monitoring scheme helps maintain the quality of service and service level agreement during the migration. We carried out a number of experimental evaluations to demonstrate the effectiveness of the proposed residual resource monitoring scheme. Our results show that the proposed scheme intelligently measures the similarities between virtual machines in cloud computing environments without causing performance degradation, whilst preserving the quality of service and service level agreement.

키워드

E1JBB0_2018_v14n6_1480_f0001.png 이미지

Fig. 1. Performance degradation problem after virtual machine migration.

E1JBB0_2018_v14n6_1480_f0002.png 이미지

Fig. 2. The monitoring architecture in cloud computing environments.

E1JBB0_2018_v14n6_1480_f0003.png 이미지

Fig. 3. Relative performance indices of physical machines.

E1JBB0_2018_v14n6_1480_f0004.png 이미지

Fig. 4. Difference in the relative performance indices before versus after finding the target migration machine with the proposed scheme.

E1JBB0_2018_v14n6_1480_f0005.png 이미지

Fig. 5. The count used to select the target machine from the available nodes.

E1JBB0_2018_v14n6_1480_f0006.png 이미지

Fig. 6. Difference in the relative performance indices before versus after finding the target migration machine without the proposed scheme.

E1JBB0_2018_v14n6_1480_f0007.png 이미지

Fig. 7. Difference in the relative performance indices with versus without the proposed scheme.

E1JBB0_2018_v14n6_1480_f0008.png 이미지

Fig. 8. Service level agreement violation without the proposed scheme.

Table 1. Experimental settings

E1JBB0_2018_v14n6_1480_t0001.png 이미지

참고문헌

  1. C. Jatoth, G. R. Gangadharan, and R. Buyya, "Computational intelligence based QoS-aware web service composition: a systematic literature review," IEEE Transactions on Services Computing, vol. 10, no. 3, pp. 475-492, 2017. https://doi.org/10.1109/TSC.2015.2473840
  2. N. K. Gondhi and A. Gupta, "Survey on machine learning based scheduling in cloud computing," in Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, Hong Kong, China, 2017, pp. 57-61.
  3. D. Gabi, A. S. Ismail, A. Zainal, and Z. Zakaria, "Quality of service (QoS) task scheduling algorithm with Taguchi orthogonal approach for cloud computing environment," in Recent Trends in Information and Communication Technology. Cham: Springer, 2018, pp. 641-649.
  4. Z. H. Zhan, X. F. Liu, Y. J. Gong, J. Zhang, H. S. H. Chung, and Y. Li, "Cloud computing resource scheduling and a survey of its evolutionary approaches," ACM Computing Surveys, vol. 47, no. 4, article no. 63, 2015.
  5. P. Di Sanzo, A. Pellegrini, and D. R. Avresky, "Machine learning for achieving self-* properties and seamless execution of applications in the cloud," in Proceedings of 2015 IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Munich, Germany, 2015, pp. 51-58.
  6. A. N. Toosi, R. N. Calheiros, and R. Buyya, "Interconnected cloud computing environments: challenges, taxonomy, and survey," ACM Computing Surveys, vol. 47, no. 1, article no. 7, 2014.
  7. I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, "The rise of "big data" on cloud computing: review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015. https://doi.org/10.1016/j.is.2014.07.006
  8. M. Silva, M. R. Hines, D. Gallo, Q. Liu, K. D. Ryu, and D. Da Silva, "CloudBench: experiment automation for cloud environments," in Proceedings of 2013 IEEE International Conference on Cloud Engineering (IC2E), Redwood City, CA, 2013, pp. 302-311.
  9. N. Bessis, E. Asimakopoulou, T. French, P. Norrington, and F. Xhafa, "The big picture, from grids and clouds to crowds: a data collective computational intelligence case proposal for managing disasters," in Proceedings of 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan, 2010, pp. 351-356.
  10. G. Aceto, A. Botta, W. de Donato, and A. Pescape, "Cloud monitoring: a survey," Computer Networks, vol. 57, no. 9, pp. 2093-2115, 2013. https://doi.org/10.1016/j.comnet.2013.04.001
  11. M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "Monitoring insiders activities in cloud computing using rule based learning," in Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011, pp. 757-764.
  12. P. K. Sharma, J. H. Ryu, K. Y. Park, J. H. Park, and J. H. Park, "Li-Fi based on security cloud framework for future IT environment," Human-centric Computing and Information Sciences, vol. 8, article no. 23, 2018.
  13. W. Song, N. Feng, Y. Tian, S. Fong, and K. Cho, "a deep belief network for electricity utilisation feature analysis of air conditioners using a smart IoT platform," Journal of Information Processing Systems, vol. 14, no. 1, pp. 162-175, 2018. https://doi.org/10.3745/JIPS.04.0056
  14. M. R. Mesbahi, A. M. Rahmani, and M. Hosseinzadeh, "Reliability and high availability in cloud computing environments: a reference roadmap," Human-centric Computing and Information Sciences, vol. 8, article no. 20, 2018.
  15. A. Souri and R. Hosseini, "A state-of-the-art survey of malware detection approaches using data mining techniques," Human-centric Computing and Information Sciences, vol. 8, article no. 3, 2018.
  16. R. Zhang and X. Xiao, "Study of danger-theory-based intrusion detection technology in virtual machines of cloud computing environment," Journal of Information Processing Systems, vol. 14, no. 1, pp. 239-251, 2018. https://doi.org/10.3745/JIPS.03.0089
  17. S. B. Rathod and V. K. Reddy, "NDynamic framework for secure VM migration over cloud computing," Journal of Information Processing Systems, vol. 13, no. 3, pp. 476-490, 2018. https://doi.org/10.3745/JIPS.01.0015
  18. J. Shao, H. Wei, Q. Wang, and H. Mei, "A runtime model based monitoring approach for cloud," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 313-320.
  19. H. Huang and L. Wang, "P&P: a combined push-pull model for resource monitoring in cloud computing environment," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 260-267.
  20. M. Rak, S. Venticinque, T. Mahr, G. Echevarria, and G. Esnal, "Cloud application monitoring: the mOSAIC approach," in Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science, Athens, Greece, 2011, pp. 758-763.
  21. M. Andreolini, M. Colajanni, and M. Pietri, "A scalable architecture for real-time monitoring of large information systems," in Proceedings of 2012 Second Symposium on Network Cloud Computing and Applications, London, UK, 2012, pp. 143-150.
  22. G. Xiang, H. Jin, D. Zou, X. Zhang, S. Wen, and F. Zhao, "VMDriver: a driver-based monitoring mechanism for virtualization," in Proceedings of 2010 29th IEEE Symposium on Reliable Distributed Systems, New Delhi, India, 2010, pp. 72-81.
  23. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, & A. Warfield, "Xen and the art of virtualization," in Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, 2003, pp. 164-177.
  24. Y. Sandoval, G. Gallizo, and M. Curiel, "Evaluation of monitoring tools for cloud computing environments," in Proceedings of 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), Medellin, Colombia, 2012, pp. 1-10.
  25. B. Konig, J. M. Calero, and J. Kirschnick, "Elastic monitoring framework for cloud infrastructures," IET Communications, vol. 6, no. 10, pp. 1306-1315, 2012. https://doi.org/10.1049/iet-com.2011.0200
  26. T. Wang, J. Xu, W. Zhang, Z. Gu, and H. Zhong, "Self-adaptive cloud monitoring with online anomaly detection," Future Generation Computer Systems, vol. 80, pp. 89-101, 2018. https://doi.org/10.1016/j.future.2017.09.067
  27. G. N. Yannakakis and J. Togelius, "A panorama of artificial and computational intelligence in games," IEEE Transactions on Computational Intelligence and AI in Games, vol. 7, no. 4, pp. 317-335, 2015. https://doi.org/10.1109/TCIAIG.2014.2339221
  28. J. Lu, V. Behbood, P. Hao, H. Zuo, S. Xue, and G. Zhang, "Transfer learning using computational intelligence: a survey," Knowledge-Based Systems, vol. 80, pp. 14-23, 2015. https://doi.org/10.1016/j.knosys.2015.01.010
  29. J. A. Khan, M. A. Z. Raja, M. M. Rashidi, M. I. Syam, and A. M. Wazwaz, "Nature-inspired computing approach for solving non-linear singular Emden-Fowler problem arising in electromagnetic theory," Connection Science, vol. 27, no. 4, pp. 377-396, 2015. https://doi.org/10.1080/09540091.2015.1092499