Fig. 1. Performance degradation problem after virtual machine migration.
Fig. 2. The monitoring architecture in cloud computing environments.
Fig. 3. Relative performance indices of physical machines.
Fig. 4. Difference in the relative performance indices before versus after finding the target migration machine with the proposed scheme.
Fig. 5. The count used to select the target machine from the available nodes.
Fig. 6. Difference in the relative performance indices before versus after finding the target migration machine without the proposed scheme.
Fig. 7. Difference in the relative performance indices with versus without the proposed scheme.
Fig. 8. Service level agreement violation without the proposed scheme.
Table 1. Experimental settings
참고문헌
- C. Jatoth, G. R. Gangadharan, and R. Buyya, "Computational intelligence based QoS-aware web service composition: a systematic literature review," IEEE Transactions on Services Computing, vol. 10, no. 3, pp. 475-492, 2017. https://doi.org/10.1109/TSC.2015.2473840
- N. K. Gondhi and A. Gupta, "Survey on machine learning based scheduling in cloud computing," in Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, Hong Kong, China, 2017, pp. 57-61.
- D. Gabi, A. S. Ismail, A. Zainal, and Z. Zakaria, "Quality of service (QoS) task scheduling algorithm with Taguchi orthogonal approach for cloud computing environment," in Recent Trends in Information and Communication Technology. Cham: Springer, 2018, pp. 641-649.
- Z. H. Zhan, X. F. Liu, Y. J. Gong, J. Zhang, H. S. H. Chung, and Y. Li, "Cloud computing resource scheduling and a survey of its evolutionary approaches," ACM Computing Surveys, vol. 47, no. 4, article no. 63, 2015.
- P. Di Sanzo, A. Pellegrini, and D. R. Avresky, "Machine learning for achieving self-* properties and seamless execution of applications in the cloud," in Proceedings of 2015 IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Munich, Germany, 2015, pp. 51-58.
- A. N. Toosi, R. N. Calheiros, and R. Buyya, "Interconnected cloud computing environments: challenges, taxonomy, and survey," ACM Computing Surveys, vol. 47, no. 1, article no. 7, 2014.
- I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, "The rise of "big data" on cloud computing: review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015. https://doi.org/10.1016/j.is.2014.07.006
- M. Silva, M. R. Hines, D. Gallo, Q. Liu, K. D. Ryu, and D. Da Silva, "CloudBench: experiment automation for cloud environments," in Proceedings of 2013 IEEE International Conference on Cloud Engineering (IC2E), Redwood City, CA, 2013, pp. 302-311.
- N. Bessis, E. Asimakopoulou, T. French, P. Norrington, and F. Xhafa, "The big picture, from grids and clouds to crowds: a data collective computational intelligence case proposal for managing disasters," in Proceedings of 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan, 2010, pp. 351-356.
- G. Aceto, A. Botta, W. de Donato, and A. Pescape, "Cloud monitoring: a survey," Computer Networks, vol. 57, no. 9, pp. 2093-2115, 2013. https://doi.org/10.1016/j.comnet.2013.04.001
- M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "Monitoring insiders activities in cloud computing using rule based learning," in Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011, pp. 757-764.
- P. K. Sharma, J. H. Ryu, K. Y. Park, J. H. Park, and J. H. Park, "Li-Fi based on security cloud framework for future IT environment," Human-centric Computing and Information Sciences, vol. 8, article no. 23, 2018.
- W. Song, N. Feng, Y. Tian, S. Fong, and K. Cho, "a deep belief network for electricity utilisation feature analysis of air conditioners using a smart IoT platform," Journal of Information Processing Systems, vol. 14, no. 1, pp. 162-175, 2018. https://doi.org/10.3745/JIPS.04.0056
- M. R. Mesbahi, A. M. Rahmani, and M. Hosseinzadeh, "Reliability and high availability in cloud computing environments: a reference roadmap," Human-centric Computing and Information Sciences, vol. 8, article no. 20, 2018.
- A. Souri and R. Hosseini, "A state-of-the-art survey of malware detection approaches using data mining techniques," Human-centric Computing and Information Sciences, vol. 8, article no. 3, 2018.
- R. Zhang and X. Xiao, "Study of danger-theory-based intrusion detection technology in virtual machines of cloud computing environment," Journal of Information Processing Systems, vol. 14, no. 1, pp. 239-251, 2018. https://doi.org/10.3745/JIPS.03.0089
- S. B. Rathod and V. K. Reddy, "NDynamic framework for secure VM migration over cloud computing," Journal of Information Processing Systems, vol. 13, no. 3, pp. 476-490, 2018. https://doi.org/10.3745/JIPS.01.0015
- J. Shao, H. Wei, Q. Wang, and H. Mei, "A runtime model based monitoring approach for cloud," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 313-320.
- H. Huang and L. Wang, "P&P: a combined push-pull model for resource monitoring in cloud computing environment," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 260-267.
- M. Rak, S. Venticinque, T. Mahr, G. Echevarria, and G. Esnal, "Cloud application monitoring: the mOSAIC approach," in Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science, Athens, Greece, 2011, pp. 758-763.
- M. Andreolini, M. Colajanni, and M. Pietri, "A scalable architecture for real-time monitoring of large information systems," in Proceedings of 2012 Second Symposium on Network Cloud Computing and Applications, London, UK, 2012, pp. 143-150.
- G. Xiang, H. Jin, D. Zou, X. Zhang, S. Wen, and F. Zhao, "VMDriver: a driver-based monitoring mechanism for virtualization," in Proceedings of 2010 29th IEEE Symposium on Reliable Distributed Systems, New Delhi, India, 2010, pp. 72-81.
- P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, & A. Warfield, "Xen and the art of virtualization," in Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, 2003, pp. 164-177.
- Y. Sandoval, G. Gallizo, and M. Curiel, "Evaluation of monitoring tools for cloud computing environments," in Proceedings of 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), Medellin, Colombia, 2012, pp. 1-10.
- B. Konig, J. M. Calero, and J. Kirschnick, "Elastic monitoring framework for cloud infrastructures," IET Communications, vol. 6, no. 10, pp. 1306-1315, 2012. https://doi.org/10.1049/iet-com.2011.0200
- T. Wang, J. Xu, W. Zhang, Z. Gu, and H. Zhong, "Self-adaptive cloud monitoring with online anomaly detection," Future Generation Computer Systems, vol. 80, pp. 89-101, 2018. https://doi.org/10.1016/j.future.2017.09.067
- G. N. Yannakakis and J. Togelius, "A panorama of artificial and computational intelligence in games," IEEE Transactions on Computational Intelligence and AI in Games, vol. 7, no. 4, pp. 317-335, 2015. https://doi.org/10.1109/TCIAIG.2014.2339221
- J. Lu, V. Behbood, P. Hao, H. Zuo, S. Xue, and G. Zhang, "Transfer learning using computational intelligence: a survey," Knowledge-Based Systems, vol. 80, pp. 14-23, 2015. https://doi.org/10.1016/j.knosys.2015.01.010
- J. A. Khan, M. A. Z. Raja, M. M. Rashidi, M. I. Syam, and A. M. Wazwaz, "Nature-inspired computing approach for solving non-linear singular Emden-Fowler problem arising in electromagnetic theory," Connection Science, vol. 27, no. 4, pp. 377-396, 2015. https://doi.org/10.1080/09540091.2015.1092499