Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0102

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments  

Lim, JongBeom (Dept. of Game & Multimedia Engineering, Korea Polytechnic University)
Yu, HeonChang (Dept. of Computer Science & Engineering, Korea University)
Gil, Joon-Min (School of Information Technology Engineering, Daegu Catholic University)
Publication Information
Journal of Information Processing Systems / v.14, no.6, 2018 , pp. 1480-1493 More about this Journal
Abstract
Recently, computational intelligence has received a lot of attention from researchers due to its potential applications to artificial intelligence. In computer science, computational intelligence refers to a machine's ability to learn how to compete various tasks, such as making observations or carrying out experiments. We adopted a computational intelligence solution to monitoring residual resources in cloud computing environments. The proposed residual resource monitoring scheme periodically monitors the cloud-based host machines, so that the post migration performance of a virtual machine is as consistent with the pre-migration performance as possible. To this end, we use a novel similarity measure to find the best target host to migrate a virtual machine to. The design of the proposed residual resource monitoring scheme helps maintain the quality of service and service level agreement during the migration. We carried out a number of experimental evaluations to demonstrate the effectiveness of the proposed residual resource monitoring scheme. Our results show that the proposed scheme intelligently measures the similarities between virtual machines in cloud computing environments without causing performance degradation, whilst preserving the quality of service and service level agreement.
Keywords
Cloud Computing; Clustering; Computational Intelligence; Resource Monitoring;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 D. Gabi, A. S. Ismail, A. Zainal, and Z. Zakaria, "Quality of service (QoS) task scheduling algorithm with Taguchi orthogonal approach for cloud computing environment," in Recent Trends in Information and Communication Technology. Cham: Springer, 2018, pp. 641-649.
2 Z. H. Zhan, X. F. Liu, Y. J. Gong, J. Zhang, H. S. H. Chung, and Y. Li, "Cloud computing resource scheduling and a survey of its evolutionary approaches," ACM Computing Surveys, vol. 47, no. 4, article no. 63, 2015.
3 P. Di Sanzo, A. Pellegrini, and D. R. Avresky, "Machine learning for achieving self-* properties and seamless execution of applications in the cloud," in Proceedings of 2015 IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Munich, Germany, 2015, pp. 51-58.
4 A. N. Toosi, R. N. Calheiros, and R. Buyya, "Interconnected cloud computing environments: challenges, taxonomy, and survey," ACM Computing Surveys, vol. 47, no. 1, article no. 7, 2014.
5 I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, "The rise of "big data" on cloud computing: review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015.   DOI
6 M. Silva, M. R. Hines, D. Gallo, Q. Liu, K. D. Ryu, and D. Da Silva, "CloudBench: experiment automation for cloud environments," in Proceedings of 2013 IEEE International Conference on Cloud Engineering (IC2E), Redwood City, CA, 2013, pp. 302-311.
7 N. Bessis, E. Asimakopoulou, T. French, P. Norrington, and F. Xhafa, "The big picture, from grids and clouds to crowds: a data collective computational intelligence case proposal for managing disasters," in Proceedings of 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan, 2010, pp. 351-356.
8 G. Aceto, A. Botta, W. de Donato, and A. Pescape, "Cloud monitoring: a survey," Computer Networks, vol. 57, no. 9, pp. 2093-2115, 2013.   DOI
9 M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "Monitoring insiders activities in cloud computing using rule based learning," in Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011, pp. 757-764.
10 P. K. Sharma, J. H. Ryu, K. Y. Park, J. H. Park, and J. H. Park, "Li-Fi based on security cloud framework for future IT environment," Human-centric Computing and Information Sciences, vol. 8, article no. 23, 2018.
11 W. Song, N. Feng, Y. Tian, S. Fong, and K. Cho, "a deep belief network for electricity utilisation feature analysis of air conditioners using a smart IoT platform," Journal of Information Processing Systems, vol. 14, no. 1, pp. 162-175, 2018.   DOI
12 M. R. Mesbahi, A. M. Rahmani, and M. Hosseinzadeh, "Reliability and high availability in cloud computing environments: a reference roadmap," Human-centric Computing and Information Sciences, vol. 8, article no. 20, 2018.
13 A. Souri and R. Hosseini, "A state-of-the-art survey of malware detection approaches using data mining techniques," Human-centric Computing and Information Sciences, vol. 8, article no. 3, 2018.
14 R. Zhang and X. Xiao, "Study of danger-theory-based intrusion detection technology in virtual machines of cloud computing environment," Journal of Information Processing Systems, vol. 14, no. 1, pp. 239-251, 2018.   DOI
15 S. B. Rathod and V. K. Reddy, "NDynamic framework for secure VM migration over cloud computing," Journal of Information Processing Systems, vol. 13, no. 3, pp. 476-490, 2018.   DOI
16 G. Xiang, H. Jin, D. Zou, X. Zhang, S. Wen, and F. Zhao, "VMDriver: a driver-based monitoring mechanism for virtualization," in Proceedings of 2010 29th IEEE Symposium on Reliable Distributed Systems, New Delhi, India, 2010, pp. 72-81.
17 J. Shao, H. Wei, Q. Wang, and H. Mei, "A runtime model based monitoring approach for cloud," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 313-320.
18 H. Huang and L. Wang, "P&P: a combined push-pull model for resource monitoring in cloud computing environment," in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, pp. 260-267.
19 M. Rak, S. Venticinque, T. Mahr, G. Echevarria, and G. Esnal, "Cloud application monitoring: the mOSAIC approach," in Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science, Athens, Greece, 2011, pp. 758-763.
20 M. Andreolini, M. Colajanni, and M. Pietri, "A scalable architecture for real-time monitoring of large information systems," in Proceedings of 2012 Second Symposium on Network Cloud Computing and Applications, London, UK, 2012, pp. 143-150.
21 P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, & A. Warfield, "Xen and the art of virtualization," in Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, 2003, pp. 164-177.
22 Y. Sandoval, G. Gallizo, and M. Curiel, "Evaluation of monitoring tools for cloud computing environments," in Proceedings of 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), Medellin, Colombia, 2012, pp. 1-10.
23 N. K. Gondhi and A. Gupta, "Survey on machine learning based scheduling in cloud computing," in Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, Hong Kong, China, 2017, pp. 57-61.
24 B. Konig, J. M. Calero, and J. Kirschnick, "Elastic monitoring framework for cloud infrastructures," IET Communications, vol. 6, no. 10, pp. 1306-1315, 2012.   DOI
25 T. Wang, J. Xu, W. Zhang, Z. Gu, and H. Zhong, "Self-adaptive cloud monitoring with online anomaly detection," Future Generation Computer Systems, vol. 80, pp. 89-101, 2018.   DOI
26 G. N. Yannakakis and J. Togelius, "A panorama of artificial and computational intelligence in games," IEEE Transactions on Computational Intelligence and AI in Games, vol. 7, no. 4, pp. 317-335, 2015.   DOI
27 J. Lu, V. Behbood, P. Hao, H. Zuo, S. Xue, and G. Zhang, "Transfer learning using computational intelligence: a survey," Knowledge-Based Systems, vol. 80, pp. 14-23, 2015.   DOI
28 J. A. Khan, M. A. Z. Raja, M. M. Rashidi, M. I. Syam, and A. M. Wazwaz, "Nature-inspired computing approach for solving non-linear singular Emden-Fowler problem arising in electromagnetic theory," Connection Science, vol. 27, no. 4, pp. 377-396, 2015.   DOI
29 C. Jatoth, G. R. Gangadharan, and R. Buyya, "Computational intelligence based QoS-aware web service composition: a systematic literature review," IEEE Transactions on Services Computing, vol. 10, no. 3, pp. 475-492, 2017.   DOI