ChapterPDF Available

Influential Reasonable Robust Virtual Machine Placement for Efficient Utilization and Saving Energy

Authors:

Abstract and Figures

The integration of Cloud-Fog Platform (CFP) is built in order to provide online services to the consumers in an efficient way. Dynamic changes of resources put load on servers. Due to which extra energy demands and an improper usage of energy by consumers have an effect on the utility. Virtual Machine Placement (VMP) problem is considered to be solved with optimization technique as allocation of Virtual Machines (VMs) to a single Physical Machines (PMs). The distribution of energy with inefficient utilization of resources causes of the energy deficiency in noticing daily updates of consumers in a month. In this paper, game theory with coalition and non-coalition mechanism are applied for purpose of balancing electricity load among consumers. Results show that expectation of demanding electricity is kept low in order to minimize improper way of utilization of energy. However, increment in saving of energy will help consumers to sort out arising issue of an unbalanced load on utility due to extra demand. The efficient distribution of energy is addressed in order to have proper utilization and management of energy. Therefore, energy consumption is minimized due to efficient utilization of resources.
Content may be subject to copyright.
Influential Reasonable Robust Virtual
Machine Placement for Efficient
Utilization and Saving Energy
Bibi Ruqia1, Nadeem Javaid2(B
), Altaf Husain3, Najeeba Muhammad Hassan1,
Hafiza Ghulam Hassan1, and Yumna Memon4
1Sardar Bhadur Khan Women University Quetta, Quetta 87300, Pakistan
2COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
nadeemjavaidqau@gmail.com
http://www.njavaid.com
3Balochistan Universty of Information Technology and Management Sciences,
Quetta 87300, Pakistan
4International Dormitory, Wuhan University, Wuhan 430072, Hubei Province, China
Abstract. The integration of Cloud-Fog Platform (CFP) is built in
order to provide online services to the consumers in an efficient way.
Dynamic changes of resources put load on servers. Due to which extra
energy demands and an improper usage of energy by consumers have an
effect on the utility. Virtual Machine Placement (VMP) problem is con-
sidered to be solved with optimization technique as allocation of Virtual
Machines (VMs) to a single Physical Machines (PMs). The distribution
of energy with inefficient utilization of resources causes of the energy defi-
ciency in noticing daily updates of consumers in a month. In this paper,
game theory with coalition and non-coalition mechanism are applied for
purpose of balancing electricity load among consumers. Results show
that expectation of demanding electricity is kept low in order to mini-
mize improper way of utilization of energy. However, increment in saving
of energy will help consumers to sort out arising issue of an unbalanced
load on utility due to extra demand. The efficient distribution of energy is
addressed in order to have proper utilization and management of energy.
Therefore, energy consumption is minimized due to efficient utilization
of resources.
Keywords: Cloud and fog platform ·Virtual machine placement
problem ·VM allocation ·Optimization technique ·Game theory ·
Load balancing
1 Introduction
Cloud computing provides online services for users and utilization of virtual-
ization technology in computing environment to meet requirements of different
applications to increase resource consumption [1]. In [2], SG concept, renewable
c
Springer Nature Switzerland AG 2020
L. Barolli et al. (Eds.): IMIS 2019, AISC 994, pp. 549–561, 2020.
https://doi.org/10.1007/978-3-030-22263-5_52
550 B. Ruqia et al.
energy sources adopt in the electric power industry. The demand side manage-
ment including SG for actualizing ability of SG. Author has described loads as a
shiftable appliances and cost of electricity minimizes on the basis of consumption
profile. In [3], EMC designs to have control on power utilization of automatic
appliances.
Researchers have discussed in [4] that objectives are needed to minimize con-
sumption without considering power utilization of physical edge which needs to
be addressed VMs assignments. Therefore, incoming tasks always run in VMs.
The time slot based resource allocation mechanism has mapped multiple VMs
in a single PM. Authors in [5] have discussed VMP which is an important prob-
lem to be resolved. Objective of VMP needs to have little consumption rate.
Recently, many authors have proposed some approaches to VM migration with
less involvement of the hypervisor between an original VM instance to be change
during execution [6]. In this research work, management of VMs are discussed
in order to schedule daily consumption of consumers. The efficient utilization
of energy matters to balance the load. The scheme is used to optimize utiliza-
tion of reasonable placement of VMs onto PM and data centers’ energy saving.
Nowadays, researchers are focusing in virtualization of server in order to smart
managements of VMs in PM. A robust VMP scheme is used to balance load in
VMs onto PM and the fully Utilization of resources. Multi objective VMP model
builds to balance load and minimize energy consumption and maximize load as
well as considering different requirements of cloud providers.
Cloud data centers are faced with serious problem of increasing energy con-
sumption. VMP problem uses to balance the load on VMs and also introduce for
efficient utilization of energy saving. The objectives are to minimize the energy
consumption and maximize load balance, resource utilization, and robustness.
In general, the allocation of resources to VMs and also little use of VMs in PMs.
Traffic flows among VMs are very high due to data transfers in between multi-
ple PMs in distributing application, intensively. The control of VMs are given to
hypervisor, which is only a proper way of dealing with PMs and VMs. The hyper-
visor limits resources to each VM onto PM. VMs are managed in such a way that
the interference among each resource is not found under any condition and VMs
in a PM are considered independent. The efficient configuration helps assigning
the tasks that will not suffer from any delay. Furthermore, contributions are
presented below which are achieved up till now. The remainder of synopsis is
organized as follows: related studies are presented in Sect. 3. Section 4describes
the problem statement. System models along with the proposed solution are
demonstrated in Sects. 4and 5.
1.1 Contributions
Management of utilization and consumptions are considered with efficient
scheduling.
Consolidation of VM are focused to have minimum cost.
Allocation of VMs onto PMs are noticed to balance loads.
Placement of VM are considered to perform tasks.
Influential Reasonable Robust Virtual Machine Placement . . . 551
Game theory are used as a mechanism for distribution and collision.
In order to validate effectiveness of our proposed scheme, simulations are
performed in MATLAB.
2 Problem Statement
In energy efficiency, VMs consolidation has an implication which leads to a VMP
problem, that mean allocation of lots of VMs to PM [7]. A complex NP-Hard
problem is named as a VMP problem which seeks to obtain the best allocation
of VMs on PM [8,9]. Researchers have discussed different approaches for VMP
objectives in the literature review. Such as, for energy efficiency, optimizing the
assignment of VMs on PM [10], VM consolidation to have increments in resource
utilization [11], and balance the load on many other PM to boost efficiency of the
whole system [12,13]. In cloud computing domain, in [14] applies an Ant Colony
Optimization (ACO) approach which brings the cloud servers into little amount
as a support for balancing the load. However, a high cost and consolidates VMs
on a single PM, are seen in this method. Further, in [15], authors have proposed
an Order Exchange and Migration Ant Colony System HOEMACS algorithm,
which incorporates in order to handle dynamic environment to allocate VMs for
reducing energy consumption. Memory utilization is not balanced in this scheme,
i.e., memory is bottleneck for heterogeneous environments. Therefore, we need
an efficient system that can tackle this bottleneck.
3 Related Work
In [16], Home Energy Management System (HEMS) is proposed to find the best
scheduling scheme for home appliance. Dynamic programming techniques have
been used with integration and coordination among appliances. Analyses vali-
date the efficient scheduling of the appliances. However, a time based pricing
scheme is set for on and off peak hours to see high cost. Authors in [17]have
proposed Centralized Approach To Mobile Adhoc Network (CATMAN) app-
roach which is integrated with Software Defined Network (SDN). Researchers
have tried to optimize results while extracting out from new proposed routing
algorithm, however, the designed protocol runs when centralized control is miss-
ing which means logical control is needed to induce protocol work better than
existing condition.
In [18], algorithm has handled tenants efficiently and provided significant
gains. However, results of Layered Progressive resource allocation based on Mul-
tiple Knapsack Problem (LPMKP) has shown few abnormal cases which demon-
strates fewer differences in Quality of Service (QoS) as compared to other algo-
rithms. Authors in [19] have focused on a coalition mechanism in Geo-distributed
Mobile Cloud Computing (GMCC) network which raises cooperation between
remote and local Service Providers (SPs). Further, an improved coalition app-
roach has also been introduced and applied that helps to balance other SPs with
low resource utilization and needs more resources to run applications. However,
552 B. Ruqia et al.
resources are in sufficient to provide services. Cost of data transmission and
migration are increased in case of increment in cooperation also.
Finite computing resources are to be optimized. Therefore, researchers have
focused on Multi Objectives Scheduling ACO (MOSACO) algorithm in [20]. This
algorithm provides the highest optimality according to consideration of task
completion time, service providers, cost, and QoS. In VM migration, decision
making is essential because of large amount of VMs in PM which is considered
as a complexity in planing of VMs migration. Hybrid resource pool model is pro-
posedin[21] to bring reduction in migration. Authors have improved efficiency
through maximum utilization of hirepool. The results got improved by reducing
migration.
In [22], authors have implemented a distributed Network Virtualization
Hypervisor (NVH): DPVisor is virtualized and dispatched message to Vir-
tual SDN (VSDN), whenever DPVisor receives a message from data plane.
Researchers have discussed optimization of distributed operations. However, all
instances of correct updates realize VSDN slicing essentially. A flow table of
consumption for switches to process VSDN is proposed and protocol stack is
developed as an interface.
Authors [23] have proposed a Service-oriented VMP (SVMP) strategy which
is a suitable intelligent computing platform of Internet of Thing (IoT) back end
and also divided the roles of VM into Web role, worker role, and storage accord-
ing to function types. The genetic algorithm is used to conduct the optimal
configuration for different types of VMs under the situation of limited resources
in order to achieve minimum communication overhead and total power consump-
tion. The results have proved that the proposed placement strategy has achieved
higher efficiency in data centre that minimizes an unnecessary resource waste.
However, mutation rate increases because of increase in environmental scale of
data centre.
An algorithm schedules tasks and allocates resources by Heuristic Cloudlet
Allocation (HCA) algorithm in [24]. An algorithm has acquired scheduling of task
for balance load and less makespan beside limitation in resource capacity. Het-
erogeneous resources are being utilized completely as a result an algorithm has
the best effect on balancing for arranging huge cloudlets with fixing limitation.
However, an algorithm has dealt only with dependent cloudlets to minimize com-
munication cost. Researchers have discussed increment of energy consumption
in cloud environment while executing task. Researchers aim to apply proposed
approach for dynamic application and also select the best VM for execution and
offloading tasks. Authors have discussed in first layer for realizing the fastest
confirmation of data and policy packages for providing a certain integrity.
A new approach Consensus Achievement Algorithm (CAA) in [25] represents
measurement of VM storage location and assure to secure storage in cloud. Fur-
ther, researchers have thought about block chain that has multiple settings to
use functions’ dependent work on searching an eligible nonce. The bitcoin sys-
tem generates only tamper-resistant meta data. This systems’ amount of data
is small as compared to size of VM measurements polices. However, total com-
Influential Reasonable Robust Virtual Machine Placement . . . 553
puting power is fixed, time of building block, and maintaining block by varying
difficulties for practical. Authors have introduced technique of integrating share
services for resources and have made general purpose computing on Graphics
Processing Unit (GPU) to demonstrate benefits in production environments.
4SystemModel
The fogs have PMs which have hypervisors. There are three PMs which are exist-
ing inside the fog. The hypervisor is controlling many Virtual Machine Monitors
(VMMs). The VMMs are responsible for each VMs. The groups of five VMs are
made in PMs by VMMs. With each group of VMs in PMs, the limited resources
are available. The resources are divided into different tasks. The limited archives
are fixed to each PMs inside the fog. The archives help to restore and retrieve
the data as information for the cloud. Now, each PMs have groups of VMs with
limited resources and also having a storing facility also. The fogs work efficiently
due to utilizing resources in an organized way to fulfill the request of any user.
The users are mentioned by their apartments in Fig. 1. Each apartment has a
profile in a fog.
Fig. 1. The system model of cloud, fog, and utility having a scenario description inside
The demand for energy is done by requesting the fog. The utility generates
energy for users however energy will be supplied by the energy demand. The
providing of energy is depending on the surplus of energy. The users must be
efficient to save energy in order to be the supplier as well. Each apartment has
the battery to save energy. It depends on users how much they can save energy.
The details of all the batteries attached to the apartments are on the fog. The
utilization of the energy put an effect on the energy storage. There is the surplus
554 B. Ruqia et al.
of energy because the energy is generated for apartments more than enough,
however, the energy will be supplied according to their need. Some apartments
have stored the energy even that limited energy which will help them earning
money being supplier. Some apartments have not utilized the energy well, now
that apparently suffering from not having any. Here, the storage will help those
apartments which are suffering from energy deficiency.
The apartments which have the surplus of energy will serve those apartments
who do not have energy. These apartments are found being energy generator as
well through different renewable energy resources. Now, the need is collaborat-
ing with each other because after utilizing the limited energy of themselves, the
apartments are compelled to contact others. The restriction on each apartment
needs as providing the services through agreement. The MGs are existing near
the apartments which provide energy to the apartments and also deal with such a
customer who is suffering from energy deficiency. The profile shows those apart-
ments which have energy surplus because the MGs are having limited energy to
distribute the limited amount of energy from different apartments. The solution
is to cooperate with each other to release from such kind of daily problems. In
case of not collaborating the energy demand increases which burden the MGs to
request fog further energy demand. The cooperative and non-cooperative users
are enlisted in the profile of MG separately. These apartments will be checked out
through their profiles. The MGs keep records of each apartment and forwarding
all details to fog on each progress.
5 Results
Figure 2shows the electricity load with respect to time. The profile of a month
shows each day’s usage of electricity load on utility. The users are categorized
in apartments based on their apartment requirement. There are ten apartments
and use of electricity is shown by their profiles. The range of electricity load
is shown from 0 to 6000. The electricity usage of apartment 4, 7, and 10 are
lowest form of all other apartments. The electricity load is shown cooperation
and non-cooperation of users in Fig. 3. Usage is captured for 24 h in a day. The
generation of electricity with respect to users who are balancing load of utility
with their cooperation is shown better than not cooperating with each other.
The extra demand for electricity with wastage of energy resources shows in
Fig. 4. Fluctuation of lines shows wastage and extra demand. The first three
hours show the best result because load is balanced and no energy wastage and
extra demand has appeared. The extra demand is the highest on day 12 and 20,
which is even more than wastage. Whenever the lines seem high in range, the
wastage and extra demand will be high too. Also, extra demand shows higher
on some days without wastage of energy. The range seems high as much wastage
of energy is high. In Fig. 5, the electricity load shows per day. Whenever there
is extra generation of energy there is surplus of energy and energy isn’t saved
however, extra demand is also shows high. The electricity load increases six times
higher in six days.
Influential Reasonable Robust Virtual Machine Placement . . . 555
1 2 3 4 5 6 7 8 9 101112131415161718192021222324252627282930
Time (Month)
0
1000
2000
3000
4000
5000
6000
Load (kW)
Apartment 1
Apartment 2
Apartment 3
Apartment 4
Apartment 5
Apartment 6
Apartment 7
Apartment 8
Apartment 9
Apartment 10
Fig. 2. The profile of ten apartments’ daily loads for a month
1 2 3 4 5 6 7 8 9 101112131415161718192021222324252627282930
Time (Day)
-1.5
-1
-0.5
0
0.5
1
1.5
2
2.5
Electricity Load (kW)
104
Micro grid Extra Load Demand Surplus Energy
Fig. 3. The extra load demand from MG and surplus of MG’s energy show per day
electricity load on the utility
As a result, there is surplus of energy that is saved and other days show that
there are extra generation on demand and energy is not saved. The energy is
wasted as not being useful utilization. If action performs on utilization, extra
generation will not be need. Though fluctuations clearly shows surplus of energy
which is not being saved on the daily basis. The extra demand is high that is
why extra load generation requests are high on utility.
Figure 6shows the profile of a month where the load is exhibited with
respected to time. The expected demand and utilization are huge in range. The
extra generation and extra demand seem low among all lines. In some days, it
is showing that the surplus energy is saved, however, mostly it is utilized that
is why the utilization rate is high. The usage of energy shows in Fig. 7that
how energy is being used by coalition and without coalition during all day. The
556 B. Ruqia et al.
123456789101112131415161718192021222324
Time (Hour)
0
0.2
0.4
0.6
0.8
1
1.2
Electricity Load (kW)
Extra demand Energy wasted
Fig. 4. Extra demand and energy wastage show per day electricity load on the utility
123456789101112131415161718192021222324252627282930
Time (Day)
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Electricity Load (kW)
104
Expected Demand Utilized Surplus Extra Demand Save Extra Generation
Fig. 5. Electricity load shows while expected demand, utilization, surplus, extra
demand, save, and extra generation are noticed with respect to time
generation is denoted by G. The energy wasted is indicated by EL. The deficient
energy is represented by ED. The extra energy of MG generation without coali-
tion by LD. The extra energy MG generation with coalition signify by EMG.
The generation of energy grows highly, however, still there is the availability of
energy efficiency due to energy wasted. The rate of wasted energy is higher than
the other two bars which show the deficiency of energy and that is due to not
cooperating with each other. The rate of deficiency is equal to the LD bar. The
EMG is showing very low rate than all others.
Influential Reasonable Robust Virtual Machine Placement . . . 557
123456789101112131415161718192021222324
Time (Hour)
0
2
4
6
8
10
Electricity Load (kW)
Generation WOC WC
Fig. 6. Energy generation with respect to cooperation and without cooperation scheme
123456789101112131415161718192021222324252627282930
Time (Day)
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Load (kW)
104
Expected Demand
Utilized
Surplus
Extra Demand
Save
Extra Generation
Fig. 7. Extra load demand and surplus energy of MG shows per day electricity load
on the utility
Figure 8discloses a complete load of electricity on daily requests of users.
The loads are displayed for certain range on each day. The range of the loads is
existing in between 0 and 7000. Only day 25 touches the origin of zero, however,
all the others’ day points are existing upward. In Fig. 9, bars are exposed loads
and that load’s range reached near 12,000. Range is still growing which is counted
558 B. Ruqia et al.
GELEDLDEMG
0
1
2
3
4
5
6
7
8
9
Electricity Load (kW)
105
Generation
Energy Wasted
Deficient Energy
Extra Energy MG G WOC
Extra Energy MG G WC
Fig. 8. Load profile shows each day performance
1 2 3 4 5 6 7 8 9 101112131415161718192021222324252627282930
Time (Day)
0
1000
2000
3000
4000
5000
6000
7000
Electricity Load (kW)
LOAD
Fig. 9. Cooperative and non-cooperative game theory’s effect on energy usage to know
the energy deficiency due to wastage
as per day. The small bar in plot shows the lowest one. In Fig. 10, bars are existing
above origin of zero which shows balancing of load properly. However, very little
amount of bars are shown in opposite side of origin zero which means loads still
need to be balanced completely.
Influential Reasonable Robust Virtual Machine Placement . . . 559
123456789101112131415161718192021222324252627282930
Time (Day)
-4000
-2000
0
2000
4000
6000
8000
10000
12000
Load (kW)
data1
Fig. 10. Load is highly balanced after many iterations with the lowest and highest
range
6 Conclusion
In this paper, the CFP provides services to the building according to the need
of consumers’ demand by scheduling their daily updates. The building is hav-
ing multiple apartments attached with MG to have electricity from utility. The
energy generation is the largest among all opponents. The results show the
energy is managed in a better way due to coalition mechanism, however, the
non-coalition mechanism among the consumers has shown energy deficiency.
The performance of coalition mechanism is better than the non-collision. The
energy deficiency demonstrates equal to non-coalition mechanism and the energy
wasted is larger energy deficient. however, the increment in performance with
method coalition removes the energy wastage issue with extra demand while
having the surplus energy.
References
1. Sahoo, P.K., Dehury, C.K., Veeravalli, B.: LVRM: on the design of efficient link
based virtual resource management algorithm for cloud platforms. IEEE Trans.
Parallel Distrib. Syst. 1, 1 (2018)
2. Samuel, O., Javaid, S., Javaid, N., Ahmed, S., Afzal, M., Ishmanov, F.: An efficient
power scheduling in smart homes using Jaya based optimization with time-of-use
and critical peak pricing schemes. Energies 11(11), 3155 (2018)
3. Khalid, R., Javaid, N., Rahim, M.H., Aslam, S., Sher, A.: Fuzzy energy manage-
ment controller and scheduler for smart homes. Sustain. Comput. Inf. Syst. 21,
103–118 (2019)
4. Wang, S., Xu, J., Zhang, N., Liu, Y.: A survey on service migration in mobile edge
computing. IEEE Access 6, 23511–23528 (2018)
5. Fatima, A., Javaid, N., Sultana, T., Hussain, W., Bilal, M., Shabbir, S., Ilahi, M.:
Virtual machine placement via bin packing in cloud data centers. Electronics 7(12),
389 (2018)
560 B. Ruqia et al.
6. Wen, Y., Li, Z., Jin, S., Lin, C., Liu, Z.: Energy-efficient virtual resource dynamic
integration method in cloud computing. IEEE Access 5, 12214–12223 (2017)
7. Bianchini, R., Rajamony, R.: Power and energy management for server systems.
Computer 37(11), 68–76 (2004)
8. Vogels, W.: Beyond server consolidation. ACM Queue 6(1), 20–26 (2008)
9. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research
problems in data center networks. ACM SIGCOMM Comput. Commun. Rev.
39(1), 68–73 (2008)
10. Feller, E., Rilling, L., Morin, C.: Energy-aware ant colony based workload place-
ment in clouds. In: Proceedings of the 2011 IEEE/ACM 12th International Con-
ference on Grid Computing, pp. 26-33. IEEE Computer Society, Sept 2011
11. Xiao, Z., Chen, Q., Luo, H.: Automatic scaling of internet applications for cloud
computing services. IEEE Trans. Comput. 63(5), 1111–1123 (2014)
12. Sahu, Y., Pateriya, R.K., Gupta, R.K.: Cloud server optimization with load bal-
ancing and green computing techniques using dynamic compare and balance algo-
rithm. In: 2013 5th International Conference and Computational Intelligence and
Communication Networks, pp. 527-531. IEEE, Sept 2013
13. Amokrane, A., Zhani, M.F., Langar, R., Boutaba, R., Pujolle, G.: Greenhead: vir-
tual data center embedding across distributed infrastructures. IEEE Trans. Cloud
Comput. 1(1), 36–49 (2013)
14. Ferdaus, M.H., Murshed, M., Calheiros, R.N., Buyya, R.: Virtual machine consol-
idation in cloud data centers using ACO metaheuristic. In: European Conference
on Parallel Processing, pp. 306-317. Springer, Cham, Aug 2014
15. Liu, X.F., Zhan, Z.H., Deng, J.D., Li, Y., Gu, T., Zhang, J.: An energy efficient
ant colony system for virtual machine placement in cloud computing. IEEE Trans.
Evol. Comput. 22(1), 113–128 (2018)
16. Khalid, A., Javaid, N., Guizani, M., Alhussein, M., Aurangzeb, K., Ilahi, M.:
Towards dynamic coordination among home appliances using multi-objective
energy optimization for demand side management in smart buildings. IEEE Access
6, 19509–19529 (2018)
17. Siraj, M.N., Ahmed, Z., Hanif, M.K., Chaudary, M.H., Khan, S.A., Javaid, N.: A
hybrid routing protocol for wireless distributed networks. IEEE Access 6, 67244–
67260 (2018)
18. Yu, R., Ding, J., Maharjan, S., Gjessing, S., Zhang, Y., Tsang, D.H.: Decentralized
and optimal resource cooperation in geo-distributed mobile cloud computing. IEEE
Trans. Emerg. Top. Comput. 6(1), 72–84 (2018)
19. Zuo, L., Shu, L., Dong, S., Chen, Y., Yan, L.: A multiobjective hybrid cloud
resource scheduling method based on deadline and cost constraints. IEEE Access
5, 22067–22080 (2017)
20. Song, Q., Wang, X., Qiu, T., Ning, Z.: An interference coordination-based dis-
tributed resource allocation scheme in heterogeneous cellular networks. IEEE
Access 5, 2152–2162 (2017)
21. Xiong, R., Li, X., Shi, J., Wu, Z., Jin, J.: HirePool: optimizing resource reuse based
on a hybrid resource pool in the cloud. IEEE Access (2018)
22. Huang, H., Niu, B., Tang, S., Li, S., Zhao, S., Han, K., Zhu, Z.: Realizing Highly-
Available, Scalable, and Protocol-Independent vSDN Slicing with a Distributed
Network Hypervisor System (2018)
23. Zhang, L., Li, J.: Enabling robust and privacy-preserving resource allocation in fog
computing. IEEE Access 6, 50384–50393 (2018)
Influential Reasonable Robust Virtual Machine Placement . . . 561
24. Mapetu, J.P.B., Chen, Z., Kong, L.: Heuristic cloudlet allocation approach based
on optimal completion time and earliest finish time. IEEE Access 6, 61714–61727
(2018)
25. Zhao, B., Fan, P., Ni, M.: Mchain: a blockchain-based VM measurements secure
storage approach in IaaS cloud with enhanced integrity and controllability. IEEE
Access 6, 43758–43769 (2018)
... Ruqia proposed Mchain: blockchain-based VM measurements secure storage approach in IaaS cloud with enhanced integrity and controllability in the same course. In this architecture, a two-layer blockchain network comprising a data validation layer and a PoW task layer is integrated with the IaaS cloud to enhance system integrity [59]. Zhang et al. propose blockchain-based public integrity verification for cloud storage against procrastinating auditors. ...
Article
Full-text available
Cloud computing is a well-known technology that provides flexible, efficient, and costeffective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.
... Ruqia proposed Mchain: blockchain-based VM measurements secure storage approach in IaaS cloud with enhanced integrity and controllability in the same course. In this architecture, a two-layer blockchain network comprising a data validation layer and a PoW task layer is integrated with the IaaS cloud to enhance system integrity [59]. Zhang et al. propose blockchain-based public integrity verification for cloud storage against procrastinating auditors. ...
Preprint
Full-text available
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The Cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided block-chain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.
Article
Full-text available
The contributions of researchers at a global level in the journal Electronics in the period 2012–2020 are analyzed. The objective of this work is to establish a global vision of the issues published in the Electronic magazine and their importance, advances and developments that have been particularly relevant for subsequent research. The magazine has 15 thematic sections and a general one, with the programming of 385 special issues for 2020–2021. Using the Scopus database and bibliometric techniques, 2310 documents are obtained and distributed in 14 thematic communities. The communities that contribute to the greatest number of works are Power Electronics (20.13%), Embedded Computer Systems (13.59%) and Internet of Things and Machine Learning Systems (8.11%). A study of the publications by authors, affiliations, countries as well as the H index was undertaken. The 7561 authors analyzed are distributed in 87 countries, with China being the country of the majority (2407 authors), followed by South Korea (763 authors). The H-index of most authors (75.89%) ranges from 0 to 9, where the authors with the highest H-Index are from the United States, Denmark, Italy and India. The main publication format is the article (92.16%) and the review (5.84%) The magazine publishes topics in continuous development that will be further investigated and published in the near future in fields as varied as the transport sector, energy systems, the development of new broadband semiconductors, new modulation and control techniques, and more.
Article
Full-text available
With the increasing size of cloud data centers, the number of users and virtual machines (VMs) increases rapidly. The requests of users are entertained by VMs residing on physical servers. The dramatic growth of internet services results in unbalanced network resources. Resource management is an important factor for the performance of a cloud. Various techniques are used to manage the resources of a cloud efficiently. VM-consolidation is an intelligent and efficient strategy to balance the load of cloud data centers. VM-placement is an important subproblem of the VM-consolidation problem that needs to be resolved. The basic objective of VM-placement is to minimize the utilization rate of physical machines (PMs). VM-placement is used to save energy and cost. An enhanced levy-based particle swarm optimization algorithm with variable sized bin packing (PSOLBP) is proposed for solving the VM-placement problem. Moreover, the best-fit strategy is also used with the variable sized bin packing problem (VSBPP). Simulations are done to authenticate the adaptivity of the proposed algorithm. Three algorithms are implemented in Matlab. The given algorithm is compared with simple particle swarm optimization (PSO) and a hybrid of levy flight and particle swarm optimization (LFPSO). The proposed algorithm efficiently minimized the number of running PMs. VM-consolidation is an NP-hard problem, however, the proposed algorithm outperformed the other two algorithms.
Article
Full-text available
In a cloud environment, the primary way to optimize physical resources is to reuse a physical machine (PM) by consolidating complementary multiple virtual machines (VMs) on it. When considering VMs’ dynamically changing resource demands, one hot research topic revolves around reusing VM migration resources more efficiently. The challenge here is finding the best trade-off between VM migration optimization performance and complexity. On one hand, to improve migration efficiency, VM migration planning is adopted to achieve efficient resource reuse while minimizing the number of VM migrations. On the other hand, the huge number of PMs and VMs in a cloud datacenter often adds considerable complexity to migration planning, which hampers the decision-making process in VM migration. To address these issues, this paper proposes a hybrid resource pool model to reduce the complexity of VM migration planning by limiting the scope of VM migration decisions. Then, based on this model, we use our novel resourcereuse optimization mechanism (called HirePool) to improve efficiency by maximizing resource usage with only a few VM migrations. Finally, we perform simulation tests and actual experiments running on a real cloud platform to evaluate HirePool. Results show that HirePool improves average resource usage by 13%, saves the number of PMs used by 12%, and reduces the average number of migrations (compared to contrast mechanisms) by 31%.
Article
Full-text available
Presently, the advancements in the electric system, smart meters, and implementation of renewable energy sources (RES) have yielded extensive changes to the current power grid. This technological innovation in the power grid enhances the generation of electricity to meet the demands of industrial, commercial and residential sectors. However, the industrial sectors are the focus of power grid and its demand-side management (DSM) activities. Neglecting other sectors in the DSM activities can deteriorate the total performance of the power grid. Hence, the notion of DSM and demand response by way of the residential sector makes the smart grid preferable to the current power grid. In this circumstance, this paper proposes a home energy management system (HEMS) that considered the residential sector in DSM activities and the integration of RES and energy storage system (ESS). The proposed HEMS reduces the electricity cost through scheduling of household appliances and ESS in response to the time-of-use (ToU) and critical peak price (CPP) of the electricity market. The proposed HEMS is implemented using the Earliglow based algorithm. For comparative analysis, the simulation results of the proposed method are compared with other methods: Jaya algorithm, enhanced differential evolution and strawberry algorithm. The simulation results of Earliglow based optimization method show that the integration of RES and ESS can provide electricity cost savings up to 62.80% and 20.89% for CPP and ToU. In addition, electricity cost reduction up to 43.25% and 13.83% under the CPP and ToU market prices, respectively.
Article
Full-text available
Trends in networking are shifting from distributed to logically centralized networks. Software Defined Networking (SDN) is the key technology behind this shift. This new paradigm not only proves the ease of network management in wired networks but also results into graceful evolution of networking protocols. Moreover, Wireless Distributed Networks (WDNs) and Software Defined Radios (SDRs) are also shifting towards centralized approach. However, due to distributed control nature of WDNs, already prevailing routing algorithms cannot cope the design principle of centralized routing algorithms. So, a new routing algorithm that incorporates SDN in WDNs is required. In this paper, we propose logically centralized approach for WDNs called Centralized Approach To Mobile Ad hoc Network (CATMAN). It is a self-healing and hybrid routing protocol. It combines distributed and logically centralized network control along with the flavors of reactive, proactive and opportunistic routing protocols. CATMAN is designed to automatically switch between logically centralized routing protocol and distributed routing protocol based on the types of available network nodes. The protocol significantly reduces control overhead and hence improves BandWidth (BW) utilization. While route computations, this protocol deliberately avoids the nodes with weaker batteries, optimizing the effective life of whole network. The simulation results showed that CATMAN protocol outperform Better Approach To Mobile Ad hoc Network (BATMAN) protocol by signaling overhead reduction upto 570%.
Article
Full-text available
Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services required by modern technology. Task scheduling is an important part in cloud computing for limited number of heterogeneous resources and increasing number of user tasks. Task scheduling is to allocate tasks (cloudlets) to the best suitable resources to increase performance in terms of some parameters, such as makespan and resource utilization. Allocating cloudlets with good load balancing and minimum makespan is an NP-hard optimization problem. Many meta-heuristic and heuristic algorithms have been proposed to solve the said problem, but they lack in considering the completion time of virtual machine and total length of its allocated cloudlets instead of only considering completion time of a cloudlet. This lack leads to decrease the performance of a cloud system in some cases, such as large cloudlets. To address the said problem, in this paper, we propose an optimal heuristic cloudlet allocation algorithm for resource allocation and task scheduling, referred as HCA, to cope with the increasing large number of user cloudlets under minimum resource capacity. So, we devise a new mechanism to combine optimal completion time and earliest finish time to minimize both degree of imbalance and overall completion time. The experimental results show that the proposed HCA can achieve effectively and efficiently good performance, best load balancing and improve the resource utilization in comparison with the other existing cloudlet allocation methods.
Article
Full-text available
VM measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence the secure storage for these data has attracted more attentions recently. This work proposes a novel approach, named Mchain, to enhance the integrity and controllability of the secure storage. Specially, to enhance the integrity, a two-layer blockchain network is introduced. In the first layer, after the production, the data packages are firstly verified by leveraging a correspondence between a package and a policy, and a one-to-one relation among a VM, a user and a node. After that, we propose a consensus achievement algorithm to construct a semi-finished block on a candidate block arranged by data packages. Meanwhile the semi-finished block is distributed to all nodes, which can provide a certain integrity. In the second-layer, tamper-resistant metadata are generated by performing PoW tasks on the semi-finished block, resulting in strong integrity. Further, to enhance the controllability, a revisable user-defined policy based encryption method with KP-ABE is proposed. It helps to flexibly control the scope of authorized verifiers. The experimental results on six scenarios with simulated dataset show that the proposed approach is appealing in integrity and controllability, as well as the time overhead of data storage. OAPA
Article
Full-text available
In this paper, we design and implement a distributed network virtualization hypervisor (NVH) system, namely DPVisor, which can provide superior network programmability based on protocol-oblivious forwarding (POF) to realize highly-available, scalable and protocol-independent virtual software-defined network (vSDN) slicing. The experimental comparisons indicate that DPVisor achieves comparable performance as ON-Visor (i.e., an OpenFlow-based ONOS benchmark), in terms of the message processing latency, message processing throughput, and failure recovery time. Moreover, to optimize the performance of distributed NVH systems, we carefully adjust the consistency model used in the state synchronization of NVH instances and propose a local cache based scheme to balance the tradeoff between the consistency and availability of network status. Our experimental results confirm that the message processing throughput of distributed NVH systems can be greatly improved (i.e., for both DPVisor and ONVisor), while the data consistency among NVH instances is still maintained well.
Article
The integration of information and communication 1 technologies in traditional grid brings about a smart grid. 2 Energy management plays a vital role in maintaining the 3 sustainability and reliability of a smart grid which in turn helps 4 to prevent blackouts. Energy management at consumers side 5 is a complex task, it requires efficient scheduling of appliances 6 with minimum delay to reduce peak-to-average ratio (PAR) 7 and energy consumption cost. In this paper, the classification 8 of appliances is introduced based on their energy consumption 9 pattern. An energy management controller is developed for 10 demand side management. We have used fuzzy logic and 11 heuristic optimization techniques for cost, energy consump-12 tion and PAR reduction. Fuzzy logic is used to control the 13 throttleable and interruptible appliances. On the other hand, 14 the heuristic optimization algorithms, BAT inspired and flower 15 pollination, are employed for scheduling of shiftable appliances. 16 We have also proposed a hybrid optimization algorithm for 17 the scheduling of home appliances, named as hybrid BAT 18 pollination optimization algorithm. Simulation results show a 19 significant reduction in energy consumption, cost and PAR. 20
Article
Fog computing is an extension of cloud computing and enables computing directly at the edge of the network. In fog computing paradigm, fog nodes reside between smart end devices and the cloud. Benefit from the structure of fog computing, fog computing can provide services with low latency, location awareness and mobility. Since the fog nodes are not as powerful as the cloud, resource allocation techniques are usually adapted to optimize the utilization of the resources of fog nodes. However, current resource allocation techniques are not privacy-preserving, i.e., an attacker can easily find end devices’ sensitive information. In this paper, we propose a privacy-preserving resource allocation scheme for fog computing. The new proposal has constant message expansion, and, is secure against both an eavesdropper and a smart gateway that is employed to perform the resource allocation algorithm. Our scheme is also robust, since it achieves full key compromise resistance which guarantees that even if the private keys of all the fog nodes in a fog system are corrupted the scheme remains secure.
Article
Mobile edge computing provides a promising approach to significantly reduce network operational cost and improve quality of service (QoS) of mobile users by pushing computation resources to the network edges, and enables a scalable Internet of Things (IoT) architecture for time sensitive applications (e-healthcare, real time monitoring, etc.). However, the mobility of mobile users and the limited coverage of edge servers can result in significant network performance degradation, dramatic drop in QoS, and even interruption of ongoing edge services, therefore, it is difficult to ensure service continuity. Service migration has great potential to address the issues, which decides when or where these services is migrated following user mobility and the changes of demand. In this paper, two conceptions similar to service migration, i.e., live migration for data centers and handover in cellular networks, are first discussed. Next, the cutting-edge research efforts on service migration in mobile edge computing are reviewed and a devisal of taxonomy based on various research directions for efficient service migration is presented. Subsequently, a summary of three technologies for hosting services on edge servers, i.e., virtual machine, container and agent, is provided. Last, open research challenges in service migration are identified and discussed.