41 research outputs found
A Pareto-based Genetic Algorithm for Optimized Assignment of VM Requests on a Cloud Brokering Environment
International audienceIn this paper, we deal with cloud brokering for the assignment optimization of VM requests in three-tier cloud infrastructures. We investigate the Pareto-based meta-heuristic approach to take into account multiple client and brokercentric optimization criteria. We propose a new multi-objective Genetic Algorithm ( MOGA-CB ) that can be integrated in a cloud broker. Two objectives are considered in the optimization process: minimizing both the response time and the cost of the selected VM instances to satisfy the clients and to maximize the profit of the broker. The approach has been experimented using realistic data of different types of Amazon EC2 instances and their pricing history. The reported results show that MOGA-CB provides efficiently effective Pareto sets of solutions
A Multi-Objective Approach for Multi-Cloud Infrastructure Brokering in Dynamic Markets
Cloud Service Brokers (CSBs) simplify complex resource allocation decisions, efficiently linking up the tenant dynamic requirements in to providers dynamic offers, where several objectives should ideally be considered. Nowadays, both demands and offers should be considered in dynamic environments, representing particular challenges in cloud computing markets. This work proposes for the first time a pure multiobjective formulation of a broker-oriented Virtual Machine Placement (VMP) problem for dynamic environments, simultaneously optimizing following objective functions: (1) Total Infrastructure CPU (TICPU), (2) Total Infrastructure Memory (TIMEM) and (3) Total Infrastructure Price (TIP) subject to load balancing across providers. To solve the formulated multi-objective problem, a Multi-Objective Evolutionary Algorithm (MOEA) is proposed. When a change arises in the demands or in the offers, a set of non-dominated solutions is found (usually more than one solution), selection strategies were considered in order to automatically select a solution at each reconfiguration. The proposed MOEA and selection strategies, were compared in different scenarios composed by real data from providers in actual markets. Experimental results demonstrate the good quality of the obtained solutions for the proposed scenarios.Sociedad Argentina de Informática e Investigación Operativa (SADIO
IoTにおけるリソースの最適化
Recently, there are more than 9 billion things that connected in the Internet of Things (IoT) and the number is exceed more than 24 billion in 2020. It means that numerous data will be generated because of increasing quickly of the number of things. An infrastructure should be developed to manage the connected things in IoT. Moreover, cloud computing will play important role in terms of data storage and analysis for IoT. Therefore, a cloud broker is considered as an intermediary in the infrastructure for managing the connected things. The cloud broker will find the best deal between clients and service providers. However, there are three problems among cloud broker, clients and service providers that are the response time of the request from clients, the energy consumption of the system and the profit of the cloud broker. The three problems are considered as multi-objective optimization problem to maximize the profit of the broker while minimizing the response time of the request and the energy consumption. A multi-objective particle swarm optimization (MOPSO) is proposed to solve the problem. MOPSO is compared with a non-dominated sorting genetic algorithm-II (NSGA-II) and a random search algorithm to show the performance. Since, there are a lot of data including social media and geographic location, generated in IoT. Coupling social media with geographic location has boosted the worth of understanding the real-world situations. Event detection aims to find more specific topic which represents real-world event. However,identification of unusual and seemingly inconsistent patterns in data, called outliers, is necessary. The problem is how to partition a spatio-temporal domain to find a meaningful local outlier pattern. A k-dimensional (KD) tree partitioning is applied to divide a spatio-temporal domain into sub-cells. The optimal partitioning problem in a spatio-temporal domain has been proven as an NP-complete problem. Therefore, a genetic algorithm is proposed to solve the problem. Moreover, the smart grid is strongly related to IoT technologies. It is enabled by IoT to handle big data and reduce the number of communication protocols. The micro-grid is studied because of micro-grids are part of a larger system that makes the smart grid to become reality. The operation management problem and pollutant emission problem are important problems for the micro-grid system. Thus, reducing the total energy expenses and pollutant emission of micro-grid and improving the renewable energy sources (battery energy storage) are considered together with the operation management of the micro-grid system. A fitness-based modified game particle swarm optimization (FMGPSO) algorithm is proposed to minimize the total costs of operation and pollutant emissions in the microgrid and multi-microgrid system. FMGPSO is compared with A non-dominated sorting genetic algorithm-III (NSGA-III), a multi-objective covariance matrix adaptation evolution strategy (MO-CMAES), and a speed-constrained multi-objective particle swarm optimization (SMPSO) to show the performance.最近では、Internet of Things(IoT)に接続されているものは90億件を超え、2020年には240億件を超えている。それは、物事の数が急速に増えるため、多くのデータが生成されることを意味する。IoTで接続されたものを管理するためのインフラストラクチャを開発する必要がある。さらに、クラウドコンピューティングは、IoTのデータストレージと分析の観点から重要な役割を果たしている。したがって、クラウドブローカーは、接続されたものを管理するためのインフラストラクチャの仲介者とみなされる。クラウドブローカーは、クライアントとサービスプロバイダーの間で最良の取引を見つけるだろう。しかし、クラウドブローカー、クライアントおよびサービスプロバイダーには、クライアントからの要求の応答時間、システムのエネルギー消費、クラウドブローカーのプロセスという3つの問題がある。この3つの問題は、要求の応答時間とエネルギー消費を最小限に抑えながら、ブローカーのプロビジョニングを最大化するための多目的最適化問題とみなされる。この問題を解決するために、多目的粒子群最適化(MOPSO)が提案されている。 MOPSOは、非優性選別遺伝的アルゴリズム-II(NSGA-II)およびランダム探索アルゴリズムと比較され、性能が示される。ソーシャルメディアや地理的な場所など、IoTで生成される多くのデータがあるためである。地理的な場所とソーシャルメディアを結び付けることで、現実の状況を理解する価値が高まっている。イベント検出は、実際のイベントを表すより特定のトピックを見つけることを目指している。しかし、異常値と呼ばれる異常なパターンや一見不整合なパターンの同定が必要である。問題は、時空間ドメインを分割して意味のある局所的な奇妙なパターンを見つける方法である。時空間領域をサブセルに分割するために、k次元(KD)ツリー分割が適用される。時空間領域における最適な分割問題は、NP完全な問題として証明されている。したがって、この問題を解決するための遺伝的アルゴリズムが提案されている。さらに、スマートグリッドはIoT技術と強く関連している。 IoTによって大きなデータを処理し、通信プロトコルの数を減らすことができる。マイクログリッドはスマートグリッドを現実化させるより大きなシステムの一部であるため、マイクログリッドが研究されている。運用管理上の問題や汚染物質排出問題は、マイクログリッドシステムにとって重要な問題である。したがって、マイクログリッドシステムの運用管理とともに、マイクログリッドの総エネルギー費用と汚染物質排出量の削減と再生可能エネルギー源の改善(バッテリエネルギー貯蔵)が考慮されている。マイクログリッドおよびマルチマイクログリッドシステムにおける操作および汚染物質排出の総コストを最小限に抑えるため、MGPSO アルゴリズムが提案されている。 FMGPSOは、非優先ソート遺伝的アルゴリズム-III(NSGA-III)、多目的共分散行列適応進化戦略(MO-CMAES)、および性能を示すために速度が制約された多目的粒子群最適化(SMPSO)と比較される。室蘭工業大学 (Muroran Institute of Technology)博士(工学
Optimal Selection Techniques for Cloud Service Providers
Nowadays Cloud computing permeates almost every domain in Information and Communications Technology (ICT) and, increasingly, most of the action is shifting from large, dominant players toward independent, heterogeneous, private/hybrid deployments, in line with an ever wider range of business models and stakeholders. The rapid growth in the numbers and diversity of small and medium Cloud providers is bringing new challenges in the as-a-Services space. Indeed, significant hurdles for smaller Cloud service providers in being competitive with the incumbent market leaders induce some innovative players to "federate" deployments in order to pool a larger, virtually limitless, set of resources across the federation, and stand to gain in terms of economies of scale and resource usage efficiency. Several are the challenges that need to be addressed in building and managing a federated environment, that may go under the "Security", "Interoperability", "Versatility", "Automatic Selection" and "Scalability" labels. The aim of this paper is to present a survey about the approaches and challenges belonging to the "Automatic Selection" category. This work provides a literature review of different approaches adopted in the "Automatic and Optimal Cloud Service Provider Selection", also covering "Federated and Multi-Cloud" environments
BALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI-OBJECTIVE SOFTWARE DYNAMIC MANAGEMENT
Beyond its functional requirements, architectural design, the quality of a software system
is also defined by the degree to which it meets its non-functional requirements. The
complexity of managing these non-functional requirements is exacerbated by the fact that
they are potentially conflicting with one another. For cloud-based software, i.e., software whose
service is delivered through a cloud infrastructure, other constraints related to the features of the
hosting data center, such as cost, security and performance, have to be considered by system and
software designers. For instance, the evaluation of requests to access sensitive resources results in
performance overhead introduced by policy rules evaluation and message exchange between the
different geographically distributed components of the authorization system. Duplicating policy
rule evaluation engines traditionally solves such performance issues, however such a decision has
an impact on security since it introduces additional potential private data leakage points. Taking
into account all the aforementioned features is a key factor to enhance the perceived quality of
service (QoS) of the cloud as a whole. Maximizing users and software developers satisfaction with
cloud-based software is a challenging task since trade-off decisions have to be dynamically taken
between these conflicting quality attributes to adapt to system requirements evolution.
In this thesis, we tackle the challenges of building a decision support method to optimize
software deployment in a cloud environment. Our proposed holistic method operates both at the
level of 1) Platform as a service (PaaS) by handling software components deployment to achieve
an efficient runtime optimization to satisfy cloud providers and customers objectives 2) Guest
applications by making inroads into the design of applications to enable the design of secure
systems that also meet flexibility, performance and cost requirements. To thoroughly investigate
these challenges, we identify three main objectives that we address as follows:
The first objective is to achieve a runtime optimization of cloud-based software deployment
at the Platform as a service (PaaS) layer, by considering both cloud customers and providers
constraints. To fulfill this objective, we leverage the [email protected] paradigm to build an
abstraction layer to model a cloud infrastructure. In a second step, we model the software placement
problem as a multi-objective optimization problem and we use multi-objective evolutionary
algorithms (MOEAs) to identify a set of possible cloud optimal configurations that exhibit best
trade-offs between conflicting objectives. The approach is validated through a case study that
we defined with EBRC1, a cloud provider in Luxembourg, as a representative of a software
component placement problem in heterogeneous distributed cloud nodes.
The second objective is to ameliorate the convergence speed of MOEAs that we have used to
achieve a run-time optimization of cloud-based software. To cope with elasticity requirements
of cloud-based applications, we improve the way the search strategy operates by proposing a
hyper-heuristic that operates on top of MOEAs. Our hyper-heuristic uses the history of mutation
effect on fitness functions to select the most relevant mutation operators. Our evaluation shows that MOEAs in conjunction with our hyper-heuristic has a significant performance improvement
in terms of resolution time over the original MOEAs.
The third objective aims at optimizing cloud-based software trade-offs by exploring applications
design as a complementary step to the optimization at the level of the cloud infrastructure,
tackled in the first and second objectives. We aimed at achieving security trade-offs at the level of
guest applications by revisiting current practices in software methods. We focus on access control
as a main security concern and we opt for guest applications that manage resources regulated by
access control policies specified in XACML2. This focus is mainly motivated by two key factors:
1) Access control is the pillar of computer security as it allows to protect sensitive resources
in a given system from unauthorized accesses 2) XACML is the de facto standard language to
specify access control policies and proposes an access control architectural model that supports
several advanced access requirements such as interoperability and portability. To attain this
objective, we advocate the design of applications based on XACML architectural model to achieve
a trade-off between security and flexibility and we adopt a three-step approach: First, we identify
a lack in the literature in XACML with obligation handling support. Obligations enable to specify
user actions that have to be performed before/during/after the access to resources. We propose an
extension of the XACML reference model and language to use the history of obligations states at
the decision making time. In this step, we extend XACML access control architecture to support
a wider range of usage control scenarios. Second, in order to avoid degrading performance while
using a secure architecture based on XACML, we propose a refactoring technique applied on
access control policies to enhance request evaluation time. Our approach, evaluated on three Java
policy-based systems, enables to substantially reduce request evaluation time. Finally, to achieve
a trade-off between a safe security policy evolution and regression testing costs, we develop a
regression-test-selection approach for selecting test cases that reveal faults caused by policy
changes.
To sum up, in all aforementioned objectives, we pursue the goal of analysing and improving
the current landscape in the development of cloud-based software. Our focus on security quality
attributes is driven by its crucial role in widening the adoption of cloud computing. Our approach
brings to light a security-aware design of guest applications that is based on XACML architecture.
We provide useful guidelines, methods with underlying algorithms and tools for developers and
cloud solution designers to enhance tomorrow’s cloud-based software design.
Keywords: XACML-policy based systems, Cloud Computing, Trade-offs, Multi-Objective
Optimizatio
Recommended from our members
Improving shared access to Cloud of Things resources.
Cloud of Things (CoT) is an emerging paradigm that integrates Cloud Computing and Internet of Things (IoT) to support a wide range of real-world applications. Resource allocation plays a vital role in CoT, especially when allocating IoT physical resources to Cloud-based applications to ensure seamless application execution. Due to the heterogeneity and the constrained capacities of IoT resources, resource allocation is a challenge. This complexity leads to missing/limiting shared access to the IoT physical resources and consequently lessen the reusability of the resources across multiple applications. This issue results in, 1) replicating IoT deployments making them expensive and not feasible for many prospective users, 2) existing IoT infrastructures are over-provisioned to meet the unpredictable application requirements in which resources may be significantly underutilised, and 3) the adoption of CoT is slowed.
Improving shared access to CoT resources can provide efficient resource allocation, improve resource utilisation and likely to reduce the cost of IoT deployments. Existing solutions include small-scale, hardware and platform-dependent mechanisms to enable or improve shared access to IoT resources. The research presented in this thesis considers trading CoT resources in a marketplace as an approach to improve shared access to CoT resources. It proposes a solution to Cot resource allocation that re-imagines CoT resources as commodities that can be provided and consumed by the marketplace participants.
The novel contributions of the research presented in this thesis are summarised as follows: 1) a model to describe and quantify the value of CoT resources, 2) a resource sharing and allocation strategy called Exclusive Shared Access (ESA) to CoT resources, 3) a QoS-aware optimisation model for trading CoT resources as a single and multipleobjective optimisation problem, and 4) a marketplace architecture and experimental evaluation to verify its performance and scalability