1,597 research outputs found

    Investigating Decision Support Techniques for Automating Cloud Service Selection

    Full text link
    The compass of Cloud infrastructure services advances steadily leaving users in the agony of choice. To be able to select the best mix of service offering from an abundance of possibilities, users must consider complex dependencies and heterogeneous sets of criteria. Therefore, we present a PhD thesis proposal on investigating an intelligent decision support system for selecting Cloud based infrastructure services (e.g. storage, network, CPU).Comment: Accepted by IEEE Cloudcom 2012 - PhD consortium trac

    Agent and cyber-physical system based self-organizing and self-adaptive intelligent shopfloor

    Get PDF
    The increasing demand of customized production results in huge challenges to the traditional manufacturing systems. In order to allocate resources timely according to the production requirements and to reduce disturbances, a framework for the future intelligent shopfloor is proposed in this paper. The framework consists of three primary models, namely the model of smart machine agent, the self-organizing model, and the self-adaptive model. A cyber-physical system for manufacturing shopfloor based on the multiagent technology is developed to realize the above-mentioned function models. Gray relational analysis and the hierarchy conflict resolution methods were applied to achieve the self-organizing and self-adaptive capabilities, thereby improving the reconfigurability and responsiveness of the shopfloor. A prototype system is developed, which has the adequate flexibility and robustness to configure resources and to deal with disturbances effectively. This research provides a feasible method for designing an autonomous factory with exception-handling capabilities

    Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs

    Get PDF
    With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment analysis (DEA) models [Wang, Greatbanks and Yang (2005)] for QoS-aware Web service selection considering the uncertainty of QoS attributes in the presence of desirable and undesirable factors. We conduct a set of experiments using a synthesized dataset to show the capabilities of the proposed models. The experimental results show that the correlation between the proposed models and the interval DEA models is significant. Also, the proposed models provide almost robust results and represent more stable behavior than the interval DEA models against QoS variations. Finally, we demonstrate the usefulness of the proposed models for QoS-aware Web service composition. Experimental results indicate that the proposed models significantly improve the fitness of the resultant compositions when they filter out unsatisfactory candidate services for each abstract service in the preprocessing phase. These models help users to select the best possible cloud service considering the dynamic internet environment and they help service providers to improve their Web services in the marke

    QoS based Web Service Selection and Multi-Criteria Decision Making Methods

    Get PDF
    With the continuing proliferation of web services offering similar efficacies, around the globe, it has become a challenge for a user to select the best web service. In literature, this challenge is exhibited as a 0-1 knapsack problem of multiple dimensions and multiple choices, known as an NP-hard problem. Multi-Criteria Decision Making (MCDM) method is one of the ways which suits this problem and helps the users to select the best service based on his/her preferences. In this regard, this paper assists the researchers in two conducts: Firstly, to witness the performance of different MCDM methods for large number of alternatives and attributes. Secondly, to perceive the possible deviation in the ranking obtained from these methods. For carrying out the experimental evaluation, in this paper, five different well-known MCDM methods have been implemented and compared over two different scenarios of 50 as well as 100 web services, where their ranking is defined on an account of several Quality of Service (QoS) parameters. Additionally, a Spearman’s Rank Correlation Coefficient has been calculated for different pairs of MCDM methods in order to provide a clear depiction of MCDM methods showing the least deviation in their ranking. The experimental results comfort web service users in conquering an appropriate decision on the selection of suitable service

    Scheduling in cloud manufacturing systems: Recent systematic literature review

    Get PDF
    Cloud Manufacturing (CMFg) is a novel production paradigm that benefits from Cloud Computing in order to develop manufacturing systems linked by the cloud. These systems, based on virtual platforms, allow direct linkage between customers and suppliers of manufacturing services, regardless of geographical distance. In this way, CMfg can expand both markets for producers, and suppliers for customers. However, these linkages imply a new challenge for production planning and decision-making process, especially in Scheduling. In this paper, a systematic literature review of articles addressing scheduling in Cloud Manufacturing environments is carried out. The review takes as its starting point a seminal study published in 2019, in which all problem features are described in detail. We pay special attention to the optimization methods and problem-solving strategies that have been suggested in CMfg scheduling. From the review carried out, we can assert that CMfg is a topic of growing interest within the scientific community. We also conclude that the methods based on bio-inspired metaheuristics are by far the most widely used (they represent more than 50% of the articles found). On the other hand, we suggest some lines for future research to further consolidate this field. In particular, we want to highlight the multi-objective approach, since due to the nature of the problem and the production paradigm, the optimization objectives involved are generally in conflict. In addition, decentralized approaches such as those based on game theory are promising lines for future research.Fil: Halty, AgustĂ­n. Universidad de la RepĂșblica; UruguayFil: SĂĄnchez, Rodrigo. Universidad de la RepĂșblica; UruguayFil: VĂĄzquez, ValentĂ­n. Universidad de la RepĂșblica; UruguayFil: Viana, VĂ­ctor. Universidad de la RepĂșblica; UruguayFil: Piñeyro, Pedro. Universidad de la RepĂșblica; UruguayFil: Rossit, Daniel Alejandro. Universidad Nacional del Sur. Departamento de IngenierĂ­a; Argentina. Consejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnicas. Centro CientĂ­fico TecnolĂłgico Conicet - BahĂ­a Blanca. Instituto de MatemĂĄtica BahĂ­a Blanca. Universidad Nacional del Sur. Departamento de MatemĂĄtica. Instituto de MatemĂĄtica BahĂ­a Blanca; Argentin

    Security in Cloud Computing: Evaluation and Integration

    Get PDF
    Au cours de la derniĂšre dĂ©cennie, le paradigme du Cloud Computing a rĂ©volutionnĂ© la maniĂšre dont nous percevons les services de la Technologie de l’Information (TI). Celui-ci nous a donnĂ© l’opportunitĂ© de rĂ©pondre Ă  la demande constamment croissante liĂ©e aux besoins informatiques des usagers en introduisant la notion d’externalisation des services et des donnĂ©es. Les consommateurs du Cloud ont gĂ©nĂ©ralement accĂšs, sur demande, Ă  un large Ă©ventail bien rĂ©parti d’infrastructures de TI offrant une plĂ©thore de services. Ils sont Ă  mĂȘme de configurer dynamiquement les ressources du Cloud en fonction des exigences de leurs applications, sans toutefois devenir partie intĂ©grante de l’infrastructure du Cloud. Cela leur permet d’atteindre un degrĂ© optimal d’utilisation des ressources tout en rĂ©duisant leurs coĂ»ts d’investissement en TI. Toutefois, la migration des services au Cloud intensifie malgrĂ© elle les menaces existantes Ă  la sĂ©curitĂ© des TI et en crĂ©e de nouvelles qui sont intrinsĂšques Ă  l’architecture du Cloud Computing. C’est pourquoi il existe un rĂ©el besoin d’évaluation des risques liĂ©s Ă  la sĂ©curitĂ© du Cloud durant le procĂ©dĂ© de la sĂ©lection et du dĂ©ploiement des services. Au cours des derniĂšres annĂ©es, l’impact d’une efficace gestion de la satisfaction des besoins en sĂ©curitĂ© des services a Ă©tĂ© pris avec un sĂ©rieux croissant de la part des fournisseurs et des consommateurs. Toutefois, l’intĂ©gration rĂ©ussie de l’élĂ©ment de sĂ©curitĂ© dans les opĂ©rations de la gestion des ressources du Cloud ne requiert pas seulement une recherche mĂ©thodique, mais aussi une modĂ©lisation mĂ©ticuleuse des exigences du Cloud en termes de sĂ©curitĂ©. C’est en considĂ©rant ces facteurs que nous adressons dans cette thĂšse les dĂ©fis liĂ©s Ă  l’évaluation de la sĂ©curitĂ© et Ă  son intĂ©gration dans les environnements indĂ©pendants et interconnectĂ©s du Cloud Computing. D’une part, nous sommes motivĂ©s Ă  offrir aux consommateurs du Cloud un ensemble de mĂ©thodes qui leur permettront d’optimiser la sĂ©curitĂ© de leurs services et, d’autre part, nous offrons aux fournisseurs un Ă©ventail de stratĂ©gies qui leur permettront de mieux sĂ©curiser leurs services d’hĂ©bergements du Cloud. L’originalitĂ© de cette thĂšse porte sur deux aspects : 1) la description innovatrice des exigences des applications du Cloud relativement Ă  la sĂ©curitĂ© ; et 2) la conception de modĂšles mathĂ©matiques rigoureux qui intĂšgrent le facteur de sĂ©curitĂ© dans les problĂšmes traditionnels du dĂ©ploiement des applications, d’approvisionnement des ressources et de la gestion de la charge de travail au coeur des infrastructures actuelles du Cloud Computing. Le travail au sein de cette thĂšse est rĂ©alisĂ© en trois phases.----------ABSTRACT: Over the past decade, the Cloud Computing paradigm has revolutionized the way we envision IT services. It has provided an opportunity to respond to the ever increasing computing needs of the users by introducing the notion of service and data outsourcing. Cloud consumers usually have online and on-demand access to a large and distributed IT infrastructure providing a plethora of services. They can dynamically configure and scale the Cloud resources according to the requirements of their applications without becoming part of the Cloud infrastructure, which allows them to reduce their IT investment cost and achieve optimal resource utilization. However, the migration of services to the Cloud increases the vulnerability to existing IT security threats and creates new ones that are intrinsic to the Cloud Computing architecture, thus the need for a thorough assessment of Cloud security risks during the process of service selection and deployment. Recently, the impact of effective management of service security satisfaction has been taken with greater seriousness by the Cloud Service Providers (CSP) and stakeholders. Nevertheless, the successful integration of the security element into the Cloud resource management operations does not only require methodical research, but also necessitates the meticulous modeling of the Cloud security requirements. To this end, we address throughout this thesis the challenges to security evaluation and integration in independent and interconnected Cloud Computing environments. We are interested in providing the Cloud consumers with a set of methods that allow them to optimize the security of their services and the CSPs with a set of strategies that enable them to provide security-aware Cloud-based service hosting. The originality of this thesis lies within two aspects: 1) the innovative description of the Cloud applications’ security requirements, which paved the way for an effective quantification and evaluation of the security of Cloud infrastructures; and 2) the design of rigorous mathematical models that integrate the security factor into the traditional problems of application deployment, resource provisioning, and workload management within current Cloud Computing infrastructures. The work in this thesis is carried out in three phases

    A Multi-Criteria Framework to Assist on the Design of Internet-of-Things Systems

    Get PDF
    The Internet-of-Things (IoT), considered as Internet first real evolution, has become immensely important to society due to revolutionary business models with the potential to radically improve Human life. Manufacturers are engaged in developing embedded systems (IoT Systems) for different purposes to address this new variety of application domains and services. With the capability to agilely respond to a very dynamic market offer of IoT Systems, the design phase of IoT ecosystems can be enhanced. However, select the more suitable IoT System for a certain task is currently based on stakeholder’s knowledge, normally from lived experience or intuition, although it does not mean that a proper decision is being made. Furthermore, the lack of methods to formally describe IoT Systems characteristics, capable of being automatically used by methods is also an issue, reinforced by the growth of available information directly connected to Internet spread. Contributing to improve IoT Ecosystems design phase, this PhD work proposes a framework capable of fully characterise an IoT System and assist stakeholder’s on the decision of which is the proper IoT System for a specific task. This enables decision-makers to perform a better reasoning and more aware analysis of diverse and very often contradicting criteria. It is also intended to provide methods to integrate energy consumptionsimulation tools and address interoperability with standards, methods or systems within the IoT scope. This is addressed using a model-driven based framework supporting a high openness level to use different software languages and decision methods, but also for interoperability with other systems, tools and methods

    Web Service Composition Processes: A Comparative Study

    Full text link
    • 

    corecore