DOI QR코드

DOI QR Code

Efficient Virtual Machine Placement Considering System Load

시스템 부하를 고려한 효율적인 가상 머신 배치

  • Received : 2020.05.22
  • Accepted : 2020.06.12
  • Published : 2020.06.30

Abstract

Cloud computing integrates computing resources such as servers, storage, and networks with virtualization technology to provide suitable services according to user needs. Due to the structural characteristics of sharing physical resources based on virtualization technology, threats to availability can occur, so it is essential to respond to availability threats in cloud computing. Existing over-provisioning method is not suitable because it can generate idle resources and cause under-provisioning to degrade or disconnect service. System resources must be allocated in real-time according to the system load to guarantee the cloud system's availability. Through appropriate management measures, it is necessary to reduce the system load and increase the performance of the system. This paper analyzes the work response time according to the allocation or migration of virtual machines and discusses an efficient resource management method considering the system load.

Keywords

References

  1. F. Fatemi Moghaddam, M. B. Rohani, M. Ahmadi, T. Khodadadi and K. Madadipouya, "Cloud computing: Vision, architecture and Characteristics," 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, 2015, pp.1-6.
  2. H. Tsai, M. Siebenhaar, A. Miede, Y. Huang and R. Steinmetz, "Threat as a Service?: Virtualization's Impact on Cloud Security," in IT Professional, Vol. 14, No. 1, 2011, pp.32-37. https://doi.org/10.1109/MITP.2011.117
  3. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, Vol. 34, No. 1, 2011, pp.1-11. https://doi.org/10.1016/j.jnca.2010.07.006
  4. F. Fowley, C. Pahl, P. Jamshidi, D. Fang and X. Liu, "A Classification and Comparison Framework for Cloud Service Brokerage Architectures," in IEEE Transactions on Cloud Computing, Vol. 6, No. 2, 2016, pp.358-371. https://doi.org/10.1109/tcc.2016.2537333
  5. K. Beaty, A. Kundu, V. Naik and A. Acharya, "Network-Level Access Control Management for the Cloud," 2013 IEEE International Conference on Cloud Engineering (IC2E), Redwood City, CA, 2013, pp.98-107.
  6. S. Chaisiri, B. Lee and D. Niyato, "Optimization of Resource Provisioning Cost in Cloud Computing," in IEEE Transactions on Services Computing, Vol. 5, No. 2, 2011, pp.164-177. https://doi.org/10.1109/TSC.2011.7
  7. S. B. Shaw and A. K. Singh, "A survey on scheduling and load balancing techniques in cloud computing environment," 2014 International Conference on Computer and Communication Technology (ICCCT), Allahabad, 2014, pp.87-95.
  8. S. Chaisiri, Bu-Sung Lee and D. Niyato, "Optimal virtual machine placement across multiple cloud providers," 2009 IEEE Asia-Pacific Services Computing Conference (APSCC), Singapore, 2009, pp.103-110.
  9. Xiuzhen Chen, Shenghong Li, Jin Ma and Jianhua Li, "Quantitative threat assessment of denial of service attacks on service availability," 2011 IEEE International Conference on Computer Science and Automation Engineering, Shanghai, 2011, pp.220-224.
  10. S. Yeo and H. Lee, "Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment," IEEE Computer, Vol. 44, No. 8, 2011, pp.55-62.