A Desirable Strategy for Resource Allocation using Virtual Machine in Cloud

被引:0
|
作者
Abinaya, B. [1 ]
Suganthi, J. [1 ]
Kumar, R. G. Suresh [2 ]
Nalini, T. [3 ]
机构
[1] Rajiv Gandhi Coll Engn & Technol, Dept Comp Sci & Engn, Pondicherry, India
[2] Vels Univ, Madras, Tamil Nadu, India
[3] Bharath Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Skewness; virtual machine; resource allocation; cloud computing;
D O I
10.14257/ijgdc.2016.9.5.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is a facsimile of legalizing ubiquitous, expedient, on-demand network access to a shared pool of configurable computing resources that can be rapidly furnished and released with negligible management effort. It relies on sharing computing resources rather than having local servers or personal devices to handle applications. The resource allocation, still lack on sustaining tools that enable developers to compare different resource allocation strategies in cloud computing. In this paper we initiate the concept of "skewness" to measure the bumpy utilization of a server. By minimizing skewness, we can improve the overall utilization of servers in the face of multidimensional resource constraints. Here we use skewness metric to combine VMS with different resource characteristics suitably so that the capacities of servers are well utilized.
引用
收藏
页码:25 / 30
页数:6
相关论文
共 50 条
  • [1] Energy Efficient Resource Selection and Allocation Strategy for Virtual Machine Consolidation in Cloud Datacenters
    Chang, Yaohui
    Gu, Chunhua
    Luo, Fei
    Fan, Guisheng
    Fu, Wenhao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (07): : 1816 - 1827
  • [2] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    [J]. 2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [3] Cloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment
    Xu, Xing
    Hu, Hao
    Hu, Na
    Ying, Weiqin
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 113 - 120
  • [4] A Dynamic Resource Allocation Model for Virtual Machine Management on Cloud
    Yang, Chao-Tung
    Cheng, Hsiang-Yao
    Huang, Kuan-Lung
    [J]. GRID AND DISTRIBUTED COMPUTING, 2011, 261 : 581 - 590
  • [5] Stability Control in Virtual Machine: Resource Allocation for Cloud Computing
    Ismail, Mohd Badrulhisham
    Hashim, Habibah
    Yusof, Yusnani Mohd
    [J]. 5TH INTERNATIONAL CONFERENCE ON GREEN DESIGN AND MANUFACTURE 2019 (ICONGDM 2019), 2019, 2129
  • [6] Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
    Yuan Zhao
    Kang Chen
    Zhisheng Ye
    Zhiyu Xiang
    Qi Lu
    [J]. Cluster Computing, 2024, 27 : 119 - 135
  • [7] Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
    Zhao, Yuan
    Chen, Kang
    Ye, Zhisheng
    Xiang, Zhiyu
    Lu, Qi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 119 - 135
  • [8] Power Aware Resource Virtual Machine Allocation Policy for Cloud Infrastructure
    Jha, Ravi Shankar
    Gupta, Punit
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 256 - 260
  • [9] Virtual Machine Resource Allocation for Multimedia Cloud: A Nash Bargaining Approach
    Hassan, Mohammad Mehedi
    Alamri, Atif
    [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 571 - 576
  • [10] Customer Churn Aware Resource Allocation and Virtual Machine Placement in Cloud
    Yang, Qiyuan
    Li, Xiaoyu
    Kumar, Suman
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 32 - 39