Efficient Resource Utilization in IoT and Cloud Computing
<p>IoT device adoption is expected to expand.</p> "> Figure 2
<p>Policy-Based System.</p> "> Figure 3
<p>SLA Layers.</p> "> Figure 4
<p>SLA and policy management.</p> "> Figure 5
<p>The relationship between monitoring, prediction, and policies.</p> "> Figure 6
<p>Types of thresholds.</p> "> Figure 7
<p>Cloud data center: reference architecture.</p> "> Figure 8
<p>Classification of the market-oriented model.</p> "> Figure 9
<p>Cloud monitoring open issues.</p> "> Figure 10
<p>Metrics and policies example.</p> "> Figure 11
<p>CPU Utilization Graph: x-axis—time stamp in ms; y-axis—percentage of utilization.</p> "> Figure 12
<p>Prediction of CPU utilization.</p> "> Figure 13
<p>Memory utilization prediction.</p> "> Figure 14
<p>Memory utilization.</p> "> Figure 15
<p>Network-transmitted throughput prediction.</p> "> Figure 15 Cont.
<p>Network-transmitted throughput prediction.</p> "> Figure 16
<p>Network-transmitted throughput.</p> "> Figure 17
<p>Comparative analysis of various ML approaches.</p> "> Figure 18
<p>Mapping of cloud mechanisms to cloud characteristics.</p> ">
Abstract
:1. Introduction
1.1. Metrics and Policies in CC
1.2. Motivation
- Efficient resource allocation in dynamic IoT and cloud environments by SLA management optimization.
- The primary aim is minimizing resource wastage while enhancing system performance.
- The need for scalability in IoT and cloud systems has spurred the development of scalable architectures and advanced load-balancing techniques.
- This research article discusses a significant role in addressing the exponential surge of IoT devices and data, guaranteeing optimal resource utilization while preventing performance bottlenecks.
1.3. Contribution
- Discussion of Various SLAs: We provide a comprehensive exploration of diverse service-level agreements (SLAs) and their associated parameters. These discussions shed light on the intricate aspects of SLAs and their integral role in cloud service contracts and negotiations.
- Linking SLAs to Quality of Service (QoS): Recognizing the crucial relationship between SLAs and quality of service (QoS), we emphasize how SLAs directly impact the quality of the services provided. This linkage underscores the paramount importance of SLAs in delivering satisfactory user experiences.
- Exploration of SLA Metrics: We conduct an in-depth examination of SLA metrics and their profound significance in the realm of IT resource management. These metrics serve as indispensable tools for assessing service quality, enabling providers and users to maintain agreed-upon service standards.
- Utilization of Metrics for CC Monitoring and Management: We shed light on the practical applications of metrics in cloud computing (CC) monitoring and management techniques. These metrics play a pivotal role in ensuring the efficient utilization of resources and the fulfillment of SLAs.
- Case Study on IoT-based Cloud Resource Utilization: This article culminates with a detailed case study showcasing the application of metrics to maintain CPU utilization in an Internet of Things (IoT)-based cloud environment. This real-world example highlights the practical relevance of the concepts discussed throughout this article.
2. Relationship between Monitoring, Prediction, and Policies
3. Policies and SLA Management
- Feasibility Analysis: This phase involves three types of feasibility analysis: technical, infrastructure, and financial. It aims to determine the suitability of resources to ensure that the projected demands of the applications can be met.
- On-boarding: On-boarding refers to the process of migrating an application to the cloud, accompanied by the use of corresponding SLAs. This phase also involves the creation of the policies (comprising various rules and operational policies) necessary to ensure the fulfillment of service-level objectives (SLOs) specified in the application’s SLAs.
- Pre-Production and Production: In the pre-production phase, the application operates in a simulated environment to test its adherence to the specified SLAs. If this phase proceeds smoothly, the application moves on to the production phase, where it runs in the actual cloud environment.
- Termination: When a customer decides to withdraw an application running in the cloud, the termination phase is initiated, leading to the cessation of the application.
4. Metrics Identified in Cloud Computing and Policy-Making Criteria
- Computing performance often centers on response time, a crucial factor in determining system efficiency and user satisfaction.
- Quality of service (QoS) is upheld when the resources consumed remain below the total available resources in the computing environment, ensuring optimal service delivery and user experience [129].
- Cost efficiency, specifically in terms of energy consumption, significantly impacts overall performance, with an emphasis on maintaining lower operational costs and environmental impact [130].
- The overall effectiveness of a task in the cloud environment is evaluated based on the lowest total execution time, a metric that reflects the system’s responsiveness and efficiency.
5. Relationship between the Metrics and Policies
- Proactive: Proactive monitoring involves making decisions based on predefined rules before tasks are allocated to the cloud environment.
- Reactive: Reactive monitoring entails making decisions by observing the current requests and their response parameters.
- Contractual: Contractual monitoring relies on decisions based on service-level agreements (SLAs).
6. Market-Oriented Architecture for the Data Centers
- Users and Brokers: These entities play a crucial role in initiating workloads that the data center will manage. They are responsible for interacting with the data center and making requests for various cloud services.
- SLA Resource Allocation Mechanism: This component serves as the vital interface between the cloud service provider and the data center [135]. Its primary objective is to ensure that the services provided align with the service-level agreements (SLAs) agreed upon with the clients. It facilitates the allocation of resources in accordance with these SLAs.
- Admission Control Module and Service Request Examiner: This module evaluates the current state of the data center, including the availability of resources. It is responsible for scheduling and allocating requests for execution based on the available resources and the defined SLAs.
- Module for Pricing: This component is responsible for determining the charges for users based on the terms specified in their SLAs. It considers parameters, such as virtual machines, memory, computing capacity, disk size, and usage time.
- Accounting Module: This module generates billing data based on the actual resource usage by the users. It plays a critical role in maintaining transparency and accuracy in billing processes.
- Dispatcher: The dispatcher is responsible for instructing the infrastructure to deploy the necessary machines to fulfill user requests. It plays a significant role, particularly in the case of Infrastructure as a Service (IaaS), by managing the allocation of resources.
- Resource Monitor: This component is continuously engaged in monitoring the status of computing resources, including both physical and virtual resources. It plays a critical role in ensuring the optimal utilization and performance of the available resources.
- Services of Request Monitor: This component tracks the progress of service requests, providing valuable insights into the system’s performance and offering quality feedback on the provider’s capabilities. It helps in maintaining a high level of service quality and user satisfaction.
- Virtual Machines (VMs): VMs are fundamental units within the cloud computing (CC) infrastructure. They serve as the building blocks for addressing various user requirements and enabling the provisioning of different cloud services.
- Physical Machines: At the lowest level of the architecture, the physical machines constitute the core physical infrastructure, which can encompass one or more data centers. This layer provides the necessary physical resources required to meet the demands of the users and the services they request.
- Game Theory: Users engage in a provision game with various payoffs based on specific actions and different strategies. Game theory provides a framework for understanding strategic interactions among rational decision-makers.
- Proportional Share: This approach aims to allocate tasks fairly across a set of resources, with shares directly related to the user’s bid. It ensures proportional distribution based on user demands and resource availability.
- Market Commodity: Cloud data center providers charge consumers based on their resource usage, and these charges may vary over time. This model allows for flexible pricing that can adapt to changes in demand and resource availability.
- Posted Price: Similar to the market commodity model, the posted price approach may include special discounts and offers for specific users. It offers transparency in pricing and allows users to make informed decisions based on the available options.
- Contract Net: End users advertise their requirements and invite resource owners to submit bids. Resource owners respond based on their resource availability and capabilities. The end user then consolidates the bids and selects the most favorable one, creating a contractual agreement.
- Bargaining: Negotiations between providers and resource consumers determine the final resource price. This model allows for flexibility and mutual agreement between the parties involved, ensuring that both parties benefit from the transaction.
- Auction: Initially, resource prices are unknown, and competitive bids, regulated by a third party (the auctioneer), determine the final price. Auctions provide a competitive environment where users can bid based on their willingness to pay, resulting in optimal resource allocation and fair pricing.
7. Case Study: Utilizing Metrics, Policies, and Machine Learning for IoT-Based Cloud Monitoring
7.1. Dataset
7.2. Hardware Setup
7.3. Monitoring IoT-Based Cloud Resources
- CPU Usage: This metric reflects the percentage of CPU utilization, offering insights into the processing load and performance demands on the virtualized computing resources.
- Memory Usage: Representing the percentage of memory utilization, this metric provides essential information about the memory requirements and allocation efficiency within the cloud environment.
- Network-Transmitted Throughput: Measured in kilobytes per second (KB/s), this metric is indicative of the data transmission rate through the network, which is critical for evaluating the efficiency of data communication and network performance.
7.4. Solution Approach
7.4.1. Metrics and Policies
7.4.2. Machine Learning Predictions
7.5. Algorithm: Effective Resource Monitoring Using Metrics and Policies
Algorithm 1 Steps for effective resource monitoring using metrics and policies |
|
7.6. Evaluation of Machine Learning Predictions
7.7. E-Commerce Benefits for Running in IoT and Cloud Computing
- Reduced Investment Costs: Leveraging cloud infrastructure allows businesses to lower upfront investment costs by procuring IT resources in a cost-effective manner [138].
- Operational Cost Reduction: Cloud platforms enable businesses to scale IT resources, such as CPU, memory, and storage, according to demand, leading to cost savings over time.
- On-Demand Service Provisioning: Cloud services provide on-demand access and agility for end users, allowing businesses to quickly adapt to changing market demands [139].
- Improved Service Quality: Cloud-based e-commerce platforms can enforce critical service-level agreements (SLAs) and enhance computational resilience, resulting in heightened service quality for end users [140].
7.8. Proposals to Improve New Application Challenges for E-Commerce Deployment Using IoT in Cloud Computing
- Develop New IT Practices: Establish innovative IT practices that align with evolving market demands, focusing on IT earnings, technology lifecycle management, and data center management to adapt to changing business landscapes [23].
- ROI Identification and Planning: Invest in continuous training and monitoring to accurately identify the return on investment (ROI) and effectively plan the capacity to meet the demands of e-commerce applications powered by the IoT and cloud computing [11].
- Virtualization Platform Selection: Choose the most suitable virtualization platform to facilitate efficient provisioning and de-provisioning of IT resources, ensuring optimal SLA monitoring, billing, and resource management to support e-commerce operations [12].
- Governance and Resiliency: Implement governance and organizational strategies to effectively manage and control large-scale resiliency, negotiate cloud-based agreements with clients, and foster trust in cloud services, which are essential for a successful e-commerce ecosystem [13].
- Mobile Business Expansion: Embrace the growing influence of mobile access to cloud services and ensure that cloud offerings are well aligned with the evolving mobile business landscape to support e-commerce operations efficiently [14].
8. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Capra, M.; Peloso, R.; Masera, G.; Ruo Roch, M.; Martina, M. Edge computing: A survey on the hardware requirements in the internet of things world. Future Internet 2019, 11, 100. [Google Scholar] [CrossRef]
- Luong, N.C.; Wang, P.; Niyato, D.; Wen, Y.; Han, Z. Resource Management in Cloud Networking Using Economic Analysis and Pricing Models: A Survey. IEEE Commun. Surv. Tutorials 2017, 19, 954–1001. [Google Scholar] [CrossRef]
- Breitgand, D.; Silva, D.M.D.; Epstein, A.; Glikson, A.; Hines, M.R.; Ryu, K.D.; Silva, M.A. Dynamic Virtual Machine Resizing in a Cloud Computing Infrastructure. U.S. Patent 9,858,095, 1 February 2018. [Google Scholar]
- Soumya, E.; Kumar, V.S.; Vineela, T.; Aishwarya, M. Conducive Tracking, Monitoring, and Managing of Cloud Resources. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2018, 3, 385–390. [Google Scholar]
- Tsai, W.; Sun, X.; Balasooriya, J. Service-Oriented Cloud Computing Architecture. In Proceedings of the 7th International Conference on Information Technology: New Generations (ITNG), IEEE Computer Society, Virtual Event, 10–13 April 2010; pp. 684–689. [Google Scholar]
- Alhamazani, K.; Ranjan, R.; Mitra, K.; Rabhi, F.A.; Jayaraman, P.P.; Khan, S.U.; Guabtni, A.; Bhatnagar, V. An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-art. Computing 2015, 97, 357–377. [Google Scholar] [CrossRef]
- Amiri, M.; Khanli, L.M. Survey on prediction models of applications for resources provisioning in cloud. J. Netw. Comput. Appl. 2017, 82, 93–113. [Google Scholar] [CrossRef]
- Chard, R.; Chard, K.; Wolski, R.; Madduri, R.K.; Ng, B.; Bubendorfer, K.; Foster, I.T. Cost-Aware Cloud Profiling, Prediction, and Provisioning as a Service. IEEE Cloud Comput. 2017, 4, 48–59. [Google Scholar] [CrossRef]
- Garg, R.; Prasad, V. Survey Paper on Cloud Demand Prediction and QoS Prediction. Int. J. Adv. Res. Comput. Sci. 2017, 8, 794–799. [Google Scholar]
- Souza, V.B.; Masip-Bruin, X.; Marín-Tordera, E.; Ramírez, W.; Sánchez-López, S. Proactive vs reactive failure recovery assessment in combined Fog-to-Cloud (F2C) systems. In Proceedings of the 22nd International IEEE Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Lund, Sweden, 19–21 June 2017; pp. 1–5. [Google Scholar]
- Kauffman, R.J.; Ma, D.; Yu, M. A Metrics Suite of Cloud Computing Adoption Readiness. Electron. Mark. 2018, 28, 11–37. [Google Scholar] [CrossRef]
- Prasad, V.K.; Shah, M.; Bhavsar, M.D. Trust Management and Monitoring at an IaaS Level of Cloud Computing. In Proceedings of the 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), Jaipur, India, 27–28 March 2018; pp. 26–27. [Google Scholar]
- Singh, A.; Kinger, S. An Efficient Fault Tolerance Mechanism Based on Moving Averages Algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 937–942. [Google Scholar]
- Cai, H.; Gu, Y.; Vasilakos, A.V.; Xu, B.; Zhou, J. Model-Driven Development Patterns for Mobile Services in Cloud of Things. IEEE Trans. Cloud Comput. 2018, 6, 771–784. [Google Scholar] [CrossRef]
- Comuzzi, M.; Kotsokalis, C.; Spanoudakis, G.; Yahyapour, R. Establishing and Monitoring SLAs in Complex Service Based Systems. In Proceedings of the IEEE International Conference on Web Services (ICWS), IEEE Computer Society, San Francisco, CA, USA, 27 June–2 July 2009; pp. 783–790. [Google Scholar]
- Waldman, H.; Mello, D.A.A. On the Risk of non-compliance with some Plausible SLA Requirements. In Proceedings of the 11th International IEEE Conference on Transparent Optical Networks, Azores, Portugal, 28 Junue–2 July 2009; pp. 1–4. [Google Scholar]
- Kleinberg, J.; Ludwig, J.; Mullainathan, S.; Obermeyer, Z. Prediction Policy Problems. Am. Econ. Rev. 2015, 105, 491–495. [Google Scholar] [CrossRef] [PubMed]
- Noshy, M.; Ibrahim, A.; Ali, H.A. Optimization of live virtual machine migration in cloud computing: A survey and future directions. J. Netw. Comput. Appl. 2018, 110, 1–10. [Google Scholar] [CrossRef]
- Liu, Y.; Daum, P.H.; McGraw, R.; Miller, M. Generalized Threshold Function Accounting for Effect of Relative Dispersion on Threshold Behavior of Autoconversion Process. Geophys. Res. Lett. 2006, 33, 11. [Google Scholar] [CrossRef]
- Rai, S.C.; Nayak, S.P.; Acharya, B.; Gerogiannis, V.C.; Kanavos, A.; Panagiotakopoulos, T. ITSS: An Intelligent Traffic Signaling System Based on an IoT Infrastructure. Electronics 2023, 12, 1177. [Google Scholar] [CrossRef]
- Somani, G.; Gaur, M.S.; Sanghi, D.; Conti, M.; Buyya, R. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. Comput. Commun. 2017, 107, 30–48. [Google Scholar] [CrossRef]
- Wu, X.; Zhang, R.; Zeng, B.; Zhou, S. A Trust Evaluation Model for Cloud Computing. In Proceedings of the 1st International Conference on Information Technology and Quantitative Management (ITQM), Suzhou, China, 3 June 2013; Volume 17, pp. 1170–1177. [Google Scholar]
- Buyya, R.; Broberg, J.; Goscinski, A.M. Cloud Computing: Principles and Paradigms; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
- Jennings, B.; Stadler, R. Resource Management in Clouds: Survey and Research Challenges. J. Netw. Syst. Manag. 2015, 23, 567–619. [Google Scholar] [CrossRef]
- Ksentini, A.; Jebalia, M.; Tabbane, S. IoT/Cloud-enabled smart services: A review on QoS requirements in fog environment and a proposed approach based on priority classification technique. Int. J. Commun. Syst. 2021, 34, e4269. [Google Scholar] [CrossRef]
- Ramaiah, N.S. Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis. Big Data Min. Anal. 2023, 6, 127–138. [Google Scholar] [CrossRef]
- Riekstin, A.C.; Rodrigues, B.B.; Nguyen, K.K.; de Brito Carvalho, T.C.M.; Meirosu, C.; Stiller, B.; Cheriet, M. A survey on metrics and measurement tools for sustainable distributed cloud networks. IEEE Commun. Surv. Tutorials 2017, 20, 1244–1270. [Google Scholar] [CrossRef]
- Chen, J.; Hagos, S.; Feng, Z.; Fast, J.D.; Xiao, H. The Role of Cloud–Cloud Interactions in the Life Cycle of Shallow Cumulus Clouds. J. Atmos. Sci. 2023, 80, 671–686. [Google Scholar] [CrossRef]
- Henning, S.; Hasselbring, W. A configurable method for benchmarking scalability of cloud-native applications. Empir. Softw. Eng. 2022, 27, 143. [Google Scholar] [CrossRef]
- Tusa, F.; Clayman, S. End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum. Future Gener. Comput. Syst. 2023, 141, 473–488. [Google Scholar] [CrossRef]
- Adane, M. Business-driven approach to cloud computing adoption by small businesses. Afr. J. Sci. Technol. Innov. Dev. 2023, 15, 166–174. [Google Scholar] [CrossRef]
- Lagartinho-Oliveira, C.; Moutinho, F.; Gomes, L. Support Operation and Maintenance of Power Wheelchairs with Digital Twins: The IoT and Cloud-Based Data Exchange. In Proceedings of the Doctoral Conference on Computing, Electrical and Industrial Systems, Caparica, Portugal, 3–5 July 2023; pp. 191–202. [Google Scholar]
- Park, J.; Han, K.; Lee, B. Green cloud? An empirical analysis of cloud computing and energy efficiency. Manag. Sci. 2023, 69, 1639–1664. [Google Scholar] [CrossRef]
- Seneviratne, S.; Levy, D.C.; De Silva, L.C. A Taxonomy of Performance Forecasting Systems in the Serverless Cloud Computing Environments. In Serverless Computing: Principles and Paradigms; Springer: Berlin/Heidelberg, Germany, 2023; pp. 79–120. [Google Scholar]
- ISO/IEC 25010. Available online: https://iso25000.com/index.php/en/iso-25000-standards/iso-25010 (accessed on 24 September 2023).
- Abd, S.K.; Al-Haddad, S.A.R.; Hashim, F.; Abdullah, A.B.; Yussof, S. An effective approach for managing power consumption in cloud computing infrastructure. J. Comput. Sci. 2017, 21, 349–360. [Google Scholar] [CrossRef]
- Al-Jawad, A.; Trestian, R.; Shah, P.; Gemikonakli, O. Baprobsdn: A probabilistic-based qos routing mechanism for software defined networks. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK, 13–17 April 2015; pp. 1–5. [Google Scholar]
- de Oliveira, F.A., Jr.; Ledoux, T. Self-management of applications QoS for energy optimization in datacenters. In Proceedings of the Green Computing Middleware on Proceedings of the 2nd International Workshop, Lisbon, Portugal, 12 December 2011; pp. 1–6. [Google Scholar]
- Ezenwoke, A.; Daramola, O.; Adigun, M. QoS-based ranking and selection of SaaS applications using heterogeneous similarity metrics. J. Cloud Comput. 2018, 7, 1–12. [Google Scholar] [CrossRef]
- Garg, S.K.; Versteeg, S.; Buyya, R. A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 2013, 29, 1012–1023. [Google Scholar] [CrossRef]
- Ghahramani, M.H.; Zhou, M.; Hon, C.T. Toward cloud computing QoS architecture: Analysis of cloud systems and cloud services. IEEE/CAA J. Autom. Sin. 2017, 4, 6–18. [Google Scholar] [CrossRef]
- Zheng, X.; Martin, P.; Brohman, K.; Da Xu, L. CLOUDQUAL: A quality model for cloud services. IEEE Trans. Ind. Inform. 2014, 10, 1527–1536. [Google Scholar] [CrossRef]
- Prasad, V.K.; Bhavsar, M.D. SLAMMP framework for cloud resource management and its impact on healthcare computational techniques. Int. J. Health Med. Commun. 2021, 12, 1–31. [Google Scholar] [CrossRef]
- Prasad, V.K.; Tanwar, S.; Bhavsar, M.D. Advance cloud data analytics for 5G enabled IoT. In Blockchain for 5G-Enabled IoT: The New Wave for Industrial Automation; Springer: Berlin/Heidelberg, Germany, 2021; pp. 159–180. [Google Scholar]
- Didachos, C.; Kintos, D.P.; Fousteris, M.; Mylonas, P.; Kanavos, A. An optimized cloud computing method for extracting molecular descriptors. In Worldwide Congress on “Genetics, Geriatrics and Neurodegenerative Diseases Research”; Springer: Berlin/Heidelberg, Germany, 2022; pp. 247–254. [Google Scholar]
- Didachos, C.; Kintos, D.P.; Fousteris, M.; Gerogiannis, V.C.; Le Hoang, S.; Kanavos, A. A cloud-based distributed computing approach for extracting molecular descriptors. In Proceedings of the 6th International Conference on Algorithms, Computing and Systems (ICACS), Larissa, Greece, 16–18 September 2022; pp. 1–6. [Google Scholar]
- Zhu, L.; Zhuang, Q.; Jiang, H.; Liang, H.; Gao, X.; Wang, W. Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning. J. Cloud Comput. 2023, 12, 147. [Google Scholar] [CrossRef]
- Khurana, S.; Sharma, G.; Kumar, M.; Goyal, N.; Sharma, B. Reliability Based Workflow Scheduling on Cloud Computing with Deadline Constraint. Wirel. Pers. Commun. 2023, 130, 1417–1434. [Google Scholar] [CrossRef]
- Qin, S.; Pi, D.; Shao, Z.; Xu, Y.; Chen, Y. Reliability-Aware Multi-Objective Memetic Algorithm for Workflow Scheduling Problem in Multi-Cloud System. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 1343–1361. [Google Scholar] [CrossRef]
- Khaleel, M.I. Hybrid cloud-fog computing workflow application placement: Joint consideration of reliability and time credibility. Multimed. Tools Appl. 2023, 82, 18185–18216. [Google Scholar] [CrossRef]
- Liang, J.; Ma, B.; Feng, Z.; Huang, J. Reliability-aware Task Processing and Offloading for Data-intensive Applications in Edge computing. IEEE Trans. Netw. Serv. Manag. 2023. [Google Scholar] [CrossRef]
- Ding, R.; Xu, Y.; Zhong, H.; Cui, J.; Sha, K. Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. IEEE Trans. Serv. Comput. 2023, 16, 3782–3795. [Google Scholar] [CrossRef]
- Ma, H.; Li, R.; Zhang, X.; Zhou, Z.; Chen, X. Reliability-aware online scheduling for dnn inference tasks in mobile edge computing. IEEE Internet Things J. 2023, 10, 11453–11464. [Google Scholar] [CrossRef]
- Fesenko, H.; Illiashenko, O.; Kharchenko, V.; Kliushnikov, I.; Morozova, O.; Sachenko, A.; Skorobohatko, S. Flying Sensor and Edge Network-Based Advanced Air Mobility Systems: Reliability Analysis and Applications for Urban Monitoring. Drones 2023, 7, 409. [Google Scholar] [CrossRef]
- Chamkoori, A.; Katebi, S. Security and storage improvement in distributed cloud data centers by increasing reliability based on particle swarm optimization and artificial immune system algorithms. Concurr. Comput. Pract. Exp. 2023, 35, 1. [Google Scholar] [CrossRef]
- Taghavi, M.; Bentahar, J.; Otrok, H.; Bakhtiyari, K. A reinforcement learning model for the reliability of blockchain oracles. Expert Syst. Appl. 2023, 214, 119160. [Google Scholar] [CrossRef]
- Xu, H.; Xu, S.; Wei, W.; Guo, N. Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers. J. Supercomput. 2023, 79, 2603–2625. [Google Scholar] [CrossRef]
- Zdun, U.; Queval, P.J.; Simhandl, G.; Scandariato, R.; Chakravarty, S.; Jelic, M.; Jovanovic, A. Microservice security metrics for secure communication, identity management, and observability. ACM Trans. Softw. Eng. Methodol. 2023, 32, 1–34. [Google Scholar] [CrossRef]
- Ibnugraha, P.D.; Satria, A.; Nagari, F.S.; Rizal, M.F.; NonAlinsavath, K.N. The Reliability Analysis for Information Security Metrics in Academic Environment. JOIV Int. J. Inform. Vis. 2023, 7, 92–97. [Google Scholar] [CrossRef]
- Madavarapu, J.B.; Yalamanchili, R.K.; Mandhala, V.N. An Ensemble Data Security on Cloud Healthcare Systems. In Proceedings of the 2023 4th International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 20–22 September 2023; pp. 680–686. [Google Scholar]
- Ali, M.; Jung, L.T.; Sodhro, A.H.; Laghari, A.A.; Belhaouari, S.B.; Gillani, Z. A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security. Alex. Eng. J. 2023, 64, 749–760. [Google Scholar] [CrossRef]
- Alam, M.; Shahid, M.; Mustajab, S. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. Clust. Comput. 2023, 2023, 1–36. [Google Scholar] [CrossRef]
- Singh, K.K.; Jha, V.K. Security enhancement of the cloud paradigm using a novel optimized crypto mechanism. Multimed. Tools Appl. 2023, 82, 15983–16007. [Google Scholar] [CrossRef]
- Prasad, V.K.; Tanwar, S.; Bhavsar, M. C2B-SCHMS: Cloud computing and bots security for COVID-19 data and healthcare management systems. In Proceedings of the Second International Conference on Computing, Communications, and Cyber-Security: IC4S 2020, Delhi, India, 18–20 September 2021; pp. 787–797. [Google Scholar]
- Chudasama, V.; Mewada, A.; Prasad, V.K.; Shah, A.; Bhavasar, M. CS2M: Cloud security and SLA management. Ann. Rom. Soc. Cell Biol. 2021, 2021, 4459–4465. [Google Scholar]
- Dansana, D.; Prasad, V.K.; Bhavsar, M.; Mishra, B.K. Intensify Cloud Security and Privacy Against Phishing Attacks. SPAST Abstr. 2021, 1, 12. [Google Scholar]
- Bakshi, M.S.; Banker, D.; Prasad, V.; Bhavsar, M. SMLHADC: Security Model for Load Harmonization and Anomaly Detection in Cloud. In Internet of Things and Its Applications: Select Proceedings of ICIA 2020; Springer: Berlin/Heidelberg, Germany, 2022; pp. 407–418. [Google Scholar]
- Pratyush, K.; Prasad, V.K.; Mehta, R.; Bhavsar, M. A Secure Mechanism for Safeguarding Cloud Infrastructure. In Proceedings of the International Conference on Advancements in Smart Computing and Information Security, Bhubaneswar, India, 19–20 November 2022; pp. 144–158. [Google Scholar]
- Verma, A.; Bhattacharya, P.; Prasad, V.K.; Datt, R.; Tanwar, S. AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders. In Proceedings of the International Conference on Computing, Communications, and Cyber-Security, Virtual Event, 17–19 October 2022; pp. 873–886. [Google Scholar]
- Abbas, Z.; Myeong, S. Enhancing Industrial Cyber Security, Focusing on Formulating a Practical Strategy for Making Predictions Through Machine Learning Tools in Cloud Computing Environment. Electronics 2023, 12, 2650. [Google Scholar] [CrossRef]
- Chahin, N.; Mansour, A. Improving the IoT and Cloud Computing integration using Hybrid Encryption. WSEAS Trans. Des. Constr. Maint. 2023, 3, 1–6. [Google Scholar] [CrossRef]
- Badri, S.; Alghazzawi, D.M.; Hasan, S.H.; Alfayez, F.; Hasan, S.H.; Rahman, M.; Bhatia, S. An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing. Electronics 2023, 12, 1441. [Google Scholar] [CrossRef]
- Karamitsos, I.; Papadaki, M.; Al-Hussaeni, K.; Kanavos, A. Transforming Airport Security: Enhancing Efficiency through Blockchain Smart Contracts. Electronics 2023, 12, 4492. [Google Scholar] [CrossRef]
- Herbst, N.; Bauer, A.; Kounev, S.; Oikonomou, G.; Eyk, E.V.; Kousiouris, G.; Evangelinou, A.; Krebs, R.; Brecht, T.; Abad, C.L.; et al. Quantifying cloud performance and dependability: Taxonomy, metric design, and emerging challenges. ACM Trans. Model. Perform. Eval. Comput. Syst. 2018, 3, 1–36. [Google Scholar] [CrossRef]
- Herbst, N.; Krebs, R.; Oikonomou, G.; Kousiouris, G.; Evangelinou, A.; Iosup, A.; Kounev, S. Ready for rain? A view from SPEC research on the future of cloud metrics. arXiv 2016, arXiv:1604.03470. [Google Scholar]
- Jangra, A.; Mangla, N. An efficient load balancing framework for deploying resource schedulingin cloud based communication in healthcare. Meas. Sensors 2023, 25, 100584. [Google Scholar] [CrossRef]
- Cheng, Q.; Sahoo, D.; Saha, A.; Yang, W.; Liu, C.; Woo, G.; Singh, M.; Saverese, S.; Hoi, S.C. AI for IT Operations (AIOps) on Cloud Platforms: Reviews, Opportunities and Challenges. arXiv 2023, arXiv:2304.04661. [Google Scholar]
- Bian, H.; Sha, T.; Ailamaki, A. Using Cloud Functions as Accelerator for Elastic Data Analytics. Proc. ACM Manag. Data 2023, 1, 1–27. [Google Scholar] [CrossRef]
- Shahid, M.A.; Alam, M.M.; Su’ud, M.M. Performance Evaluation of Load-Balancing Algorithms with Different Service Broker Policies for Cloud Computing. Appl. Sci. 2023, 13, 1586. [Google Scholar] [CrossRef]
- Russo, G.R.; Mannucci, T.; Cardellini, V.; Presti, F.L. Serverledge: Decentralized function-as-a-service for the edge-cloud continuum. In Proceedings of the 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), Atlanta, GA, USA, 13–17 March 2023; pp. 131–140. [Google Scholar]
- Iftikhar, S.; Ahmad, M.M.M.; Tuli, S.; Chowdhury, D.; Xu, M.; Gill, S.S.; Uhlig, S. HunterPlus: AI based energy-efficient task scheduling for cloud–fog computing environments. Internet Things 2023, 21, 100667. [Google Scholar] [CrossRef]
- Costa, J.; Matos, R.; Araujo, J.; Li, J.; Choi, E.; Nguyen, T.A.; Lee, J.W.; Min, D. Software aging effects on kubernetes in container orchestration systems for digital twin cloud infrastructures of urban air mobility. Drones 2023, 7, 35. [Google Scholar] [CrossRef]
- Mahalingam, H.; Velupillai Meikandan, P.; Thenmozhi, K.; Moria, K.M.; Lakshmi, C.; Chidambaram, N.; Amirtharajan, R. Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments. Mathematics 2023, 11, 1769. [Google Scholar] [CrossRef]
- Deepika, T.; Dhanya, N. Multi-objective prediction-based optimization of power consumption for cloud data centers. Arab. J. Sci. Eng. 2023, 48, 1173–1191. [Google Scholar] [CrossRef]
- Adeppady, M.; Giaccone, P.; Karl, H.; Chiasserini, C.F. Reducing microservices interference and deployment time in resource-constrained cloud systems. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3135–3147. [Google Scholar] [CrossRef]
- Wu, W.; Lu, J.; Zhang, H. A fractal-theory-based multi-agent model of the cyber physical production system for customized products. J. Manuf. Syst. 2023, 67, 143–154. [Google Scholar] [CrossRef]
- Buttar, A.M.; Khalid, A.; Alenezi, M.; Akbar, M.A.; Rafi, S.; Gumaei, A.H.; Riaz, M.T. Optimization of DevOps Transformation for Cloud-Based Applications. Electronics 2023, 12, 357. [Google Scholar] [CrossRef]
- Golec, M.; Gill, S.S.; Parlikad, A.K.; Uhlig, S. HealthFaaS: AI based Smart Healthcare System for Heart Patients using Serverless Computing. IEEE Internet Things J. 2023, 10, 18469–18476. [Google Scholar] [CrossRef]
- Vonitsanos, G.; Panagiotakopoulos, T.; Kanavos, A. Issues and challenges of using blockchain for iot data management in smart healthcare. Biomed. J. Sci. Tech. Res. 2021, 40, 32052–32057. [Google Scholar]
- Krania, A.; Statiri, M.; Kanavos, A.; Tsakalidis, A. Internet of things services for healthcare systems. In Proceedings of the 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA), Larnaca, Cyprus, 27–30 August 2017; pp. 1–6. [Google Scholar]
- Hasan, M.H.; Osman, M.H.; Novia, I.A.; Muhammad, M.S. From Monolith to Microservice: Measuring Architecture Maintainability. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 5. [Google Scholar] [CrossRef]
- Sriraman, G.; Raghunathan, S. A Systems Thinking Approach to Improve Sustainability in Software Engineering—A Grounded Capability Maturity Framework. Sustainability 2023, 15, 8766. [Google Scholar] [CrossRef]
- Yu, Y.C. Smart Parking System Based on Edge-Cloud-Dew Computing Architecture. Electronics 2023, 12, 2801. [Google Scholar] [CrossRef]
- Himayat, S.; Ahmad, D.J. Prediction systems for process understandability and software metrics. SSRN 2023, 2023, 4514290. [Google Scholar] [CrossRef]
- Saini, M.; Choudhary, R.; Kumar, A.; Saini, D.K. Mathematical modeling and RAMD investigation of cloud infrastructure. Int. J. Inf. Technol. 2023, 2023, 1–12. [Google Scholar] [CrossRef]
- Souza, L.; Camboim, K.; Araujo, J.; Alencar, F.; Maciel, P.; Ferreira, J. Dependability evaluation and sensitivity analysis of data center cooling systems. J. Supercomput. 2023, 2023, 1–29. [Google Scholar] [CrossRef]
- Pundir, M.; Sandhu, J.K.; Gupta, D.; Gupta, P.; Juneja, S.; Nauman, A.; Mahmoud, A. MD-MARS: Maintainability Framework Based on Data Flow Prediction Using Multivariate Adaptive Regression Splines Algorithm in Wireless Sensor Network. IEEE Access 2023, 11, 10604–10622. [Google Scholar] [CrossRef]
- Mihai, I.S. A Systematic Evaluation of Microservice Architectures Resulting from Domain-Driven and Dataflow-Driven Decomposition. Bachelor’s Thesis, University of Twente, Enschede, The Netherlands, 2023. [Google Scholar]
- Hamid, K.; Iqbal, M.W.; Abbas, Q.; Arif, M.; Brezulianu, A.; Geman, O. Cloud Computing Network Empowered by Modern Topological Invariants. Appl. Sci. 2023, 13, 1399. [Google Scholar] [CrossRef]
- Nikolaidis, N.; Arvanitou, E.M.; Volioti, C.; Maikantis, T.; Ampatzoglou, A.; Feitosa, D.; Chatzigeorgiou, A.; Krief, P. Eclipse Open SmartCLIDE: An End-to-End Framework for Facilitating Service Reuse in Cloud Development. J. Syst. Softw. 2023, 2023, 111877. [Google Scholar] [CrossRef]
- Abraham, A.; Yang, J. A Comparative Analysis of Performance and Usability on Serverless and Server-Based Google Cloud Services. In Proceedings of the International Conference on Advances in Computing Research, Orlando, FL, USA, 8–10 May 2023; pp. 408–422. [Google Scholar]
- Saleem, M.; Warsi, M.; Islam, S. Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. J. Inf. Secur. Appl. 2023, 72, 103389. [Google Scholar] [CrossRef]
- Hong, F.; Wang, L.; Li, C.Z. Adaptive mobile cloud computing on college physical training education based on virtual reality. Wirel. Netw. 2023, 2023, 1–24. [Google Scholar] [CrossRef]
- Fazel, E.; Shayan, A.; Mahmoudi Maymand, M. Designing a model for the usability of fog computing on the internet of things. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 5193–5209. [Google Scholar] [CrossRef]
- Spichkova, M.; Schmidt, H.W.; Yusuf, I.I.; Thomas, I.E.; Androulakis, S.; Meyer, G.R. Towards modelling and implementation of reliability and usability features for research-oriented cloud computing platforms. In Proceedings of the Evaluation of Novel Approaches to Software Engineering: 11th International Conference, ENASE 2016, Rome, Italy, 27–28 April 2016, Revised Selected Papers 11; Springer: Berlin/Heidelberg, Germany, 2016; pp. 158–178. [Google Scholar]
- Agarwal, R.; Dhingra, S. Factors influencing cloud service quality and their relationship with customer satisfaction and loyalty. Heliyon 2023, 9, 4. [Google Scholar] [CrossRef] [PubMed]
- Wu, X.; Jin, Z.; Zhou, J.; Duan, C. Quantum Walks-based Classification Model with Resistance for Cloud Computing Attacks. Expert Syst. Appl. 2023, 2023, 120894. [Google Scholar] [CrossRef]
- Vlachogianni, P.; Tselios, N. Perceived Usability Evaluation of Educational Technology Using the Post-Study System Usability Questionnaire (PSSUQ): A Systematic Review. Sustainability 2023, 15, 12954. [Google Scholar] [CrossRef]
- Tan, J.; Shao, L.; Lam, N.Y.K.; Toomey, A.; Chan, H.H.; Lee, C.; Feng, G.Y. Evaluating the usability of a prototype gesture-controlled illuminative textile. J. Text. Inst. 2023, 2023, 1–7. [Google Scholar] [CrossRef]
- Monks, T.; Harper, A. Improving the usability of open health service delivery simulation models using Python and web apps. NIHR Open Res. 2023, 3, 48. [Google Scholar] [CrossRef]
- Vonitsanos, G.; Panagiotakopoulos, T.; Kanavos, A.; Kameas, A. An Apache Spark Framework for IoT-enabled Waste Management in Smart Cities. In Proceedings of the 12th Hellenic Conference on Artificial Intelligence, Corfu, Greece, 7–9 September 2022; pp. 1–7. [Google Scholar]
- Lingaraju, A.K.; Niranjanamurthy, M.; Bose, P.; Acharya, B.; Gerogiannis, V.C.; Kanavos, A.; Manika, S. IoT-Based Waste Segregation with Location Tracking and Air Quality Monitoring for Smart Cities. Smart Cities 2023, 6, 1507–1522. [Google Scholar] [CrossRef]
- Ennis, S.F.; Evans, B. Cloud Portability and Interoperability under the EU Data Act: Dynamism versus Equivalence. SSRN 2023. [Google Scholar] [CrossRef]
- Olabanji, D.; Fitch, T.; Matthew, O. Cloud-native architecture Portability Framework Validation and Implementation using Expert System. Int. J. Adv. Stud. Comput. Sci. Eng. 2023, 12, 4. [Google Scholar]
- Barnes, K.M.; Buyskikh, A.; Chen, N.Y.; Gallardo, G.; Ghibaudi, M.; Ruszala, M.J.; Underwood, D.S.; Agarwal, A.; Lall, D.; Runggar, I.; et al. Optimising the quantum/classical interface for efficiency and portability with a multi-level hardware abstraction layer for quantum computers. EPJ Quantum Technol. 2023, 10, 36. [Google Scholar] [CrossRef]
- Malahleka, M. The right to data portability: A ghost in the protection of personal information. J. So. Afr. Law 2023, 2023, 1. [Google Scholar] [CrossRef]
- Islam, R.; Patamsetti, V.; Gadhi, A.; Gondu, R.M.; Bandaru, C.M.; Kesani, S.C.; Abiona, O. The Future of Cloud Computing: Benefits and Challenges. Int. J. Commun. Netw. Syst. Sci. 2023, 16, 53–65. [Google Scholar] [CrossRef]
- Jeon, D.S.; Menicucci, D.; Nasr, N. Compatibility Choices, Switching Costs, and Data Portability. Am. Econ. J. Microeconomics 2023, 15, 30–73. [Google Scholar] [CrossRef]
- Kaur, K.; Bharany, S.; Badotra, S.; Aggarwal, K.; Nayyar, A.; Sharma, S. Energy-efficient polyglot persistence database live migration among heterogeneous clouds. J. Supercomput. 2023, 79, 265–294. [Google Scholar] [CrossRef]
- Pacheco, J.A.; Rasmussen, L.V.; Wiley, K., Jr.; Person, T.N.; Cronkite, D.J.; Sohn, S.; Murphy, S.; Gundelach, J.H.; Gainer, V.; Castro, V.M.; et al. Evaluation of the portability of computable phenotypes with natural language processing in the eMERGE network. Sci. Rep. 2023, 13, 1971. [Google Scholar] [CrossRef] [PubMed]
- Mpofu, P.; Kembo, S.H.; Chimbwanda, M.; Jacques, S.; Chitiyo, N.; Zvarevashe, K. A privacy-preserving federated learning architecture implementing data ownership and portability on edge end-points. Int. J. Ind. Eng. Oper. Manag. 2023. ahead-of-print. [Google Scholar] [CrossRef]
- Hosseini, L.; Kumar, S. Is Multi-Cloud the Future? Desirability of Compatibility in Cloud Computing Market. Desirability Compat. Cloud Comput. Mark. 2023, 5, 7. [Google Scholar]
- Mohiuddin, K.; Islam, A.; Islam, M.A.; Khaleel, M.; Shahwar, S.; Khan, S.A.; Yasmin, S.; Hussain, R. Component-centric mobile cloud architecture performance evaluation: An analytical approach for unified models and component compatibility with next generation evolving technologies. Mob. Netw. Appl. 2023, 28, 254–271. [Google Scholar] [CrossRef]
- Yakubu, A.S.; Kassim, A.M.; Husin, M.H. Conceptualizing hybrid model for influencing intention to adopt cloud computing in North-Eastern Nigerian academic libraries. J. Acad. Librariansh. 2023, 49, 102747. [Google Scholar] [CrossRef]
- Lall, A.; Tallur, S. Deep reinforcement learning-based pairwise DNA sequence alignment method compatible with embedded edge devices. Sci. Rep. 2023, 13, 2773. [Google Scholar] [CrossRef]
- Chi, C.; Liu, Y.; Ma, B.; Chai, S.; Zhang, P.; Yin, Z. A compatible carbon efficiency information service framework based on the industrial internet identification. Digit. Commun. Netw. 2023, in press. [Google Scholar] [CrossRef]
- Bardsiri, A.K.; Hashemi, S.M. QoS Metrics for Cloud Computing Services Evaluation. Int. J. Intell. Syst. Appl. 2014, 6, 27. [Google Scholar] [CrossRef]
- Orhean, A.I.; Pop, F.; Raicu, I. New Scheduling Approach using Reinforcement Learning for Heterogeneous Distributed Systems. J. Parallel Distrib. Comput. 2018, 117, 292–302. [Google Scholar] [CrossRef]
- Cui, D.; Peng, Z.; Xiong, J.; Xu, B.; Lin, W. A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Grid or IaaS Cloud. IEEE Trans. Cloud Comput. 2020, 8, 1030–1039. [Google Scholar] [CrossRef]
- Liu, N.; Li, Z.; Xu, J.; Xu, Z.; Lin, S.; Qiu, Q.; Tang, J.; Wang, Y. A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning. In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), IEEE Computer Society, Atlanta, GA, USA, 5–8 June 2017; pp. 372–382. [Google Scholar]
- Rethinking Monitoring for Container Operations. Available online: https://thenewstack.io/monitoring-reset-containers/ (accessed on 24 September 2023).
- Kardani-Moghaddam, S.; Buyya, R.; Ramamohanarao, K. Performance-Aware Management of Cloud Resources: A Taxonomy and Future Directions. ACM Comput. Surv. 2019, 52, 1–37. [Google Scholar]
- Erl, T.; Puttini, R.; Mahmood, Z. Cloud Computing: Concepts, Technology & Architecture; Pearson Education: London, UK, 2013. [Google Scholar]
- Peiris, C.; Balachandran, B.; Sharma, D. Governance Framework for Cloud Computing. GSTF J. Comput. 2014, 1, 14. [Google Scholar] [CrossRef]
- Anithakumari, S.; Chandrasekaran, K. Adaptive Resource Allocation in Interoperable Cloud Services. In Proceedings of the Advances in Computer Communication and Computational Sciences; Springer: Berlin/Heidelberg, Germany, 2019; pp. 229–240. [Google Scholar]
- Prasad, V.K.; Bhavsar, M. Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey. In Proceedings of the 1st International Conference on Future Internet Technologies and Trends (ICFITT), Surat, India, 31 August–2 September 2018; pp. 47–55. [Google Scholar]
- de Farias, C.M.; Pirmez, L.; Delicato, F.C.; Pires, P.F.; Guerrieri, A.; Fortino, G.; Cauteruccio, F.; Terracina, G. A multisensor data fusion algorithm using the hidden correlations in Multiapplication Wireless Sensor data streams. In Proceedings of the 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), Falerna, Italy, 16–18 May 2017; pp. 96–102. [Google Scholar] [CrossRef]
- McDonald, D.; Breslin, C.; MacDonald, A. Review of the Environmental and Organisational Implications of Cloud Computing: Final Report; University of Strathclyde: Glasgow, UK, 2010. [Google Scholar]
- Rimal, B.P.; Choi, E.; Lumb, I. A Taxonomy and Survey of Cloud Computing Systems. In Proceedings of the International Conference on Networked Computing and Advanced Information Management (NCM), IEEE Computer Society, Seoul, Republic of Korea, 25–27 August 2009; pp. 44–51. [Google Scholar]
- Kim, H.A.H.H.; Barua, S. Service Level Agreement (SLA) for Cloud Computing Compilation with Common and New Formats. Int. J. Sci. Res. Manag. 2018, 6, 2018. [Google Scholar]
Different Criteria | Possible Outcomes Related to QoS | Reference |
---|---|---|
Characteristics of QoS | Usability, maintainability, reliability, compatibility, suitability, security | [25] |
Type of Metric | Indicator—analysis of the model, base—baseline measurement method, derived—functions of the various measurements | [26] |
Measurement Unit | The corresponding metric unit | [27] |
Associated Cloud Lifecycle Phases |
| [28] |
Cloud Artifact and Its Measurement | Specifications of the cloud services, the cloud design and architecture, various types of cloud services | [29] |
Three Main Services of the Cloud | IaaS—Infrastructure as a Service, PaaS—Platform as a Service, SaaS—Software as a Service | [30] |
Viewpoints of Various Users/Stakeholders of the Cloud | Cloud user, broker, developer, service provider, service request brokers | [31] |
Support-based Tools | Automated and manual tools | [32] |
Results of the Measurement | Quantitative, qualitative, hybrid | [33] |
Function of the Measurement | Formula for calculation and explanation of how the metrics are calculated | [34] |
Quality Attributes | References |
---|---|
Performance Efficiency | [34,36,37,38,39,40,41,42,43,44,45,46,45,46] |
Reliability | [47,48,49,50,51,52,53,54,55,56,57] |
Security | [58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73] |
Operational Policy-Based Functions | [74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90] |
Maintainability | [91,92,93,94,95,96,97,98,99,100] |
Usability | [101,102,103,104,105,106,107,108,109,110,111,112] |
Portability | [113,114,115,116,117,118,119,120,121] |
Compatibility | [122,123,124,125,126] |
Scheme | Circumstances | Usages of Metrics |
---|---|---|
Microservices | New services deployment | Percentage of the average time the request servicing thread has been found busy |
The percentage of the time the service will be reachable | Enqueued requests number | |
The number of requests that are enqueued | Percentage of time the services were reachable | |
Databases quick response, the messages queues are faster | The frequency of query execution, failure rate, response time | |
Container | Responsiveness of the processes in the container | Time for CPU throttled |
The images that have been deployed | Disk I/O of container, memory usages | |
Did containers are associated with over-utilization because of the hosts | Network (dropped packets and its volume) | |
Host | Changes in the utilization and problem with the application or process | Memory capacity (percentage of usage), CPU utilization (percentage of usage) |
Infrastructure | Cost of running services or deployments | The traffic of the network |
The ratio of microservices and/or container per instance | Database utilization, shared services, storage | |
End User | Average web response time practiced by the end user per region | Response time, percentage of user actions failed |
Measurable Quantities | Circumstances | Usages of Metrics |
---|---|---|
Communication | Data communication in the cloud environment |
|
Computation | Computing data or job processing in the cloud environment |
|
Memory | Memory management-related |
|
Time | Task completion time |
|
Features | Description | Policies |
---|---|---|
Elasticity | Addition and removal of cloud resources automatically |
|
Features | Description | Related Policies | Metrics |
---|---|---|---|
Elasticity | The addition and removal of cloud resources automatically | Task size (n) and the level of resources (X) required at the IaaS level | Boot time (in seconds) |
Depends on the downtime of the cloud, mean time to failure, mean time to repair | Suspend time (in seconds) | ||
Percentage of the availability of the resources (server, CPU, memory, etc.) on an hourly basis and provisioning time (in seconds) or uptime for an instance of the virtual server; virtual infrastructure server starts and stops date; cumulative and continuous frequency over a predefined period | USD0.15/hour small instances, USD0.90/hour large instances, USD0.20/hour medium instances | ||
Percentage of the availability of the resources, for example, network usage | Total acquisition time (in seconds); the outbound network traffic in terms of bytes, cumulative and continuous frequency over a pre-specified period for the cloud service, such as IaaS, PaaS, SaaS; example: up to 400 MB free daily and USD0.02/GB thereafter, USD0.005/GB after the 1TB per month |
Features | Description | Policies | Metrics |
---|---|---|---|
Availability | Anywhere and anytime access to services provided | Quantifiable and its performance at an average load | Flexibility: percentage of uptime of the service. Total uptime/total time. Example: 99% uptime (minimum) |
Data rate X at which the data are being transferred | Accuracy | ||
Normal operational threshold | Response time | ||
Scalability | The expansion of the infrastructure to handle the amplified load | Normal operational threshold | Average resources assigned and requested resources |
Reliability | The services should be functional with time and no cases of malfunction | Normal operational threshold | The accuracy of the services. Under predefined conditions, identify the percentage of successful service outcomes, i.e., operational (normal) period duration/failures number. Example: average 90 days (with the frequency: yearly or monthly) |
Fault tolerance: mean time between failures, for monthly or yearly | Calculation: (date/time of recovery-date/time of failure)/sum of number of failures. Another calculation: identify the normal period duration of the operational/numbers of failures. Example: an average of 90 days, 120 min average | ||
Average time in the ideal scenario for repairing the failure, to reduce the downtime | Recoverability: (date/switchover completion time-date/failure time)/total failures number. Example: 10 min average | ||
Efficiency and achieving maximum productivity and average utilization | Utilization of the resources, such as measurable characteristics, capacity of the storage device with continuous frequency | Assume the threshold is 60 GB, and if the demand rises and crosses the 60 GB of the utility, then add another 80 GB of storage from the resource pool | 80 GB storage max |
The total percentage of successful services outcomes under pre-specified conditions | Downtime management: calculation—successful responses (total)/number of requests; with the frequency as yearly, monthly, and weekly. Example: minimum downtime acceptable 98% | ||
Sustainability | Not be detrimental to the environment | Average performance in peak and non-peak hour | Data center performance: calculation—date/time of request-date/time of response/number of requests (total), with the frequency of monthly, weekly, and daily. Example: −5 milliseconds average |
Average power consumption in the ideal scenario | Power usage efficiency; power usages effectiveness (PUE) = total power of data center/power required or used by the IT equipment |
ML Model | RMSE | MAE |
---|---|---|
LiR | 2.63 | 1.43 |
SVR | 0.99 | 0.80 |
DT | 1.37 | 1.28 |
RF | 1.53 | 1.14 |
LoR | 39.42 | 32.36 |
ANN | 2.15 | 1.36 |
ML Model | RMSE | MAE |
---|---|---|
LiR | 2.01 | 1.42 |
SVR | 3.65 | 2.79 |
DT | 3.86 | 2.85 |
RF | 1.58 | 1.12 |
LoR | 73.67 | 56.56 |
ANN | 2.53 | 1.55 |
ML Model | RMSE | MAE |
---|---|---|
LiR | 0.48 | 0.28 |
SVR | 0.52 | 0.29 |
DT | 0.50 | 0.30 |
RF | 0.47 | 0.29 |
LoR | 5.66 | 3.64 |
ANN | 0.49 | 0.30 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Prasad, V.K.; Dansana, D.; Bhavsar, M.D.; Acharya, B.; Gerogiannis, V.C.; Kanavos, A. Efficient Resource Utilization in IoT and Cloud Computing. Information 2023, 14, 619. https://doi.org/10.3390/info14110619
Prasad VK, Dansana D, Bhavsar MD, Acharya B, Gerogiannis VC, Kanavos A. Efficient Resource Utilization in IoT and Cloud Computing. Information. 2023; 14(11):619. https://doi.org/10.3390/info14110619
Chicago/Turabian StylePrasad, Vivek Kumar, Debabrata Dansana, Madhuri D. Bhavsar, Biswaranjan Acharya, Vassilis C. Gerogiannis, and Andreas Kanavos. 2023. "Efficient Resource Utilization in IoT and Cloud Computing" Information 14, no. 11: 619. https://doi.org/10.3390/info14110619
APA StylePrasad, V. K., Dansana, D., Bhavsar, M. D., Acharya, B., Gerogiannis, V. C., & Kanavos, A. (2023). Efficient Resource Utilization in IoT and Cloud Computing. Information, 14(11), 619. https://doi.org/10.3390/info14110619