You are on page 1of 4

International Journal on Recent and Innovation Trends in Computing and Communication

Volume: 4 Issue: 1

ISSN: 2321-8169
159 - 162

___________________________________________________________________________________________________

Efficient resource Utilization in Cloud Computing Using Revised ROSP


Algorithm (ERROSP)
Priyanka Sankhla1
Sohit Agarwal2
1

Research scholar,SGVU Jaipur


Associate professor, SGVU Jaipur

Abstract:- Computing world these days is occupied by the Seventh Heaven. The most important question, it is necessary in
this visualization is it to play an important role in the enterprise. Through this rapid development in the enterprise the most
varieties of personal desire to save a lot of cash, time, hours and properties, which may increase in the area of electronic
commerce. The cloud computing world is spreading rapidly on the Internet. Therefore, the basic definition of analysing
cloud computing from around the world, often too, because it tells the calculation under application of services to assist the
network and access to hardware and software running on the system may give the service. "A standardized IT capability
(services, software or infrastructure) technology pay-per-use, self-service manner provided by the Internet." In the cloud of
the most important research is Buckley RAD defines cloud computing as. The service itself has long been known as
software as a service (SaaS). Data center hardware and software is what we call clouds. When the cloud is made available
to the public in the way of a pay-as-you-go, which we call the public cloud; business being sold is utility computing. We
use the term private cloud is an enterprise or other organization, not available to the general public within the data center.
Therefore, SaaS, and cloud computing is the sum of utility computing, but not including private clouds. People can users or
SaaS provider, or user or utility computing vendor. "Analysis goal of this paper is to find the user's needs, the best cloud
service provider and cloud metaphysics programming algorithm is mainly based programming techniques. Actually
speaking, cloud computing, programming side measure died in a cloud computing environment to take advantage of cloud
computing provides a convenient broker execution management system to bring good prescription measurement
programming techniques.
Keyword:Cloud Computing,Cloud Service Providers,Rough Set Theory,Datacenters,Users,Parameters,CLOUDSIM,Cloud
Parameters
__________________________________________________*****_________________________________________________

1.

Introduction

Cloud computing is a term used to describe the


platforms and the type of service used. It can be
configured and reconfigured servers, and these servers
can be physical and virtual machines. As we know, the
cloud is extending relates to host Web applications and
Web services applications or applications accessed via
the Internet and for large data centers for this purpose
and powerful servers. As its basic definition, pay and
use. Cloud computing infrastructure enables companies
to more effectively use their IT hardware and software
investments. About cloud simulator in our algorithm
work is to prepare and assist the work of the rough set
theory talks. The algorithm program enforced algorithm
cloud machine in which cloudlets, data center and cloud
brokers and rough area to create a set of units to assist in
the execution.

Fig. 1 Basic Structure of Cloud usage Scenario

Finally,there is the implementation doing a development


rough set of cloud machine developedNet Beans and
SQL side. Net Beans cloudSim package containing one
digital package area unit ready with our algorithm
procedures, and to provide a crude exploitation of the
expected output improved.
Motivation
It is still not resolved by anyone that result of each per
second user's area unit usage in cloud is increasing as
159

IJRITCC | January 2016, Available @ http://www.ijritcc.org

__________________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 4 Issue: 1

ISSN: 2321-8169
159 - 162

___________________________________________________________________________________________________
per the population like Republic of India. As Cloud
to?In the first research question, which comes to the
Computing is incredibly necessary topic of study,
selection process is as follows:however giving plenty of probabilities for the users and
programmers to require plenty of profit in terms of cash
Why do we use this supplier?
resources and time, which are the basic need in IT
Soul-destroying
behaviour
or
different
industry. As from the survey we have a tendency to see
opportunities?
a cloud datacenter for the utilization of individual. It
About how expensive, is May to me?
should decrease the value and giving the liquid ecstasy
How, we will provide a payment security
and Profit within the promotion. We additionally see
applications, and at that level?
however resource management is creating its aim in
Whether it is data or information is secure?
cash. Insuring a secure service that transfers sensitive
What security measures? They offer?
information between cloud service providers and cloud
What should be the limits of data storage and
users with new drawback domain in a federate cloud is a
recovery?
key parameter. Achieving this security is the necessary
Which provides that, in accordance with user
objective; however this must be wiped out the context of
access management what is the purpose of the
maintaining compliance with the users and providers.
security?
Scope
Scheduling could be a broad field, and for this thesis we
tend to square measure aiming to consider programming
rule from the resource management on adjective worth
model. The goal of this thesis is to vogue and appraises
a service that may provide adjective worth model for
cloud brokers and carriers. Cloud allowing users to
firmly migrate from one provider to a different, such a
service would utilize varied parameters that we have
found and can confirm the foremost very important
cloud supplier for the users. The thesis is aimed for
Cloud Services and Cloud Service suppliers whereas the
Users square measure enjoying a lead role among the
Services provided to them. Cloud computing has solely
recently emerged as a computing paradigm which might
be utilized for brokerage execution. Significantly, in our
analysis, we tend to target coming up with new planning
algorithms for instance-intensive planning within the
cloud computing atmosphere.
2.

Problem Statements

Here cloud parameters involved shackles once


developed cloud service providers to support
unorthodox. In addition to a handful of CSP has been
discarded, services or energy is difficult to imagine a
day access is possible at some point. If we have a
tendency to develop an investment colorful evening in
the cloud, we look forward to cloud cultivate reliable
tendencies. In appearance, the cloud even the most
telecom operators are facing around the same computing
environment issues.Here, wesee a lot ofhatstaking into
account thefeaturesor characteristics, such asthe
importance ofinfrastructure, platformand services.In
themethod ofselectingcloudservice providersto assess
theircloud provider, Provides- what, andhowaccording

The question now is, if the relevant parameters, these


two companies are the same cloud service discovery
system creates a hierarchy of these enterprises, but
unknown to the system found in this era of construction
differences, along with their fans want to view
3.

Techniques Used

We have seen that many researchers are using different


methods in the same direction. Our goal is the same,
namely to improve and optimize resource utilization by
the service provider. We propose a similar method.We
propose algorithms equipment possible, cloud
middleware rough set analysis service satisfaction level,
based on the ability to determine the CSP.In this case,
we simulated the behaviour of social networking
applications and use the cloud analysis to evaluate the
use of the cloud to host such an application-specific cost
and performance.
Simulation Configuration
We define the parameters of the six major regions of the
world and representatives of the six in Table 1 user base.

Table 1: User Based experiment

There are several options were considered in our case


studies. The simplest one in the shape of centralized data
center cloud case for hosting social networking
160

IJRITCC | January 2016, Available @ http://www.ijritcc.org

__________________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 4 Issue: 1

ISSN: 2321-8169
159 - 162

___________________________________________________________________________________________________
applications with a single.According to our case study,
Cloud service provider attribute contains the cloud
we have analysed, if the number of data centers and
Rating feeling fuzzy logic to its final cost value.
virtual machines in larger quantities than the response
Final Fuzzy cost value of CSPs:time of less than now we will discuss how the user can
This is the fuzzy value of CSP 1 = 2.605
compare the selected cloud service providers based on
This is the fuzzy value of CSP 3 = 3.4
their parameters.
This is the fuzzy value of CSP 6 = 4.01
This is the fuzzy value of CSP 7 = 4.33
This is the fuzzy value of CSP 8 = 4.04
5.

Table 2: Simulation settings and experiments results

Here we are considering CSP objects based on certain


defined standard parameters and its characteristics. We
just use some parameters.1) Data operation, involving
different data operation. 2) Legal issues, we have found
that it relates to when the data is moved to the legal
issue may be produced cloud. 3) Service Level
Agreement, which uses the user and CSP agreement by
the level 4) data transmission rate, which provides a
range of cost to the user to transfer data internet.5)
virtual machine, which provides a message to about
what they are used virtual machine costs. 6) storage
capacity, the parameters including how much data about
the user can use CSP.7) compliance and audits, the
importance of its customers and suppliers must
understand both sides, the audit information and other
best practices for storage.
4.

Problem Formulation

The main objective is to find the ROSP algorithm for


each cloud service providers and the best value for
maximum fuzzy values. In this research paper, we
enhanced our algorithm, and provides a graphical user
interface environment, allowing users to feel the
operation is very easy. In the model, we represent in
tabular form CSP and their attributes. Rows in a table
that contains a cloud service provider, to retain support
attribute column list through the provider cloud. The
table shows fuzzy logic values . From fuzzy logic value
table, we will get each of CSP.

Table 3System Information Tab1e

Results & Simulation

Due to continuing with our previous ROSP algorithm, in


our simulations, we use some of the existing package to
create CloudAnalyst tool and other cloud service
providers, data centers and networks. In addition to this,
we have created a number of beans in the network
package.

Fig 2: time taken between users and CSPs

Output 1: Creation of CSP and Datacenters for Regions


from 1 to 6 and find the response time of each data
center. Output 2: Execution of ROSP Algorithm on
various parameters of CSPs generate the fuzzy logic
values. The graph above represents the time taken by
CSP and users in seconds. from the above graph we can
define that: (i)The number of users and CSPs are
regularly increasing. (ii)The time taken is exponential to
the increase of users and CSPs. (iii)The time taken by
the CSP is directly proportional to the parameters. Here
we have considered 7 parameters.
6.

Future Work

In this study, we propose a scheduling algorithm cloud


broker between telecommunications operators and users
exist. This is the basis of middleware to realize their
ability to work on algorithms and ceiling. In short, I
believe that if we mentioned in the report of the solution,
then it improves resource utilization, reduce user costs,
the central system effectively saves power.
Future work in this study is that we can further extend,
which in addition to the cost basis of the individual cost
function, we can produce the CSP attributes on
161

IJRITCC | January 2016, Available @ http://www.ijritcc.org

__________________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 4 Issue: 1

ISSN: 2321-8169
159 - 162

___________________________________________________________________________________________________
of Science and Technology (NTNU) 7034 Trondheim,
individual ability. Because, if a user needs a CSP of
Norway.
SLA performance, cost function is the biggest, for
[17]
Amit Kumar Sharma ,MADAM ID FOR INTRUSION
example, we can achieve CSP algorithm for each node,
DETECTION USING DATA MINING ,IJRIM , Volume
rather than performing it in the cloud Agent.
Refrences
[1] J. Octavio, Gutierrez-Garcia, Kwang Mong Sim: A family
of heuristics for agent based elastic Cloud bag of tasks
concurrent scheduling. Future Generation Computer
Systems,SciVerseScience
Direct,
doi:10.1016/j.future.2012.01.005.
[2] Daji Ergu, Gang Ko,Yi Peng ,Yong Shi, Yu Shi on
Pipeline: The analytic hierarchy process: task scheduling
and resource allocation in cloud computing environment.
In: Springer Science+Business Media, LLC 2011.
[3] Jan Komorowski: Rough Sets: A Tutorial In .Department
of Computer and Information Science Norwegian
University of Science and Technology (NTNU) 7034
Trondheim, Norway.
[4] Ashish Tiwari, Dr.A.Nagaraju and Mehul Mahrishi: An
Optimized Scheduling Algorithm for Cloud Broker using
Adaptive Cost Model: 3rd IEEE (International Advanced
Computing Conference-2013).
[5] http://readwrite.com/2010/08/14/tools-for-assessing-cloudperf
[6] https://cloudharmony.com/speedtesthttps://www.cloudsleut
h.net/ http://prof.ict.ac.cn/CloudRank/
[7] Smitha Sundare swaran: A Brokerage-Based Approach for
Cloud Service Selection In: 2012 IEEE Fifth International
Conference on Cloud Computing.
[8] Taekgyeong Han and Kwang Mong Sim : An Ontologyenhanced Cloud Service Discovery System : Proceedings
of the International MultiConference of Enginers and
Computer Scientists 2010 Vol I, IMECS 2010,March 1719,2010,Hong kong .
[9] Haytham Tawfeek al Feel: OCSS: Ontology Cloud Storage
System: 2011 First International Symposium on Network
Cloud Computing and Applications.
[10] http://cloudontology.wikispaces.asu.edu/Use+of+Ontology
+in+Cloud+Computing.
[11] Fangpeng Dong and Akl, S.G. : An Adaptive Double-layer
Work flow Scheduling Approach for Grid Computing In :
High Performance Computing Systems and Applications,
2007. HPCS 2007. 21st International Symposium on.
[12] Avanes and J. Freytag : Adaptive Workflow Scheduling
under Resource Allocation Constraints and Network
Dynamics In : Proc. VLDB Endow, 1(2), 1631-1637,2008.
[13] Radulescu, A. and Van Gemund, A. J C : Low-cost task
scheduling for distributed memory machines In: Parallel
and Distributed Systems, IEEE Transactions 2002.
[14] Nan,
Xiaoming and
Yifeng He
and
Ling
resource allocation for multimedia cloud in priority service
scheme In : Circuits and Systems (ISCAS), 2012 IEEE
International Symposium.
[15] RoughSetTheory,http://www.en.wikipedia.org/wiki/Rough
-set
[16] Jan Komorowski ,Rough Sets: A Tutorial , Department of
Computer and Information Science Norwegian University

2, Issue 2 (February 2012).


[18] Mehul Mahrishi and Dr.A.Nagaraju ,Optimizing Cloud
Service
Provider
Scheduling
by
Rough
Set
model,International Conference on Cloud Computing
Techno and Management (ICCEAM-12).
[19] Mehul Mahrishi and Dr.A.Nagaraju ,Rating Based
Formulation for Scheduling of Cloud Service Providers ,
National Confrance on Emerging treands in IT.
[20] Z. Pawlak, Rough sets, International Journal of Computer
and Information Sciences, 11(5):341356, 1982.
[21] Mehul Mahrishi ,Globally Recorded binary encoded
Domain Compression algorithm in Column Oriented
Databases,Global Journals of Computer Science and
technology Vol. 11 issue 23, Page 27-30.
[22] Amit Nathani, Sanjay Chaudharya, GauravSomaniPolicy
based resource allocation in IaaS Cloud
[23] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi The
analytic hierarchy process: task scheduling and resource
allocation in cloud computing environment, Springer
Science Business Media, LLC 2011.
[24] Foster, Y. Zhao, I. Raicu and S. Lu, "Cloud Computing
and Grid Computing 360 Degree Compared", Grid
Computing Environments Workshop, Austin, 2008.
[25] G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall,
Cloud
Computing
(White
Paper),IBM,october2007,http://download.boulder.ibm.co
m/ibmdl/pub/software/dw/wes/hipods/Cloud_computing_
wp_final_8Oct.pdf , accessed on May. 19,2009.
[26] R. Buyya, C. S. Yeo, and S. Venugopal, MarketOriented Cloud and Atmospheric Computing: Hype,
Reality, and Vision, Proc. of 10th IEEE International
Conference on High Performance Computing and
Communications (HPCC-08), 5-13, Dalian, China,
September, 2008.
[27] B Sotomayor, R S. Montero, I M. Llorente, and I Foster ,
An Open Source Solution for Virtual Infrastructure
Management in Private and Hybrid Clouds, IEEE
INTERNET COMPUTING, SPECIAL ISSUE ON
CLOUD COMPUTING ,July 2009
[28] Nada M. A. Al Salami , Ant Colony Optimization
Algorithm, UbiCC Journal, Volume 4, Number 3,
August 2009
[29] J. Yu and R. Buyya, Scheduling Scientific Workflow
Applications with Deadline and Budget Constraints using
Genetic Algorithms, Scientific Programming Journal,
14(3-4), 217-230,IOS Press, 2006.

162
IJRITCC | January 2016, Available @ http://www.ijritcc.org

__________________________________________________________________________________________