International Journal on Recent and Innovation Trends in Computing and Communication Volume: 4 Issue: 1 ISSN: 2321-8169 159 - 162 ___________________________________________________________________________________________________ Efficient resource Utilization in Cloud Computing Using Revised ROSP Algorithm (ERROSP) Priyanka Sankhla1 Sohit Agarwal2 1 Research scholar,SGVU Jaipur Associate professor, SGVU Jaipur 2 Abstract:- Computing world these days is occupied by the Seventh Heaven. The most important question, it is necessary in this visualization is it to play an important role in the enterprise. Through this rapid development in the enterprise the most varieties of personal desire to save a lot of cash, time, hours and properties, which may increase in the area of electronic commerce. The cloud computing world is spreading rapidly on the Internet. Therefore, the basic definition of analysing cloud computing from around the world, often too, because it tells the calculation under application of services to assist the network and access to hardware and software running on the system may give the service. "A standardized IT capability (services, software or infrastructure) technology pay-per-use, self-service manner provided by the Internet." In the cloud of the most important research is Buckley RAD defines cloud computing as. The service itself has long been known as software as a service (SaaS). Data center hardware and software is what we call clouds. When the cloud is made available to the public in the way of a pay-as-you-go, which we call the public cloud; business being sold is utility computing. We use the term private cloud is an enterprise or other organization, not available to the general public within the data center. Therefore, SaaS, and cloud computing is the sum of utility computing, but not including private clouds. People can users or SaaS provider, or user or utility computing vendor. "Analysis goal of this paper is to find the user's needs, the best cloud service provider and cloud metaphysics programming algorithm is mainly based programming techniques. Actually speaking, cloud computing, programming side measure died in a cloud computing environment to take advantage of cloud computing provides a convenient broker execution management system to bring good prescription measurement programming techniques. Keyword:Cloud Computing,Cloud Service Providers,Rough Set Theory,Datacenters,Users,Parameters,CLOUDSIM,Cloud Parameters __________________________________________________*****_________________________________________________ 1. Introduction Cloud computing is a term used to describe the platforms and the type of service used. It can be configured and reconfigured servers, and these servers can be physical and virtual machines. As we know, the cloud is extending relates to host Web applications and Web services applications or applications accessed via the Internet and for large data centers for this purpose and powerful servers. As its basic definition, pay and use. Cloud computing infrastructure enables companies to more effectively use their IT hardware and software investments. About cloud simulator in our algorithm work is to prepare and assist the work of the rough set theory talks. The algorithm program enforced algorithm cloud machine in which cloudlets, data center and cloud brokers and rough area to create a set of units to assist in the execution. Fig. 1 Basic Structure of Cloud usage Scenario Finally,there is the implementation doing a development rough set of cloud machine developedNet Beans and SQL side. Net Beans cloudSim package containing one digital package area unit ready with our algorithm procedures, and to provide a crude exploitation of the expected output improved. Motivation It is still not resolved by anyone that result of each per second user's area unit usage in cloud is increasing as 159 IJRITCC | January 2016, Available @ http://www.ijritcc.org __________________________________________________________________________________________ International Journal on Recent and Innovation Trends in Computing and Communication Volume: 4 Issue: 1 ISSN: 2321-8169 159 - 162 ___________________________________________________________________________________________________ per the population like Republic of India. As Cloud to?In the first research question, which comes to the Computing is incredibly necessary topic of study, selection process is as follows:however giving plenty of probabilities for the users and programmers to require plenty of profit in terms of cash • Why do we use this supplier? resources and time, which are the basic need in IT • Soul-destroying behaviour or different industry. As from the survey we have a tendency to see opportunities? a cloud datacenter for the utilization of individual. It • About how expensive, is May to me? should decrease the value and giving the liquid ecstasy • How, we will provide a payment security and Profit within the promotion. We additionally see applications, and at that level? however resource management is creating its aim in • Whether it is data or information is secure? cash. Insuring a secure service that transfers sensitive • What security measures? They offer? information between cloud service providers and cloud • What should be the limits of data storage and users with new drawback domain in a federate cloud is a recovery? key parameter. Achieving this security is the necessary • Which provides that, in accordance with user objective; however this must be wiped out the context of access management what is the purpose of the maintaining compliance with the users and providers. security? Scope Scheduling could be a broad field, and for this thesis we tend to square measure aiming to consider programming rule from the resource management on adjective worth model. The goal of this thesis is to vogue and appraises a service that may provide adjective worth model for cloud brokers and carriers. Cloud allowing users to firmly migrate from one provider to a different, such a service would utilize varied parameters that we have found and can confirm the foremost very important cloud supplier for the users. The thesis is aimed for Cloud Services and Cloud Service suppliers whereas the Users square measure enjoying a lead role among the Services provided to them. Cloud computing has solely recently emerged as a computing paradigm which might be utilized for brokerage execution. Significantly, in our analysis, we tend to target coming up with new planning algorithms for instance-intensive planning within the cloud computing atmosphere. 2. Problem Statements Here cloud parameters involved shackles once developed cloud service providers to support unorthodox. In addition to a handful of CSP has been discarded, services or energy is difficult to imagine a day access is possible at some point. If we have a tendency to develop an investment colorful evening in the cloud, we look forward to cloud cultivate reliable tendencies. In appearance, the cloud even the most telecom operators are facing around the same computing environment issues.Here, wesee a lot ofhatstaking into account thefeaturesor characteristics, such asthe importance ofinfrastructure, platformand services.In themethod ofselectingcloudservice providersto assess theircloud provider, Provides- what, andhowaccording The question now is, if the relevant parameters, these two companies are the same cloud service discovery system creates a hierarchy of these enterprises, but unknown to the system found in this era of construction differences, along with their fans want to view 3. Techniques Used We have seen that many researchers are using different methods in the same direction. Our goal is the same, namely to improve and optimize resource utilization by the service provider. We propose a similar method.We propose algorithms equipment possible, cloud middleware rough set analysis service satisfaction level, based on the ability to determine the CSP.In this case, we simulated the behaviour of social networking applications and use the cloud analysis to evaluate the use of the cloud to host such an application-specific cost and performance. Simulation Configuration We define the parameters of the six major regions of the world and representatives of the six in Table 1 user base. Table 1: User Based experiment There are several options were considered in our case studies. The simplest one in the shape of centralized data center cloud case for hosting social networking 160 IJRITCC | January 2016, Available @ http://www.ijritcc.org __________________________________________________________________________________________ International Journal on Recent and Innovation Trends in Computing and Communication Volume: 4 Issue: 1 ISSN: 2321-8169 159 - 162 ___________________________________________________________________________________________________ applications with a single.According to our case study, Cloud service provider attribute contains the cloud we have analysed, if the number of data centers and Rating feeling fuzzy logic to its final cost value. virtual machines in larger quantities than the response Final Fuzzy cost value of CSP’s:time of less than now we will discuss how the user can This is the fuzzy value of CSP 1 = 2.605 compare the selected cloud service providers based on This is the fuzzy value of CSP 3 = 3.4 their parameters. This is the fuzzy value of CSP 6 = 4.01 This is the fuzzy value of CSP 7 = 4.33 This is the fuzzy value of CSP 8 = 4.04 5. Table 2: Simulation settings and experiments results Here we are considering CSP objects based on certain defined standard parameters and its characteristics. We just use some parameters.1) Data operation, involving different data operation. 2) Legal issues, we have found that it relates to when the data is moved to the legal issue may be produced cloud. 3) Service Level Agreement, which uses the user and CSP agreement by the level 4) data transmission rate, which provides a range of cost to the user to transfer data internet.5) virtual machine, which provides a message to about what they are used virtual machine costs. 6) storage capacity, the parameters including how much data about the user can use CSP.7) compliance and audits, the importance of its customers and suppliers must understand both sides, the audit information and other best practices for storage. 4. Problem Formulation The main objective is to find the ROSP algorithm for each cloud service providers and the best value for maximum fuzzy values. In this research paper, we enhanced our algorithm, and provides a graphical user interface environment, allowing users to feel the operation is very easy. In the model, we represent in tabular form CSP and their attributes. Rows in a table that contains a cloud service provider, to retain support attribute column list through the provider cloud. The table shows fuzzy logic values . From fuzzy logic value table, we will get each of CSP. Table 3System Information Tab1e Results & Simulation Due to continuing with our previous ROSP algorithm, in our simulations, we use some of the existing package to create CloudAnalyst tool and other cloud service providers, data centers and networks. In addition to this, we have created a number of beans in the network package. Fig 2: time taken between users and CSPs Output 1: Creation of CSP and Datacenters for Regions from 1 to 6 and find the response time of each data center. Output 2: Execution of ROSP Algorithm on various parameters of CSPs generate the fuzzy logic values. The graph above represents the time taken by CSP and users in seconds. from the above graph we can define that: (i)The number of users and CSPs are regularly increasing. (ii)The time taken is exponential to the increase of users and CSPs. (iii)The time taken by the CSP is directly proportional to the parameters. Here we have considered 7 parameters. 6. Future Work In this study, we propose a scheduling algorithm cloud broker between telecommunications operators and users exist. This is the basis of middleware to realize their ability to work on algorithms and ceiling. In short, I believe that if we mentioned in the report of the solution, then it improves resource utilization, reduce user costs, the central system effectively saves power. Future work in this study is that we can further extend, which in addition to the cost basis of the individual cost function, we can produce the CSP attributes on 161 IJRITCC | January 2016, Available @ http://www.ijritcc.org __________________________________________________________________________________________ International Journal on Recent and Innovation Trends in Computing and Communication Volume: 4 Issue: 1 ISSN: 2321-8169 159 - 162 ___________________________________________________________________________________________________ of Science and Technology (NTNU) 7034 Trondheim, individual ability. Because, if a user needs a CSP of Norway. SLA performance, cost function is the biggest, for [17] Amit Kumar Sharma ,MADAM ID FOR INTRUSION example, we can achieve CSP algorithm for each node, DETECTION USING DATA MINING ,IJRIM , Volume rather than performing it in the cloud Agent. Refrences [1] J. Octavio, Gutierrez-Garcia, Kwang Mong Sim: A family of heuristics for agent based elastic Cloud bag of tasks concurrent scheduling. Future Generation Computer Systems,SciVerseScience Direct, doi:10.1016/j.future.2012.01.005. [2] Daji Ergu, Gang Ko,Yi Peng ,Yong Shi, Yu Shi on Pipeline: The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment. In: Springer Science+Business Media, LLC 2011. [3] Jan Komorowski: Rough Sets: A Tutorial In .Department of Computer and Information Science Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway. [4] Ashish Tiwari, Dr.A.Nagaraju and Mehul Mahrishi: An Optimized Scheduling Algorithm for Cloud Broker using Adaptive Cost Model: 3rd IEEE (International Advanced Computing Conference-2013). [5] http://readwrite.com/2010/08/14/tools-for-assessing-cloudperf [6] https://cloudharmony.com/speedtesthttps://www.cloudsleut h.net/ http://prof.ict.ac.cn/CloudRank/ [7] Smitha Sundare swaran: A Brokerage-Based Approach for Cloud Service Selection In: 2012 IEEE Fifth International Conference on Cloud Computing. [8] Taekgyeong Han and Kwang Mong Sim : An Ontologyenhanced Cloud Service Discovery System : Proceedings of the International MultiConference of Enginers and Computer Scientists 2010 Vol I, IMECS 2010,March 1719,2010,Hong kong . [9] Haytham Tawfeek al Feel: OCSS: Ontology Cloud Storage System: 2011 First International Symposium on Network Cloud Computing and Applications. [10] http://cloudontology.wikispaces.asu.edu/Use+of+Ontology +in+Cloud+Computing. [11] Fangpeng Dong and Akl, S.G. : An Adaptive Double-layer Work flow Scheduling Approach for Grid Computing In : High Performance Computing Systems and Applications, 2007. HPCS 2007. 21st International Symposium on. [12] Avanes and J. Freytag : Adaptive Workflow Scheduling under Resource Allocation Constraints and Network Dynamics In : Proc. VLDB Endow, 1(2), 1631-1637,2008. [13] Radulescu, A. and Van Gemund, A. J C : Low-cost task scheduling for distributed memory machines In: Parallel and Distributed Systems, IEEE Transactions 2002. [14] Nan, Xiaoming and Yifeng He and Ling resource allocation for multimedia cloud in priority service scheme In : Circuits and Systems (ISCAS), 2012 IEEE International Symposium. [15] RoughSetTheory,http://www.en.wikipedia.org/wiki/Rough -set [16] Jan Komorowski ,Rough Sets: A Tutorial , Department of Computer and Information Science Norwegian University 2, Issue 2 (February 2012). [18] Mehul Mahrishi and Dr.A.Nagaraju ,Optimizing Cloud Service Provider Scheduling by Rough Set model,International Conference on Cloud Computing Techno and Management (ICCEAM-12). [19] Mehul Mahrishi and Dr.A.Nagaraju ,Rating Based Formulation for Scheduling of Cloud Service Providers , National Confrance on Emerging treands in IT. [20] Z. Pawlak, Rough sets, International Journal of Computer and Information Sciences, 11(5):341356, 1982. [21] Mehul Mahrishi ,Globally Recorded binary encoded Domain Compression algorithm in Column Oriented Databases,Global Journals of Computer Science and technology Vol. 11 issue 23, Page 27-30. [22] Amit Nathani, Sanjay Chaudharya, GauravSomaniPolicy based resource allocation in IaaS Cloud [23] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment, Springer Science Business Media, LLC 2011. [24] Foster, Y. Zhao, I. Raicu and S. Lu, "Cloud Computing and Grid Computing 360 Degree Compared", Grid Computing Environments Workshop, Austin, 2008. [25] G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, Cloud Computing (White Paper),IBM,october2007,http://download.boulder.ibm.co m/ibmdl/pub/software/dw/wes/hipods/Cloud_computing_ wp_final_8Oct.pdf , accessed on May. 19,2009. [26] R. Buyya, C. S. Yeo, and S. Venugopal, “MarketOriented Cloud and Atmospheric Computing: Hype, Reality, and Vision”, Proc. of 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08), 5-13, Dalian, China, September, 2008. [27] B Sotomayor, R S. Montero, I M. Llorente, and I Foster , “An Open Source Solution for Virtual Infrastructure Management in Private and Hybrid Clouds”, IEEE INTERNET COMPUTING, SPECIAL ISSUE ON CLOUD COMPUTING ,July 2009 [28] Nada M. A. Al Salami , “Ant Colony Optimization Algorithm”, UbiCC Journal, Volume 4, Number 3, August 2009 [29] J. Yu and R. Buyya, “Scheduling Scientific Workflow Applications with Deadline and Budget Constraints using Genetic Algorithms”, Scientific Programming Journal, 14(3-4), 217-230,IOS Press, 2006. 162 IJRITCC | January 2016, Available @ http://www.ijritcc.org __________________________________________________________________________________________
© Copyright 2026 Paperzz