Fuzzy Logic Based Detection of SLA Violation in Cloud Computing- A Predictive Approach

被引:0
|
作者
Upadhyay, Prabhat Kumar [1 ]
Pandita, Archana [2 ]
Joshi, Nisheeth [3 ]
机构
[1] Birla Inst Technol Mesra, Dept Elect & Elect Engn, Ranchi, Bihar, India
[2] Birla Inst Technol, Dept Comp Sci & Engn, Offshore Campus, Rak, U Arab Emirates
[3] Banasthali Vidyapeeth, Dept Comp Sci, Vanasthali, Rajasthan, India
来源
关键词
Cloud Computing; Service Level Agreement; Violation; Prediction; Fuzzy Logic;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Scheduling of a large number of submitted tasks is a central operation in cloud computing. Efficient scheduling and resource allocation for the submitted tasks ensures that Service-Level-Agreements (SLA) violations are minimized. We present a fuzzy logic-based approach for predicting submitted tasks which are likely to encounter SLA violations. It may help Cloud Service Providers (CSPs) to design corrective interventions in terms of additional resource allocation to prevent SLA violations. The proposed mechanism assists in reducing SLA violations and improves the end-user quality-of-service experience along with enhancement of CSP revenues. The appropriate selection of performance metrics has enabled the proposed model to achieve the highest classification accuracy of 92.6 percent in predicting SLA violation
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [1] A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing
    Shengli Zhou
    Lifa Wu
    Canghong Jin
    中国通信, 2017, 14 (09) : 155 - 165
  • [2] A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing
    Zhou, Shengli
    Wu, Lifa
    Jin, Canghong
    CHINA COMMUNICATIONS, 2017, 14 (09) : 155 - 165
  • [3] Fog Computing- Network Based Cloud Computing
    Krishnan, Y. Navaneeth
    Bhagwat, Chandan N.
    Utpat, Aparajit P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 250 - 251
  • [4] Scaled Conjugate Gradient Backpropagation based SLA Violation Prediction in Cloud Computing
    Upadhyay, Prabhat Kumar
    Pandita, Archana
    Joshi, Nisheeth
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 203 - 208
  • [5] A study on fuzzy logic based cloud computing
    Hayat, Bashir
    Kim, Kyong Hoon
    Kim, Ki-Il
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 589 - 603
  • [6] A study on fuzzy logic based cloud computing
    Bashir Hayat
    Kyong Hoon Kim
    Ki-Il Kim
    Cluster Computing, 2018, 21 : 589 - 603
  • [7] Taxonomy of SLA violation minimization techniques in cloud computing.
    Shivani
    Singh, Ajmer
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1845 - 1850
  • [8] A Trust Model in Cloud Computing Based on Fuzzy Logic
    Ritu
    Jain, Sushma
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 47 - 52
  • [9] Manifold Learning in SLA Violation Detection and Prediction for Cloud-based System
    Hani, Ahmad Fadzil M.
    Paputungan, Irving, V
    Fadzil, M. H.
    Vijanth, S. A.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [10] Early fault detection in IaaS cloud computing based on fuzzy logic and prediction technique
    Dinh-Mao Bui
    Thien Huynh-The
    Lee, Sungyoung
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5730 - 5745