Bandwidth and Delay Optimization by Integration of Software Trust Estimator with Multi-user Cloud Resource Competence

Publish Year: 1399
نوع سند: مقاله ژورنالی
زبان: English
View: 390

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-33-7_004

تاریخ نمایه سازی: 4 شهریور 1399

Abstract:

Trust establishment is one of the significant resources to enhance the scalability and reliability of resources on cloud environments. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is proposed in this paper. IST-MRC optimization mechanism combines its trustworthy properties with optimal resource allocation, on the requisition of the software apps, without any traffic occurrence in the cloud environment. Initially, a behavior trust estimator is developed in the IST-MRC mechanism to measure the trust value of the software service zone. The trust value is estimated, based on Software Availability Rate, Hit Rate, and User Feedback regarding the specific software apps. Next, the resources are optimized to multiple users using competence optimization. The competence optimization in the IST-MRC mechanism computes the processor speed, bandwidth, and latency to handle the varied traffic conditions on multiple user requests. Experiments are conducted to measure and evaluate factors, such as Successful Request Handles, Resource Utilization Efficiency, Latency Time, and Trust Success Ratio on the multiple users.

Keywords:

Bandwidth Behavior Trust Estimator Cloud Resources Competence Optimization Software , as , a , Service User Feedback

Authors

S. M. Mirrezaei

Faulty of Electrical and Robotic Engineering, Shahrood University of Technology, Shahrood, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Tang J., Peng Tay W., and Wen Y., Dynamic request ...
  • Abbadi I. M. and Ruan A., Towards trustworthy resource scheduling ...
  • Wang Q., Wang C., Ren K., Lou W. and Li ...
  • Sundareswaran S., Squicciarini A., and Lin D., Ensuring distributed accountability ...
  • Abbadi I, M. and Martin A., Trust in the Cloud. ...
  • Pandey S., Voorsluys W., Niu S., Khandoker A., and Buyya ...
  • Takabi H., Joshi J. B., and Ahn G. Security and ...
  • Wu X., Zhang R., Zeng B., and Zhou S., A ...
  • Sun D., Chang G., Sun L., and Wang X. Surveying ...
  • Gao K., Wang Q., and Xi L. Reduct algorithm based ...
  • Whaiduzzaman M., Nazmul Haque M., Chowdhury M. R. K., and ...
  • Wu Q., Zhang X., Zhang M., Lou Y., Zheng R., ...
  • Sun Y., Zhang J., Xiong Y., and Zhu G. Data ...
  • Xiong A. and Xu C. Energy efficient multi resource allocation ...
  • Ghazizadeh E., Zamani M., Ab Manan J., and Alizadeh M. ...
  • Varghese A. B., Hemalatha T, Sasidharan S., and Jophin S. ...
  • Arianyan E., Taheri H., and Khoshdel V. Novel fuzzy multi ...
  • Wang X., Chen X., Yuen C., Wu W., Zhang M., ...
  • Kumar G. and Kumar Rai M. An energy efficient and ...
  • Lin Y., Lai Y., Teng H., Liao C., and Kao ...
  • Chauhan S. S., Pilli E. S., Joshi R., Singh G., ...
  • Xie X., Tianwei Y., Xiao Z. and Xiaochun C. Research ...
  • Asadi F., and Hamidi H. An architecture for security and ...
  • Xu X., Liu X., Xu Z., Wang C., Wan S. ...
  • Speily, B., Omid R., and Rezai H. Energy aware resource ...
  • نمایش کامل مراجع