Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters
Ajayveer Chouhan1 , Chander Diwaker2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 765-771, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.765771
Online published on Jul 31, 2018
Copyright © Ajayveer Chouhan, Chander Diwaker . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ajayveer Chouhan, Chander Diwaker, “Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.765-771, 2018.
MLA Style Citation: Ajayveer Chouhan, Chander Diwaker "Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters." International Journal of Computer Sciences and Engineering 6.7 (2018): 765-771.
APA Style Citation: Ajayveer Chouhan, Chander Diwaker, (2018). Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters. International Journal of Computer Sciences and Engineering, 6(7), 765-771.
BibTex Style Citation:
@article{Chouhan_2018,
author = {Ajayveer Chouhan, Chander Diwaker},
title = {Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {765-771},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2508},
doi = {https://doi.org/10.26438/ijcse/v6i7.765771}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.765771}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2508
TI - Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters
T2 - International Journal of Computer Sciences and Engineering
AU - Ajayveer Chouhan, Chander Diwaker
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 765-771
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
437 | 285 downloads | 151 downloads |
Abstract
In the computing world everywhere, everything and every time service on demand to end users is the motive of the cloud computing. The cloud computing aim is to work on as a service model. The cloud computing is designed with the significant architecture, special models for deployment and its features. The concept of cloud computing saves the time, cost and efficiency of everyone. In this research paper, there are some serious issues which are being tried to be solved by the proposed algorithms. These issues are basically occurring between the providers and the users. The proposed algorithm solved some of the issues. The observation clarifies the results of the algorithm. To get the efficient and effective results the algorithm uses the concept of the Ontology system. The ontology system clarifies the cost, time and pathway of the information. What should be the minimum cost of the system so the data is accessed with the high speed? The efficient algorithm is being designed on the specific platforms of the Ontology and the cloud simulator. At last this paper got the best service for the requested users at the best time.
Key-Words / Index Term
Performance Parameters; Cloud Computing; Scheduling Algorithms; Ontology Algorithms; Ontology Simulators; Cloud Simulator.
References
[1] Gutierrez-Garcia, J. O. Sim, K. M, “ A Family of Heuristics for Agent-Based Elastic Cloud Bag-of-Tasks Concurrent Scheduling”, Future Generation Computer Systems, Vol.29, No.7, pp. 1682-1699, 2013.
[2] Ergu, D., Kou, G., Peng, Y., Shi, Y., Shi, Y, “ The Analytic Hierarchy Process: Task Scheduling and Resource Allocation in Cloud Computing Environment” ,The Journal of Supercomputing, Vol.64 Issue3, pp. 835-848, 2013
[3] Komorowski, J., Pawlak, Z., Polkowski, L., Skowron, A, “Rough sets: A tutorial. Rough fuzzy hybridization: A new trend in decision-making” , Springer –Verlag New York pp 3-98, 1999.
[4] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Zaharia, M, “A View of Cloud Computing”, Communications of the ACM, Vol.53 Issue 4, pp.50-58, 2010.
[5] Suherman, A. G., Simatupang, T. M.” The Network Business Model of Cloud Computing for End-to-End Supply Chain Visibility” ,International Journal of Value Chain Management, Vol.8, Issue 1, 22-39, 2017.
[6] Birman, K., Chockler, G., van Renesse, R, “Toward a Cloud Computing Research Agenda” ,ACM SIGACt News,New York, Vol. 40, Issue 2, pp. 68-80, 2009.
[7] Sim, K. M., Wong, P. T, “ Toward Agency and Ontology for Web-Based Information Retrieval” ,IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), Vol. 34, Issue 3, pp.257-269, 2004.
[8] Sim, K. M, “ Toward an Ontology-Enhanced Information Filtering Agent”, ACM SIGMOD Record, New York, Vol. 33, Issue 1, pp. 95-100, 2004.
[9] Janulevičius, J., Marozas, L., Čenys, A., Goranin, N., Ramanauskaitė, S, “ Enterprise architecture modeling based on cloud computing security ontology as a reference model”, In the proceedings of IEEE Conference on Electrical, Electronic and Information Sciences (eStream) Lithuania, pp.1-6, 2017
[10] Dobson, G., Lock, R., Sommerville, I, “ QoSOnt: A QoS Ontology for Service-Centric Systems”, In the proceedings of IEEE 31st Conference on Software Engineering and Advanced Applications, EUROMICRO, Portugal ,pp.80-87, 2005.
[11] Youseff, L., Butrico, M., Da Silva, D, “Toward a Unified Ontology of Cloud Computing”, In the proceedings of IEEE Workshop on Grid Computing Environments,USA,pp. 1-10, 2008
[12] Modi, K. J., Chowdhury, D. P., & Garg, S, “An Ontology-Based Approach for Automatic Cloud Service Monitoring and Management”, In Advances in Big Data and Cloud Computing, Springer,pp.1-16, 2018
[13] Gupta, B. B., Quamara, M, “ An identity-based access control and mutual authentication framework for distributed cloud computing services in the IoT environment using smart cards”, Procedia Computer Science, Vol.132, pp.189-197, 2018.
[14] Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H, “Intelligent Cryptography Approach for Secure Distributed Big Data Storage in Cloud Computing” Information Sciences, Vol. 387, pp. 103-115, 2017.
[15] Yang, C., Huang, Q., Li, Z., Liu, K., Hu, F, “ Big Data and Cloud Computing: Innovation Opportunities and Challenges”, International Journal of Digital Earth, Vol. 10, Issue 1, 13-53, 2017.
[16] Tao, M., Zuo, J., Liu, Z., Castiglione, A., Palmieri, F, “ Multi-layer Cloud Architectural Model and Ontology-Based Security Service Framework for IoT-Based Smart Homes”, Future Generation Computer Systems, Vol 78, pp.1040-1051, 2018.
[17] Beloglazov, A., Abawajy, J., Buyya, R, “ Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future generation computer systems, Vol.28, issue 5,pp. 755-768, 012.
[18] Xu, B., Xu, L., Cai, H., Jiang, L., Luo, Y., & Gu, Y, “ The Design of an M-Health Monitoring System Based on a Cloud Computing Platform”, In the proceedingd of 2nd International Conference on Enterprise Information Systems, Vol. 11 Issue 1,pp. 17-36, 2017.
[19] Huang, J. Y., Hsu, H. T, “ Technology–Function Matrix Based Network Analysis of Cloud Computing” , Scientometrics, Springer , Vol. 113 Issue 1, pp.17-44, 2017.
[20] Quamara, S., Singh, A. K., “ Bitcoins and Secure Financial Transaction Processing, Recent Advances”, In the proceedings of IEEE 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT),pp. 216-219, 2016.
[21] Kalaivani, A., Ananthi, B., Sangeetha, S, “ Enhanced Hierarchical Attribute Based Encryption with Modular Padding for Improved Public Auditing in Cloud Computing Using Semantic Ontology. Cluster Computing,Springer, pp. 1-8, 2018
[22] Pawlak, Z., Skowron, A, “ Rudiments of Rough Sets”, Information sciences, Elsevier, Vol. 177,Issue 1, pp. 3-27, 2007.
[23] Breitgand, D., Da Silva, D. M., Epstein, A., Glikson, A., Hines, M. R., Ryu, K. D., Silva, M. A, “U.S. Patent No. 9,858,095”, Washington, DC: U.S. Patent and Trademark Office, 2018.
[24] Pawlak, Z, “Rough Sets and Intelligent Data Analysis”, Information sciences,Vol 147, Issue 1-4, pp.1-12, 2002.
[25] Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R, “ Feature Selection Based on Rough Sets and Particle Swarm Optimization”, Pattern recognition letters,Elsevier, Vol. 28, Issue 4, pp 459-471, 2007.
[26] Beynon, M, “ Reducts within the Variable Precision Rough Sets Model: A Further Investigation”, European journal of operational research, Vol. 134, Issue 3, pp. 592-605, 2001.
[27] Sookhak, M., Gani, A., Khan, M. K., Buyya, R, “ Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing”, Information Sciences, Elsevier, Vol. 380, pp.101-116, 2017.
[28] Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U, “ The Rise of Big Data on Cloud Computing: Review and Open Research Issues”, Information Systems,Elsevier, Vol. 47, pp.98-115, 2015
[29] Beloglazov, A., Abawajy, J., Buyya, R, “ Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future generation computer systems,Elsevier,Vol. 28, Issue 5, pp. 755-768, 2012.
[30] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A, “ Cloud Computing—The Business Perspective”, Decision Support Systems,Elsevier, Vol.51, Issue 1, pp. 176-189, 011.
[31] Subashini, S., Kavitha, V, “ A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of network and computer applications,Vol. 34, Issue 1,pp. 1-11, 2011.
[32] Lohachab, Ankur, Karambir, “ Using Quantum Key Distribution and ECC for Secure Inter-Device Authentication and Communication in IoT Infrastructure”, In the Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT) ,pp. 190-197, 2018.
[33] Gupta, B. B., Badve, O. P, “Taxonomy of DoS and DDoS attacks and Desirable Defense Mechanism in A Cloud Computing Environment”, Neural Computing and Applications,Springer, Vol.28,Issue 12, pp.3655-3682, 2017.
[34] Younge, A. J., Von Laszewski, G., Wang, L., Lopez-Alarcon, S., Carithers, W, “ Efficient Resource Management for Cloud Computing Environments”, In the proceedings of IEEE International Conference on Green Computing,pp. 357-364, 2010
[35] Foster, I., Zhao, Y., Raicu, I.,Lu, S, “Cloud Computing and Grid Computing 360-Degree Compared”, In the proceedings of IEEE Workshop on Grid Computing Environments,(GCE), pp.1-10, 2008.
[36] Buyya, R., Ranjan, R.,Calheiros, R, “Modeling and simulation of Scalable Cloud Computing Environments and The CloudSim toolkit: Challenges and Opportunities”, In the proceedings of IEEE International conference on High-Performance Computing & Simulation,(HPCS), pp.1-11, 2009.
[37] Ishizu, S., Gehrmann, A., Nagai, Y., Inukai, Y, “Rough Ontology: Extension of Ontologies by Rough Sets”, In the proceedings of Springer Symposium on Human Interface and the Management of Information, pp.456-462, 2007.
[38] Kawtrakul, A., Suktarachan, M., Imsombut, A, “Automatic Thai Ontology Construction and Maintenance System”, In the Proceedings of Ontolex Workshop on LREC, pp.68-74, 2004.
[39] Lee, I. H., Lee, S., Lee, T., Lee, S. G., Kim, D., Chun, J., Shim, J, “Practical Issues for Building a Product Ontology System”, In the proceedings of IEEE International Workshop on Data Engineering Issues in E-Commerce, pp.16-25, 2005.
[40] Xu, J., Lee, Y. H., Tsai, W. T., Li, W., Son, Y. S., Park, J. H., Moon, K. D, “ Ontology-Based Smart Home Solution and Service Composition”, In the proceedingd of IEEE International Conference on Embedded Software and Systems, (ICESS),pp. 297-304, 2009.