Fast Handling of Cloud Data Based on user Level Virtualization and Resource Scheduling

Authors

  • P. Aron Bami  Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli,Tamilnadu, India
  • M. Velladurai  Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli,Tamilnadu, India

Keywords:

Application Programming Interface, Representational State Transfer, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Performance Counter Monitor, Remote Frame Buffer.

Abstract

Many believe the future of gaming lies in the cloud, namely Cloud Gaming, which renders an interactive gaming application in the cloud and streams the scenes as a video sequence to the player over Internet. This paper proposes GCloud, a GPU/CPU hybrid cluster for cloud gaming based on the user-level virtualization technology. Specially, we present a performance model to analyze the server-capacity and games resource-consumptions, which categorizes games into two types: CPU-critical and memory-io-critical. Consequently, several scheduling strategies have been proposed to improve the resource-utilization and compared with others. Simulation tests show that both of the First-Fit-like and the Best-Fit-like strategies outperform the other(s); especially they are near optimal in the batch processing mode. Other test results indicate that GCloud is efficient: An off-the-shelf PC can support five high-end video-games run at the same time. In addition, the average per-frame processing delay is 8_19 ms under different image-resolutions, which outperforms other similar solutions.

References

  1. S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving AccessControl with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  2. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “TowardSecure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
  3. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “FuzzyKeyword Search Over Encrypted Data in Cloud Computing,”Proc. IEEE INFOCOM, pp. 441-445, 2010.
  4. S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  5. H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authenticationfor Cloud Computing,” Proc. First Int’l Conf. Cloud Computing(CloudCom), pp. 157-166, 2009.
  6. C. Gentry, “A Fully Homomorphic Encryption Scheme,” PhDdissertation, Stanford Univ., http://www.crypto.stanford.edu/craig, 2009.
  7. A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-BasedCloud Computing,” Proc. Third Int’l Conf. Trust and TrustworthyComputing (TRUST), pp. 417-429, 2010.
  8. R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Frameworkfor Accountability and Trust in Cloud Computing,” HP TechnicalReport HPL-2011-38, http://www. hpl.hp.com/techreports/2011/HPL-2011-38.html, 2013.
  9. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: TheEssential of Bread and Butter of Data Forensics in CloudComputing,” Proc. Fifth ACM Symp. Information, Computer andComm. Security (ASIACCS), pp. 282-292, 2010.
  10. D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf., 1992.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. Aron Bami, M. Velladurai, " Fast Handling of Cloud Data Based on user Level Virtualization and Resource Scheduling, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.69-74, March-April-2017.