Fast Handling of Cloud Data Based on user Level Virtualization and Resource Scheduling

Authors(2) :-P. Aron Bami, M. Velladurai

Many believe the future of gaming lies in the cloud, namely Cloud Gaming, which renders an interactive gaming application in the cloud and streams the scenes as a video sequence to the player over Internet. This paper proposes GCloud, a GPU/CPU hybrid cluster for cloud gaming based on the user-level virtualization technology. Specially, we present a performance model to analyze the server-capacity and games resource-consumptions, which categorizes games into two types: CPU-critical and memory-io-critical. Consequently, several scheduling strategies have been proposed to improve the resource-utilization and compared with others. Simulation tests show that both of the First-Fit-like and the Best-Fit-like strategies outperform the other(s); especially they are near optimal in the batch processing mode. Other test results indicate that GCloud is efficient: An off-the-shelf PC can support five high-end video-games run at the same time. In addition, the average per-frame processing delay is 8_19 ms under different image-resolutions, which outperforms other similar solutions.

Authors and Affiliations

P. Aron Bami
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli,Tamilnadu, India
M. Velladurai
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli,Tamilnadu, India

Application Programming Interface, Representational State Transfer, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Performance Counter Monitor, Remote Frame Buffer.

  1. S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving AccessControl with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  2. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “TowardSecure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
  3. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “FuzzyKeyword Search Over Encrypted Data in Cloud Computing,”Proc. IEEE INFOCOM, pp. 441-445, 2010.
  4. S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  5. H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authenticationfor Cloud Computing,” Proc. First Int’l Conf. Cloud Computing(CloudCom), pp. 157-166, 2009.
  6. C. Gentry, “A Fully Homomorphic Encryption Scheme,” PhDdissertation, Stanford Univ.,, 2009.
  7. A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-BasedCloud Computing,” Proc. Third Int’l Conf. Trust and TrustworthyComputing (TRUST), pp. 417-429, 2010.
  8. R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Frameworkfor Accountability and Trust in Cloud Computing,” HP TechnicalReport HPL-2011-38, http://www., 2013.
  9. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: TheEssential of Bread and Butter of Data Forensics in CloudComputing,” Proc. Fifth ACM Symp. Information, Computer andComm. Security (ASIACCS), pp. 282-292, 2010.
  10. D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf., 1992.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 69-74
Manuscript Number : CSEIT17225
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

P. Aron Bami, M. Velladurai, "Fast Handling of Cloud Data Based on user Level Virtualization and Resource Scheduling", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.69-74, March-April-2017.
Journal URL :

Article Preview