A Survey on Fault Aware Load Balancing and Power Efficient Scheduling in Cloud Computing

Authors

  • S. Sivakumar  Ph.D Research Scholar, Sree Saraswathi Thyagaraja College, Pollachi,Tamilnadu, India
  • V. Anuratha  Head, PG Department of Computer Science, Sree Saraswathi Thiyagaraja College, Pollachi, Tamilnadu, India

Keywords:

Resource Allocation, SaaS, PaaS, IaaS, Load Balancing.

Abstract

Resource allocation and load balancing in a cloud environment is a problem of interest in recent years. With the increase in number of request over the data centers and size of cloud infrastructure over time, increasing the load unbalancing and power consumption of the data center. So, the requests need to be balanced in such manner having a more effective strategy for resources utilization, request failure, and improved power consumption. Cloud computing made it more complicated with respective to requests types that affect the performance of system. In general, resource allocation and load balancing algorithm chooses an objective function to select a host with least resource utilization, power consumption to optimize the system performance and provide high Quality of Service.

References

  1. Abdullah, M. and M. Othman (2013). Cost-based multi-QoS job scheduling using divisible load theory in cloud computing, Procedia computer science, Vol. 18, pp. 928-935.
  2. Ackermann, H., S. Fischer, M. Hoefer and M. Schöngens (2011). Distributed algorithms for QoS load balancing, Distributed Computing, Vol. 23, No. 5, pp. 321-330.
  3. Addis, B., D. Ardagna, B. Panicucci, M. S. Squillante and L. Zhang (2013). A hierarchical approach for the resource management of very large cloud platforms, IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 5, pp. 253-272.
  4. Caballer, M., C. De Alfonso, F. Alvarruiz and G. Moltó (2013). EC3: Elastic cloud computing cluster, Journal of Computer and System Sciences, Vol. 79, No. 8, pp. 1341-1351.
  5. Cao, J., K. Li and I. Stojmenovic (2014). Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers, IEEE Transactions on Computers, Vol. 63, No. 1, pp. 45-58.
  6. Dasgupta, K., B. Mandal, P. Dutta, J. K. Mandal and S. Dam (2013). A genetic algorithm (GA) based load balancing strategy for cloud computing, Procedia Technology, Vol. 10, pp. 340-347.
  7. Dong, B., X. Li, Q. Wu, L. Xiao and L. Ruan (2012). A dynamic and adaptive load balancing strategy for parallel file system with large-scale I/O servers, Journal of Parallel and Distributed Computing, Vol. 72, No. 10, pp. 1254-1268.
  8. Kaur, R. and P. Luthra (2012). Load Balancing in Cloud Computing, In Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, ITC.
  9. Ko, Y. M. and Y. Cho (2014). A distributed speed scaling and load balancing algorithm for energy efficient data centers, Performance Evaluation, Vol. 79, pp. 120-133.
  10. Manvi, S. S. and G. K. Shyam (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey, Journal of Network and Computer Applications, Vol. 41, pp. 424-440.
  11. Arshad, J., Townend, P., and Xu, J. An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds, International Journal of Cloud Applications and Computing, 1(1), March 2011, pp.1-15.
  12. Ashish, K. Tornado Codes and Luby Transform Codes, Technical Report, October, 2003.
  13. Ashish, K., and Elisa, B. Structural Signatures for Tree Data Structures, In ProceedingsOf PVLDB '08, Auckland, New Zealand, August, 2008.
  14. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D. Provable data possession at untrusted stores, In Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA CCS,2007, pp. 598–609.
  15. Ateniese, G., Kamara, S., and Katz, J. Proofs of storage from homomorphic identification protocols, In Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology,ASIACRYPT ‘09, Springer, Berlin, Heidelberg,2009, pp. 319–333.
  16. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., and Song, D. Remote Data Checking Using Provable Data Possession, ACM Transactions on Information and System Security, Vol. 14, No. 1 , Article 12, May 2011, pp.12.1-12.34.
  17. Ateniese, G., Di Pietro, R., Mancini, L.V., and Tsudik, G. Scalable and efficient provable data possession, In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm ‘09, ACM, New York, NY, USA,2008, pp. 1-10.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
S. Sivakumar, V. Anuratha, " A Survey on Fault Aware Load Balancing and Power Efficient Scheduling in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.290-297, September-October-2017.