Energy Management Techniques for Cloud Based Environment

Authors

  • Neenu Juneja  Assistant Professor, Chandigarh Group of Colleges, Landran, Ajitgarh, Punjab, India
  • Chamkaur Singh  Assistant Professor, Chandigarh Group of Colleges, Landran, Ajitgarh, Punjab, India
  • Krishan Tuli  Assistant Professor, UIC, Chandigarh University, Ajitgarh, Punjab, India

DOI:

https://doi.org//10.32628/CSEIT206293

Keywords:

Energy-efficiency, Virtualization; DVFS, VM Consolidation, VM-Migration Cloud Datacenters, VM-Allocation

Abstract

Cloud Computing has the facility to transform a large part of information technology into services in which computer resources are virtualized and made available as a utility service. From here comes the importance of scheduling virtual resources to get the maximum utilization of physical resources. The growth in server’s power consumption is increased continuously; and many researchers proposed, if this pattern repeats continuously, then the power consumption cost of a server over its lifespan would be higher than its hardware prices. The power consumption troubles more for clusters, grids, and clouds, which encompass numerous thousand heterogeneous servers. Continuous efforts have been done to reduce the electricity consumption of these massive-scale infrastructures. To identify the challenges and required future enhancements in the field of efficient energy consumption in Cloud Computing, it is necessary to synthesize and categorize the research and development done so far. In this paper, the authors prepare taxonomy of huge energy consumption problems and its related solutions. The authors cover all aspects of energy consumption by Cloud Datacenters and analyze many more research papers to find out the better solution for efficient energy consumption. Keywords: Cloud computing, Collocated virtual machines, Live migration, Load balancing, Resource scheduling

References

  1. Zhang, Qingchen, Laurence T. Yang, Zhikui Chen, and Peng Li. "A survey on deep learning for big data." Information Fusion 42 (2018): 146-157.
  2. Grover, V., Chiang, R. H., Liang, T. P., & Zhang, D. (2018). Creating strategic business value from big data analytics: A research framework. Journal of Management Information Systems, 35(2), 388-423.
  3. Sivarajah, U., Kamal, M. M., Irani, Z., &Weerakkody, V. (2017). Critical analysis of Big Data challenges and analytical methods. Journal of Business Research, 70, 263-286
  4. De Mauro, Andrea, Marco Greco, and Michele Grimaldi. "A formal definition of Big Data based on its essential features." Library Review 65, no. 3 (2016): 122-135.
  5. Lakshmi, R. Durga, and N. Srinivasu. "A dynamic approach to task scheduling in cloud computing using a genetic algorithm." Journal of Theoretical & Applied Information Technology 85, no. 2 (2016).
  6. Abdul Razak, Nikhileshwara Reddy Vennapusa, "Task Scheduling in Cloud Computing," IEEE2016.
  7. DemyanaIzzatEsa, "Scheduling Jobs on Cloud Computing using Firefly Algorithm," International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016), pp.149-158.
  8. R. Sundararajan, V. Vasudevan, and S. Mithya, "Workflow scheduling in a cloud computing environment using firefly algorithm,” 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 955-960.
  9. Assuncao, Marcos D., Rodrigo N. Calheiros, Silvia Bianchi, Marco AS Netto, and RajkumarBuyya. "Big Data computing and clouds: Trends and future directions." Journal of Parallel and Distributed Computing 79 (2015): 3-15.
  10. Jiao Hu, "Task Scheduling Model of Cloud Computing, based on Firefly Algorithm" International Journal of Hybrid Information Technology Vol.8, No.8 (2015), pp.35-46.
  11. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information systems, 47, 98-115.
  12. Y. Liu, H. Shao, W. Jing, and Z. Qiu, "Multi-DAGs Scheduling Integrating with Security and Availability in Cloud Environment," in the Chinese Journal of Electronics, vol. 24, no. 4, pp. 709-716, 10, 2015.
  13. H. Arabnejad and J. G. Barbosa, “List Scheduling Algorithm for Heterogeneous Systems by an Optimistic Cost Table,” in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 682-694, March 2014.
  14. Singh, Raja Manish, Sanchita Paul, and Abhishek Kumar. "Task scheduling in cloud computing." International Journal of Computer Science and Information Technologies (IJCSIT) 5, no. 6 (2014): 7940-7944.
  15. Dr. AmitAgarwal, "Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment," International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7– Mar 2014.
  16. Er.Shimpy, Mr.JagandeepSidhu, "Different Scheduling Algorithms In Different Cloud Environment," International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 9, September 2014.
  17. Lin, Weiwei, Chen Liang, James Z. Wang, and RajkumarBuyya “Bandwidth‐aware divisible task scheduling for cloud computing,” Software: Practice and Experience vol.44, 2014, pp. 163-174.
  18. Chawla, Yogita, and MansiBhonsle. “A study on scheduling methods in cloud computing.” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 1.3 (2012): 12-17
  19. B. Saovapakhiran, G. Michailidis, and M. Devetsikiotis, "Aggregated-DAG Scheduling for Job Flow Maximization in Heterogeneous Cloud Computing," 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, Houston, TX, USA, 2011, pp. 1-6.
  20. L.F. Bittencourt, R. Sakellariou and E.R.M. Madeira, "DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm," 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP’10), pp. 27-34, 2010.
  21. Haijun Cao, Hai Jin, Xiaoxin Wu, Song Wu, and Xuanhua Shi, "DAGMap: Efficient scheduling for DAG grid workflow job,” 2008 9th IEEE/ACM International Conference on Grid Computing, Tsukuba, 2008, pp. 17-24.C.
  22. Boeres, J.V. Filho and V.E.F. Rebello, “A Cluster-based Strategy for Scheduling Task on Heterogeneous Processors” 16th Symposium on Computer Architecture and High-Performance Computing, pp. 214-221, 2004.
  23. T. Hagras and J. Janecek, "A Simple Scheduling Heuristic for ˇ Heterogeneous Computing Environments," Proceedings Second International Symposium on Parallel and Distributed Computing, pp. 104-110, 2003.
  24. A. K. Amoura, E. Bampis and J. C. Konig, “Scheduling algorithms for parallel Gaussian elimination with communication costs,” in IEEE Transactions on Parallel and Distributed Systems, vol. 9, no. 7, pp. 679-686, Jul 1998.
  25. RobPegler,“ Introduction to big data, analytics knowledge and skill approach with various techniques : http://www.snia.org/sites/default/files2/ ABDS2012/ Tutorials.pdf
  26. https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/Technology/TechnologyRoadmap/BigData.pdf
  27. Pro Apache Hadoop-Date: 08 September 2014-Sameer Walker Affiliated with, Madhu Siddalingaiah. http://link.springer.com/chapter/10.1007/978-1-4302-4864-4_1#page-2 Motivation for Big Data-Philip Russom, “Managing Big Data”, TDWI research, Fourth Quarter 2013.
  28. Changqing, “Big Data Processing in Cloud Computing Environments”, International Symposium on Pervasive Systems, Algorithms and Networks, 2012
  29. Young-Sae Song, “Storing Big Data- The rise of the Storage Cloud” , December, 2012.
  30. Gartner, http://www.gartner.com/newsroom/id/2848718, STAMFORD, Conn., September 17, 2014
  31. The journey to big data, EMC2 Publications.
  32. Horton Technical Preview for Apache Spark, Horton works Inc.
  33. https://www.cloudcomputing-news.net/categories/big-data
  34. Shay Chen, “Application Denial of Service”, Hack tics Ltd, 2007.
  35. Daniel J. Bernstein, “Understanding brute force”, National Science Foundation, Chicago.
  36. Undefined By Data: A Survey of Big Data Definitions-Jonathan Stuart Ward and Adam Barker-School of Computer Science-University of St Andrews, UK{jonthan.stuart.ward,adam.barker}@st-andrews.ac.uk
  37. D. Bigo, G. Boulet, C. Bowden, S. Carrera, J. Jeandesboz, and A. Scherrer, “Fighting cyber crime and protecting privacy in the cloud.” European Parliament, Policy Department C: Citizens’ Rights and Constitutional Affairs, October 2012.
  38. N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.
  39. J. Sendor, Y. Lehmann, G. Serme, and A. Santana de Oliveira, “Platform level support for authorization in cloud services with oauth 2,” in Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E ’14, (Washington, DC, USA), pp. 458–465, IEEE Computer Society, 2014.
  40. F. F. Brasser, M. Bucicoiu, and A.-R. Sadeghi, “Swap and play: Live updating hypervisors and its application to xen,” in Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, CCSW ’14, (New York, NY, USA), pp. 33–44, ACM, 2014.
  41. Gholami, J. Dowling, and E. Laure, “A security framework for population-scale genomics analysis,” in High Performance Computing Simulation (HPCS), 2015 International Conference on, pp. 106–114, July 2015.
  42. S. Sharma, U. S. Tim, J. Wong, S. Gadia, S. Sharma, “A Brief Review on Leading Big Data Models,” Data Science Journal, 13(0), 138-157. 2014.
  43. S. Sharma, U. S. Tim, J. Wong, S. Gadia, R. Shandilya, S. K. Peddoju, “Classification and comparison of NoSQL big data models,” International Journal of Big Data Intelligence (IJBDI), Vol. 2, No. 3, 2015.

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Neenu Juneja, Chamkaur Singh, Krishan Tuli, " Energy Management Techniques for Cloud Based Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.287-294, March-April-2020. Available at doi : https://doi.org/10.32628/CSEIT206293