An efficient task scheduling and resource allocation in cloud computing by using particle swarm optimization
ABSTARCT :
Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an attractive approach to construct pricing schemes, providing access controllability, user anonymity and public traceability. In k-TAA schemes, authenticated users are permitted to anonymously access services from a provider at most k times, while the ones whose the number of access times exceeds k can be publicly traded. That is, k-TAA schemes offer a prepaid plan that charges users based on the amount of access times. Alternatively, pay-as-you-go (PAYG) is a pricing strategy that allows users to be charged based on the amount of usage, reducing the costs on unnecessary resources. Adopting k-TAA schemes to PAYG model, th access bound k is decided by the prepayment amount and the service usage is tracked by the number of access times. However, this approach is impractical, since existing k-TAA schemes only allow an one-time access in an authentication. This work aims to bridge this gap in the literature by designing an efficient and secure authentication system for PAYG cloud computing, supporting flexible access controllability, user anonymity and public traceability. To achieve this, we propose new k-TAA primitive, called k-times anonymous pay-as-you-go authentication (k-TAA-PAYG), that allows users to access services for multiple times in an authentication as long as the number of their access times does not exceed k. We first formalize the definition and security model for k-TAA-PAYG scheme. Subsequently, we present a concrete construction of k-TAA-PAYG scheme, with the computational complexity as O(1) and the constant communicational cost. Finally, comparing with the most efficient k-TAA scheme proposed by Emura et al., the experimental results show that our k-TAA-PAYG scheme is 2.5 to 3 times faster and saves up to 66% storage in grant processes. The time cost of an authentication of our k-TAA-PAYG scheme is constant (1.4-2.4 ms), while Emura et al.’s scheme needs more than one second when the number of access time is greater than 1,000.
EXISTING SYSTEM :
To attract more users, cloud providers offer their computing resource as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. But in existing system there is no proper storage based cost estimated .
DISADVANTAGE :
The direct attack effect such as service downtime, auto-scaling driven resource/economic losses, business and revenue losses, economic losses due to the downtime, and the service's downtime
PROPOSED SYSTEM :
Public cloud resources approach and apply the PAYG model differently. For example, a user provisioning a dedicated cloud server is generally billed according to server power and usage and on a recurring basis. Software as a Service (SaaS) works similarly, where a user leases software and customized features. Storage as a Service (SaaS) billing rotates on a frequent basis because storage requirements increase are usually subject to gradually increased pricing. Pay as you go is a cost model for cloud services that encompasses both subscription-based and consumption-based models and memory usage and expiry date, in contrast to traditional IT cost model that requires cost based cloud usage in server.
ADVANTAGE :
QoS includes the scalability and performance of Web service-based services, the performance of the access control engine, the delay, jitter, response time etc., of real-time services etc.
Moreover, there are many extended Web services specifications ranging from transactions, business process, messaging, transport, security, metadata to performance, which are on their way toward standardization.
As an exception, services run in real-time mode (such as the ECG Monitoring service and Teleconsultation service) are allowed to bypass the portal since they usually demand better performance than what SOAP can provide.
|