High Availability and High Scalability to in-Cloud Enterprise Resource Planning System

  • Bao Rong Chang
  • Hsiu-Fen Tsai
  • Ju-Chun Cheng
  • Yun-Che Tsai
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 298)


In this paper the host system architecture with high availability and high scalability has introduced to an in-cloud Enterprise Resources Planning (in-cloud ERP) deployed in the virtual environment to tackle the crucial problem of unexpected down-time or the failure of system failover that causes data loss and system terminated. Access control authentication has been adopted in the cloud to prevent the service-oriented hosts form external fraud or intrusion. As a result, the experiments have shown that the number of access for in-cloud ERP is 5.2 times as many as in-house ERP. The total cost of in-cloud ERP has decreased significantly to 48.4% of total cost of in-house ERP. In terms of operational speed, the approach proposed in this paper outperforms significantly two well-known benchmark ERP systems, in-house ECC 6.0 and in-cloud ByDesign.


in-Cloud Enterprise Resources Planning (in-Cloud ERP) High Availability High Scalability Biometrics Fraud 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Beloglazov, A., Buyya, R.: Energy Efficient Allocation of Virtual Machines in Cloud Data Centers. In: 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577–578 (2010)Google Scholar
  2. 2.
    Laurikainen, R., Laitinen, J., Lehtovuori, P., Nurminen, J.K.: Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment. In: 2012 International Conference on Cloud and Service Computing, pp. 232–239 (2012)Google Scholar
  3. 3.
    Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation. In: 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233–240 (2012)Google Scholar
  4. 4.
    Yang, T.-S., Choi, J., Zheng, X., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Research of Enterprise Resource Planning in a Specific Enterprise. In: 2006 IEEE International Conference on Systems, Man, and Cybernetics, pp. 418–422 (2006)Google Scholar
  5. 5.
    de Carvalho, R.A., Monnerat, R.M., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Development Support Tools for Enterprise Resource Planning. IT Professional Magazine, 39–45 (2008)Google Scholar
  6. 6.
    Wu, H.-Q., Ding, Y., Winer, C., Yao, L.: Network Security for Virtual Machine in Cloud Computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 18–21 (2010)Google Scholar
  7. 7.
  8. 8.
    Zhao, J.-G., Liu, J.-C., Fan, J.-J., Di, J.-X.: The Security Research of Network Access Control System. In: 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery. E-Commerce & Its Applications and Embedded Systems, pp. 283–288 (2010)Google Scholar
  9. 9.
    Metz, C.: AAA protocols: Authentication, Authorization, and Accounting for the Internet. IEEE Internet Computing 3(6), 75–79 (1999)CrossRefGoogle Scholar
  10. 10.
    Zhang, L.-F., Persaud, A.G., Johnson, A., Yong, G.: Detection of Stepping Stone Attack Under Delay and Chaff Perturbations. In: 25th Annual International Performance, Computing, and Communications Conference, pp. 256–266 (2006)Google Scholar
  11. 11.
    Yang, H.-Y., Xie, L.-X., Xie, F.: A New Approach to Network Anomaly Attack Detection. Fuzzy Systems and Knowledge Discovery 4, 317–321 (2008)Google Scholar
  12. 12.
    Chang, B.R., Tsai, H.-F., Chen, C.-M.: Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. Journal of Information Hiding and Multimedia Signal Processing 4(3), 192–200 (2013)Google Scholar
  13. 13.
    Chang, B.A., Tsai, H.-F., Chen, C.-M.: Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing. Mathematical Problems in Engineering 2013, Article ID 947234, 11 pages (2013)Google Scholar
  14. 14.
    Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy 6(2), 30–37 (2008)CrossRefGoogle Scholar
  15. 15.
    Chang, B.R., Huang, C.-F., Tsai, H.-F., Lin, Z.-Y.: Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification. Journal of Information Hiding and Multimedia Signal Processing 3(2), 176–190 (2012)Google Scholar
  16. 16.
    Hsiao, H.W., Fan, W.C.: Detecting step-stone with Network Traffic Mining Approach. In: The Fourth International Conference on Innovative Computing, Information and Control, pp. 1176–1179 (2009)Google Scholar
  17. 17.
    Hsiao, H.W., Lin, C.S., Chang, S.Y.: Constructing an ARP Attack Detection System with SNMP traffic data mining. In: The 11th International Conference on Electronic Commerce, pp. 341–345 (2009)Google Scholar
  18. 18.
  19. 19.
    Tate, J.: IBM System Storage SAN Volume Controller (IBM Redbooks). Vervante, New York (2006)Google Scholar
  20. 20.
    Doedt, M., Steffen, B.: Requirement-Driven Evaluation of Remote ERP-System Solutions: A Service-oriented Perspective. In: 34th IEEE Software Engineering Workshop, pp. 57–66 (2011)Google Scholar
  21. 21.
    Elragal, A., Kommos, M.E.: In-House versus In-Cloud ERP Systems: A Comparative Study. Journal of Enterprise Resource Planning Studies 2012, Article ID 659957, 13 pages (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Bao Rong Chang
    • 1
  • Hsiu-Fen Tsai
    • 2
  • Ju-Chun Cheng
    • 1
  • Yun-Che Tsai
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational University of KaohsiungKaohsiungTaiwan
  2. 2.Department of Marketing ManagementShu Te UniversityKaohsiungTaiwan

Personalised recommendations