Abstract
Cloud computing is one of the most sought-after technologies today. Beyond a shadow of doubt, the number of clients opting for Cloud is increasing. This steers the complexity of the management of the Cloud computing environment. In order to serve the demands of customers, Cloud providers are resorting to more resources. Relying on a single managing element to coordinate the entire pool of resources is no more an efficient solution. Therefore, we propose to use a hierarchical approach for autonomic management. The problem that we consider here is to determine the nodes at which we have to place the Autonomic Managers (AMs), in order to ease the management process and minimize the cost of communication between the AMs. We propose a graph-theory-based model using Connected Dominating Set (CDS) that allows to determine an effective placement of AMs in different Data Centers (DCs), and, their collaboration with the Global Manager (GM). The approach considers the construction of domination sets and then, distributing the control of the dominees among the dominators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Smart cloud. http://www.ibm.com/cloud-computing/
Openstackcascading. https://www.openstack.org/videos/video/building-multisite-multi-openstack-cloud-with-openstack-cascading
Apache cloudstack documentation. http://docs.cloudstack.apache.org/en/latest/concepts.html
Martin, J.P., Hareesh, M., Babu, A., Cherian, S., Sastri, Y., et al.: Learning environment as a service (leaas): cloud. In: 2014 Fourth International Conference on Advances in Computing and Communications (ICACC), pp. 218–222. IEEE (2014)
de Oliveira, F.A., Ledoux, T., Sharrock, R.: A framework for the coordination of multiple autonomic managers in cloud environments. In: 2013 IEEE 7th International Conference on Self-adaptive and Self-organizing Systems, pp. 179–188. IEEE (2013)
Worldwide public cloud services spending forecast to double by 2019, according toidc. https://www.idc.com/getdoc.jsp?containerId=prUS40960516
Buyya, R., Calheiros, R.N., Li, X.: Autonomic cloud computing: open challenges and architectural elements. In: 2012 Third International Conference on Emerging Applications of Information Technology (EAIT), pp. 3–10. IEEE (2012)
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–50 (2003)
Singh, S., Chana, I.: Qos-aware autonomic resource management in cloud computing: a systematic review. ACM Comput. Surv. (CSUR) 48(3), 42 (2016)
Horn, P.: Autonomic computing: Ibm\’s perspective on the state of information technology (2001)
Xia, Y., Tsugawa, M., Fortes, J.A., Chen, S.: Toward hierarchical mixed integer programming for pack-to-swad placement in datacenters. In: 2015 IEEE International Conference on Autonomic Computing (ICAC), pp. 219–222. IEEE (2015)
Mohamed, M., Megahed, A.: Optimal assignment of autonomic managers to cloud resources. In: 2015 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 88–93. IEEE (2015)
Casalicchio, E., Menascé, D.A., Aldhalaan, A.: Autonomic resource provisioning in cloud systems with availability goals. In: Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, p. 1. ACM (2013)
Diaz-Montes, J., Zou, M., Rodero, I., Parashar, M.: Enabling autonomic computing on federated advanced cyberinfrastructures. In: Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, p. 20. ACM (2013)
Uriarte, R.B., Tsaftaris, S., Tiezzi, F.: Supporting autonomic management of clouds: service clustering with random forest
Dai, F., Wu, J.: An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans. Parallel Distrib. Syst. 15(10), 908–920 (2004)
Thai, M.T., Wang, F., Liu, D., Zhu, S., Du, D.Z.: Connected dominating sets in wireless networks with different transmission ranges. IEEE Trans. Mob. Comput. 6(7), 721–730 (2007)
Yu, J., Wang, N., Wang, G., Yu, D.: Connected dominating sets in wireless ad hoc and sensor networks—a comprehensive survey. Comput. Commun. 36(2), 121–134 (2013)
Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. In: European Symposium on Algorithms, pp. 179–193. Springer, Berlin (1996)
Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)
Opnet. https://www.riverbed.com/in/products/steelcentral/opnet.html?redirect=opnet
Çatalyürek, U.V., Kaya, K., Uçar, B.: Integrated data placement and task assignment for scientific workflows in clouds. In: Proceedings of the Fourth International Workshop on Data-Intensive Distributed Computing, pp. 45–54. ACM (2011)
Bansal, N., Lee, K.W., Nagarajan, V., Zafer, M.: Minimum congestion mapping in a cloud. In: Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pp. 267–276. ACM (2011)
Li, M., Subhraveti, D., Butt, A.R., Khasymski, A., Sarkar, P.: Cam: a topology aware minimum cost flow based resource manager for MapReduce applications in the cloud. In: Proceedings of the 21st International Symposium on High-Performance Parallel and Distributed Computing, pp. 211–222. ACM (2012)
Dai, Y.S., Yang, B., Dongarra, J., Zhang, G.: Cloud service reliability: modeling and analysis. In: 15th IEEE Pacific Rim International Symposium on Dependable Computing, pp. 1–17. Citeseer (2009)
Sobiya, P., Nayagam, M.G.: Dominating set based content cloud architecture for video distribution services. In: 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–6. IEEE (2014)
VijayaChandra, J., Rao, K.T., Reddy, V.K.: Numerical formulation and simulation of social networks using graph theory on social cloud platform. Glob. J. Pure Appl. Math. 11(3), 1253–1264 (2015)
Binz, T., Fehling, C., Leymann, F., Nowak, A., Schumm, D.: Formalizing the cloud through enterprise topology graphs. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 742–749. IEEE (2012)
Burgess, M., Canright, G., Engø-Monsen, K.: A graph-theoretical model of computer security. Int. J. Inf. Secur. 3(2), 70–85 (2004)
Zegzhda, P.D., Zegzhda, D.P., Nikolskiy, A.V.: Using graph theory for cloud system security modeling. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 309–318. Springer, Berlin (2012)
Jiang, T., Baras, J.S.: Graph algebraic interpretation of trust establishment in autonomic networks. Prep. Wiley J. Netw. (2009)
Chan, W., Mei, L., Zhang, Z.: Modeling and testing of cloud applications. In: APSCC2009, pp. 111–118 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Martin, J.P., Kandasamy, A., Chandrasekaran, K. (2018). Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 667. Springer, Singapore. https://doi.org/10.1007/978-981-10-8183-5_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-8183-5_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8182-8
Online ISBN: 978-981-10-8183-5
eBook Packages: EngineeringEngineering (R0)