Task Scheduling Algorithm Based on Bacterial Foraging Optimization (BFO) in Cloud Computing

Authors

  • Anupama Gupta HOD, Lala Lajpat Rai Institute of Engineering and Technology, Punjab, India
  • Kulveer Kaur Student, Department of Computer Science, Lala Lajpat Rai Institute of Engineering and Technology, Punjab, India
  • Rajvir Kaur Lala Lajpat Rai Institute of Engineering and Technology, Punjab, India

DOI:

https://doi.org/10.51983/ajeat-2018.7.1.983

Keywords:

VM migration, Cloudlet,, CloudSim, virtual machines

Abstract

Cloud computing is the architecture in which cloudlets are executed by the virtual machines. The most applicable virtual machines are selected on the basis of execution time and failure rate. Due to virtual machine overloading, the execution time and energy consumption is increased at steady rate. In this paper, BFO technique is applied in which weight of each virtual machine is calculated and the virtual machine which has the maximum weight is selected on which cloudlet will be migrated. The performance of proposed algorithm is tested by implementing it in CloudSim and analyzing it in terms of execution time, energy consumption.

References

G. Wei, A. V. Vasilakos, Y. Zheng, and N. Xiong, "A game-theoretic method of fair resource allocation for cloud computing services," J. Supercomput., vol. 54, pp. 252–269, 2010.

Y. C. Lee and A. Y. Zomaya, "Energy efficient utilization of resources in cloud computing systems," J. Supercomput., vol. 60, pp. 268–280, 2012.

N. D. Doulamis, P. Kokkinos, and E. Varvarigos, "Resource selection for tasks with time requirements using spectral clustering," IEEE Trans. Comput., vol. 63, no. 2, pp. 461–474, 2014.

A. Hameed et al., "A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems," Computing, pp. 1–24, 2014.

H. Chen et al., "Towards Energy-Efficient Scheduling for Real-Time Tasks under Uncertain Cloud Computing Environment," J. Syst. Softw., vol. 99, pp. 20–35, 2015.

Z. Wang and X. Su, "Dynamically hierarchical resource-allocation algorithm in cloud computing environment," J. Supercomput., 2015.

H. R. Talkhaby and R. Parsamehr, "Cloud Computing Authentication Using Biometric-Kerberos scheme based on Strong DiffiHellman-DSA Key Exchange," in International Conference on Control, Instrumentation, Communication and Computational Technologies, vol. 3, pp. 104-110, 2016.

K. K. Shah, V. U. Vadiya, and R. H. Jhaveri, "A Survey Paper on Security in Cloud Computing: A Bibliographic Analysis," Circulation in Computer Science, vol. 1, pp. 9-23, 2016.

S. S. Manikandasaran, "Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage," Int. J. Comput. Sci. Inf. Technol. & Security, vol. 6, pp. 498-503, 2016.

G. Zhu et al., "Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment," in 2017 IEEE 10th International Conference on Cloud Computing, vol. 4, pp. 743-748, 2017.

M. S. Hossain et al., "Cloud-assisted secure video transmission and sharing framework for smart cities," Future Gener. Comput. Syst., vol. 4, pp. 45-57, 2017.

V. Mahajan and S. K. Peddoju, "Deployment of Intrusion Detection System in Cloud: A Performance-Based Study," vol. 5, pp. 140-153, 2017.

M. T. Adili et al., "Cost-Effective Security Management for Clouds: A Game-Theoretic Deception Mechanism," vol. 5, pp. 98-106, 2017.

T. Salman et al., "Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments," in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing, vol. 3, pp. 97-103, 2017.

Downloads

Published

29-01-2018

How to Cite

Gupta, A., Kaur, K., & Kaur, R. (2018). Task Scheduling Algorithm Based on Bacterial Foraging Optimization (BFO) in Cloud Computing. Asian Journal of Engineering and Applied Technology, 7(1), 16–19. https://doi.org/10.51983/ajeat-2018.7.1.983