In: Computer Science
i want three research question in PICOC model on the following key topics
Key Concepts: Optimization Techniques, Resource Scheduling,
Scheduling Algorithms, Cloud Computing, Scheduling Strategies,
Cloud Security
General Topic: Resource Scheduling in cloud computing
Who: Small scale industries
What: scheduling algorithms
When: current situation
Where: Software Industries
Optimization strategies of cloud services focus mainly on two areas. These target cost to benefit ratios of cloud service providers and also ensure redundancy of services to customers by employing multi-data center strategy. Usually a three data center approach delivers higher uptime while ensuring data integrity. This strategy also empowers cloud providers target desired geographic regions by reducing latency and costs.
Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well organized scheduling is needed for both cloud providers and cloud users. Cloud computing is required by modern technology. Task scheduling and resource allocation are important aspects of cloud computing. In this study a heuristic approach is there that combines the modified analytic hierarchy process (MAHP), bandwidth aware divisible scheduling (BATS) + BAR optimization, longest expected processing time preemption (LEPT), and divide-and-conquer methods to perform task scheduling and resource allocation.
Efficient task scheduling algorithm directly affects the system performance and soft computing based techniques proves to be very effective from the scheduling point of view .In cloud computing environment, it is more than sufficient to find near optimal solution, if possible in a short period of time. In this situation heuristic approach plays significant role. Meta heuristic methods for scheduling like genetic algorithms (GA), simulated annealing (SA), particle swarm optimization (PSO), and ant colony optimization (ACO) are used to solve the well-known NP- Complete problems. Other soft computing techniques like fuzzy logic, Quantum GA, Neural. Network with their integration with meta-heuristic may give better results.
Cloud computing presents itself as an efficient mechanism for the storage of data and data processing in third party sites. This involves the outsourcing and sharing of resources to acquire a greater efficiency in terms of economy, scalability and resource utilization. As now days, human being is getting more and more dependent on technology, there is a need for the utility which can be access on the move, as on demand and where and whenever it is required.
Resource scheduling strategies in cloud computing are used either to improve system operating efficiency, or to improve user satisfaction. This study represent an integrated scheduling strategy considering both resources credibility and user satisfaction. It takes user satisfaction as objective function and resources credibility as a part of the user satisfaction, and realizes optimal scheduling by using genetic algorithm.
Cloud Security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Cloud security is a form of cybersecurity.Cloud security refers broadly to measures undertaken to protect digital assets and data stored online via cloud services providers.