SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013
pp. 01–09, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3401
A CLOUD COMPUTING USING ROUGH
SET THEORY FOR CLOUD SERVICE
PARAMETERS THROUGH ONTOLOGY IN
CLOUD SIMULATOR
Ashish Tiwari*, Amit Kumar Tiwari, Hukam Chand Saini, Amit Kumar
Sharma, and Anoop Kumar Yadav
Central University of Rajasthan, Computer Science and Engineering,
NH-8,Bandarsindri, Kisangarh, Ajmer, Rajasthan
{ashishtiwari@curaj.ac.in,kumartiwariamit@gmail.com,
hukamchand@curaj.ac.in,amitsharma@curaj.ac.in,
anoop15690@gmail.com}
ABSTRACT :
Cloud Computing is an awesome technology which have go ahead and annex the computing
world. The development of cloud computing embed its sprouting continually in the recent era.
Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its
fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud
simulator working in our algorithm which is prepared with the help of rough set theory. The
algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers
are created to perform the algorithms with the help of rough sets. The Ontology is the system
consists of cloud services in which cloud service discovery system is maintained. At last there is
the implementation of work done using the rough set in cloud simulator using net beans and sql
as back end. The net beans is loaded with the cloud Sim packages in which some of the
packages are prepared according to our algorithm and gives the expected output of the
optimization using rough set as a new concept.
KEYWORDS :
Cloud Simulator, Rough Set Theory, Cloudlets, Datacenters , Cloud Ontology System and
Parameters
1. INTRODUCTION
In the day today world Computing is moving in its seven heavens where it is making its place
like a worm in a fruit. The most important thing to see here is its play a vital in businesses. By
this rapid development in businesses most number of people wants to save their money, time,
____________
*M.Tech Final Year Student (Dept. of CSE), I want to give special thanks to Dr.A.Nagaraju, Mehul Mahrishi
(Assistant Professor Central University of Rajasthan) and Pradeep Kumar (M.Sc) for backgroud support.
2 Computer Science & Information Technology (CS & IT)
space and performance etc. This increment done is due to the people requirements in the web
applications, by these application they are enjoying the life and consuming the time and money.
This may increment in the field of ebusiness by see the demand of people. In this world Cloud
Computing is spreading very rapidly through internet. So from all over analysis the basic
definition of the cloud computing can be given as the computing which tells about both the
applications providing services with the help of internet and available scalable hardware and the
software running on the systems may provide the services.[1] [2] Its basic definition tells as you
pay as you go manner. There are many computing present in the clouds like public, private and
hybrid. These computing play an important role in cloud computing concept. Here the cloud
computing is dealing with the cloud service providers which play an vital role for the formation
of the scheduling performed in the cloud computing.[4]
Fig. 1. Basic Structure of Cloud Computing.
There is a advanced study of the various cloud service providers and the parameters found after
the survey may play an important role for the formulation. The Deep study of the standard
organizations which are providing the various certification and protocols to perform their tasks in
well ordered and organized manner.[3]
Cloud Ontology is the system that is maintained to determine the similarities between and among
services.[9] Ontology when retrieving information about Cloud services. The relations among the
different types of Cloud services and determining which service(s) would be the best or most
appropriate service for meeting consumers service requirements.[7][8] On the calculated
parameters there is the working of the cloud service providers and standard organizations are
helping the services on that basis.
Fig. 2. Cloud Ontology System
Computer Science & Information Technology (CS & IT) 3
2. PROBLEM STATEMENTS
The problem in cloud computing here deals with the cloud service providers selection of the
formulated parameters. For some CSPs there may be certain services or activity that may be
declining and not possible to be accessed at certain points during the day. This kind of unwanted
selections defeats the purpose of the cloud. If we are investing a lot of projects in the cloud, then
we expect the cloud service to be reliable. Even the top CSPs in the market have been facing the
similar problems in the cloud environment. Here we have seen a lot of importance of CSPs for
taking in account the features or characteristics such as Infrastructure, Platform, and Services.
The method of selecting a Cloud Service Provider is evaluated on the basis of Which-Cloud
Provider-Provides- What. The Basic Questions which comes in mind for the selection process are
as follows.
• Why we will use this Provider?
• Does it satisfy our problems?
• How Costly It is May to Me?
• Is Data or information is safe in it?
• What Security features they are providing with it?
• What should be the limit of storage and Recovery of Data if Cloud or Office Destroyed as
per act of God or Different accidents?
• Which type of access control is provided to the user as per safety purpose?
• How we can give the payments and at that level which security is applied?
• How will cloud Provider Checks that the user added in its Cloud is valid or not?
3. RELATED WORK
In this survey be having taken various parameters for the resource managements and users in
benefits in terms of time and money.We have collected a set of parameter requirements and
guidelines devised for cloud platform and service. The conformance of the cloud service platform
and service considered for evaluation, with the requirements and guidelines is done by doing
manual assessment. The algorithm internally calculates two scores based on the assessment
results. One score is denotes the strength of parameter architecture of the cloud service, the
second score denotes the fuzzy value associated with each service provider's. The requirements
and guidelines has been collected in a technology and implementation through agnostic way.
Proper scheduling can have significant impact on the performance of the system. However, in
general, the problem of mapping tasks on distributed services belongs to a class of problems
known as NP-hard problems. For such problems, no known algorithms are able to generate the
optimal solution within polynomial time. Even though the workflow scheduling problem can be
solved by using exhaustive search, the complexity of the methods for solving it is very high. Upto
now there are two major types of workflow scheduling, best-effort based and Quality of Services
constraint based scheduling.
The idea of Adaptive Scheduling Algorithm is to divide the scheduling process into 2 phases: (1)
a logical partition step and (2) a physical allocation step. The key motivation behind this
multistage procedure is to reduce the complexity of scheduling problem. The Adaptive
Scheduling Algorithm (ASA) [11] is proposed to find a suitable execution sequence for work
4 Computer Science & Information Technology (CS & IT)
flow activities by additionally considering resource allocation constraints and dynamic topology
changes. This algorithm utilises a multistage distribution algorithm to cope with network
dynamics. [11]
The two major challenges exist in multimedia cloud are the resource cost and the service response
time. [13] The author proposed queuing model to optimize the resource allocation for multimedia
cloud in priority service scheme. There is also the formulation and solution of the resource cost
minimization problem and the service response time minimization problem. The author has the
priority service scheme in multimedia cloud datacenter as three concatenated queuing systems,
which are schedule queue, computation queue and transmission queue. [13]
4. TECHNIQUES USED
Now the techniques of job scheduling and allocation to the cloud service providers gains a lot of
attraction of the cloud researchers. The algorithms for task ordering on the basis of their arrival
and task mapping are already proposed. We are proposing a similar kind of approach but to a
level above that of job scheduling. It is a responsibility of the cloud computing service provider to
provide the adequate service level satisfaction, so we are proposing to devise an algorithm which
made possible the cloud middleware to determine capability of CSP by using Rough Set analysis
on the basis of level of satisfaction of service. Rough set model can handle with objects and its
characteristics.
Fig. 3. Cloud Ontology System
4.1 Cloud Computing Parameters
On the above mentioned CSPs we have noticed out some of the important Services and the
parameters according to that services? The Services and parameters are explained with its
importance are as follows. The first one is Data Operation which deals with the different data
operation such as searching of data either on the basis of content or location. Moreover some
security and access mechanism issues are also discussed. Lastly, it also touches the data
persistance methods. The second is Legal Issues in which we have found that it deals with the
legal issues that could be generated when data is moved to the cloud, issues regarding NDA and
other agreements between CSP and the customer and other issues that are resolved under laws
and litigations of a country. The Third one is Risk Management in which we may deal about
Computer Science & Information Technology (CS & IT) 5
Organizations shall develop and maintain a cloud oriented risk management framework to
manage risk as defined in the master agreement or industry best practices and standards. The
Fourth one is the Compliance And Audit in which Customer and provider both must understand
the importance and should follow the implications on existing compliances, audits and other best
practices. The fifth one is the Inter-portability and Portability is explained to interoperability
features provided shall support security of the data exchanges and messages at protocol level,
policy level and identity level. There shall be a mechanism to support integration of services,
each of which has a different security mechanism. There are many more parameters found out but
from all these are the best surved in our survey.
4.2 Cloud Service Providers
As per the Survey we have studied more than 30 CSPs and now going to represent the study on
that CSP in detailed manner which are on the top of the levels according to the survey of Users
and Functionalities given by gaining mind share. The Cloud Service providers are as follows
according to their rating are as follows. Amazon Web Services (AWS), Second is Google Apps
(AppEngine), Third VMWare vSphere (Virtualization), Fourth Rackspace Mosso, Fifth Cisco and
so on.
4.3 Standard Organization
There are many standard organizations for cloud management and certifications provided by them
for the safety purpose. Some of the Organizations are explained in detailed manner as follows.
The Cloud Security Alliance is made to provide the excellent security in Cloud Computing. The
main aim is to make proper researches, Understanding, awareness, Education and many more
functionalities. According to Cloud Security Alliance mission statement is "To promote the use of
best practices for providing security assurance within Cloud Computing, and provide education
on the uses of Cloud Computing to help secure all other forms of computing."
The Distributed Management Task Force (DMTF) it is an organization built in 1992 whose aim
was on IaaS (Infrastructure as a Service) which is giving high performance, scalable, flexible
infrastructure.
The National Institute of Standards and Technology (NIST) NIST is a non-regulatory federal
agency whose goal is to promote innovation and United States competitiveness by advancing
standards, measurement science, and technology. They are focused on helping federal agencies
understand cloud computing. There are many more organizations in which we have gone through
the survey and got help.
5. ROUGH SET MODEL
Rough set theory is a new mathematical approach to imperfect knowledge. The problem of
imperfect knowledge has been tackled for a long time by philosophers, logicians and
mathematicians. Recently it became also a crucial issue for computer scientists, particularly in the
area of artificial intelligence.[14] The rough set approach seems to be of fundamental importance
to AI and cognitive sciences, especially in the areas of machine learning, knowledge acquisition,
decision analysis, knowledge discovery from databases, expert systems, inductive reasoning and
6 Computer Science & Information Technology (CS & IT)
pattern recognition.[15] The formulation of upper and lower approximation are under Crisp Sets.
The approximation of set may be Fuzzy Sets. The equivalence class of R determined by element
x will be denoted by R(x). The indiscernibility relation in certain sense describes our lack of
knowledge about the universe. Equivalence classes of the indiscernibility relation, called granules
generated by R, represent elementary portion of knowledge we are able to perceive due to R.
Formal definitions of approximations and the boundary region are as follows:
1. R-lower approximation of X
2. R-upper approximation of X
3. R-boundary region of X
Rough set analysis will be on the basis of level of satisfaction of service Parameters. We know
that all service providers are not all-rounder's i.e. they cannot be counted non-stop utilization for
all kind of services. By applying Rough set model we are able to categorize each CSP on the
basis of its speciality in service providing.
For each attribute the value of
The value 1 and 0 above represents that either a CSP is specialized in a particular service or not.
If the resultant value is 1 that means the CSP can be considered for the request otherwise not. We
also categorise the attributes on the basis of relevance to tenant and CSP's. The relevance
generates a threshold value for each attribute out of a scale of 10.
6. METHODOLOGY
As per the Rough Set representation, we have represented the CSP and their attributes in a tabular
form called Information System. The rows of the table contain the list of cloud service providers
and the columns consist of the attributes of the respective cloud service provider. When we talk
about attributes that means the parameters we have identified in our study (Data Operations, Risk
Management etc.)
Computer Science & Information Technology (CS & IT) 7
Fig. 4. Algorithm Proposed by Us.
In rough set model we represent the CSP and their attributes in a tabular form. The rows of the
table contain the list of cloud service providers and the columns consist of the attributes of the
respective cloud service provider. This table 1 is converted into table 2. As per the rough set
analysis processes table 2 is divided into lower and upper approximations. The lower one we
cannot consider for assigning to the jobs because these are not suitable according to user
standards. A very simple information system is shown in the following table 1, which contains
rating of CSPs attributes ratings in a Cloud environment. These rating are just for example, as we
can find the original ratings for original CSPs by performing some surveys. Here we considered
seven service providers with four attributes: Application Security, Legal Issues, Virtualization
and Compliance Audit.
8 Computer Science & Information Technology (CS & IT)
Fig. 5. Information System Table 1
Fig. 6. Information System Table 2
Fig. 7. Fuzzy Cost Value.
7. CONCLUSION AND FUTURE WORK
In this research work we have proposed the scheduling for cloud service providers. After
identifying the service requirements, the user can submit their job to the cloud and there the
middleware can implement this mathematical model to rate CSPs and on the basis of their
capabilities. In this system we are trying to develop the Ontology system which may give the
actual values of the CSPs on the basis of the parameters taken for more efficient scheduling. The
scope of this research can be extend further, in which apart from taking the cumulative cost
function, we can also generate the cost on the basis of individual capability of CSP for an
individual attribute. For example if a user needs a cloud that CSP whose cost function is
maximum for security attribute rather than maximum value from the fuzzy costs.
REFERENCES
[1] J. Octavio, Gutierrez-Garcia, Kwang Mong Sim: A family of heuristics for agent based elastic Cloud
bag of tasks concurrent scheduling. Future Generation Computer Systems, SciVerse Science Direct,
doi:10.1016/j.future.2012.01.005.
[2] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi on Pipeline: The analytic hierarchy process: task
scheduling and resource allocation in cloud computing environment. In: Springer Science+Business
Media, LLC 2011.
Computer Science & Information Technology (CS & IT) 9
[3] Jan Komorowski: Rough Sets: A Tutorial In .Department of Computer and Information Science
Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway.
[4] Rodrigo N. Calheiros: CloudSim: A Novel Framework for Modeling and Simulation of Cloud
Computing Infrastructures and Services. In: Computing and Distributed Systems (GRIDS) Laboratory
Department of Computer Science and Software Engineering The University of Melbourne, Australia.
[5] Ashish Tiwari,Dr.A.Nagaraju and Mehul Mahrishi : An Optimized Scheduling Algorithm for Cloud
Broker using Adaptive Cost Model: 3rd IEEE (International Advanced Computing Conference-2013).
[6] Smitha Sundareswaran : A Brokerage-Based Approach for Cloud Service Selection In : 2012 IEEE
Fifth International Conference on Cloud Computing.
[7] Taekgyeong Han and Kwang Mong Sim : An Ontology-enhanced Cloud Service Discovery System :
Proceedings of the International MultiConference of Enginers and Computer Scientists 2010 Vol I,
IMECS 2010,March 17-19,2010,Hong kong .
[8] Haytham Tawfeek al Feel : OCSS: Ontology Cloud Storage System : 2011 First International
Symposium on Network Cloud Computing and Applications.
[9] Use of Ontology in Cloud Computing,
http://cloudontology.wikispaces.asu.edu/Use+of+Ontology+in+Cloud+Computing.
[10] Fangpeng Dong and Akl, S.G. : An Adaptive Double-layer Work
ow Scheduling Approach for Grid Computing In : High Performance Computing Systems and
Applications, 2007. HPCS 2007. 21st International Symposium on.
[11] A. Avanes and J. Freytag : Adaptive Workflow Scheduling under Resource Allocation Constraints
and Network Dynamics In : Proc. VLDB Endow, 1(2), 1631-1637,2008.
[12] Radulescu, A. and Van Gemund, A. J C : Low-cost task scheduling for distributed memory machines
In : Parallel and Distributed Systems, IEEE Transactions 2002.
[13] Nan, Xiaoming and Yifeng He and Ling Guan : Optimal resource allocation for multimedia cloud in
priority service scheme In : Circuits and Systems (ISCAS), 2012 IEEE International Symposium.
[14] Rough Set Theory, http://www.en.wikipedia.org/wiki/Rough-set
[15] Rough sets, http://rst2009.disco.unimib.it/.
[16] Jan Komorowski ,Rough Sets: A Tutorial , Department of Computer and Information Science
Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway.
[17] Amit Kumar Sharma ,MADAM ID FOR INTRUSION DETECTION USING DATA MINING
,IJRIM , Volume 2, Issue 2 (February 2012).
[18] Mehul Mahrishi and Dr.A.Nagaraju ,Optimizing Cloud Service Provider Scheduling by Rough Set
model,International Conference on Cloud Computing Techno and Management (ICCEAM-12).
[19] Mehul Mahrishi and Dr.A.Nagaraju ,Rating Based Formulation for Scheduling of Cloud Service
Providers , National Confrance on Emerging treands in IT.
[20] Z. Pawlak, Rough sets, International Journal of Computer and Information Sciences, 11(5):341356,
1982.
[21] Mehul Mahrishi ,Globally Recorded binary encoded Domain Compression algorithm in Column
Oriented Databases,Global Journals of Computer Science and technology Vol. 11 issue 23, Page 27-
30.
[22] Amit Nathani, Sanjay Chaudharya, Gaurav Somani ,Policy based resource allocation in IaaS Cloud,
Generation Computer Systems 28 (2012) 94103 doi:10.1016/j.future.2011.05.016.
[23] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi ,The analytic hierarchy process: task scheduling
and resource allocation in cloud computing environment, Springer Science+Business Media, LLC
2011.

Más contenido relacionado

La actualidad más candente

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...hemanthbbc
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesPvrtechnologies Nellore
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...IJCSIS Research Publications
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 

La actualidad más candente (17)

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Jk3416991702
Jk3416991702Jk3416991702
Jk3416991702
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
50120130405015
5012013040501550120130405015
50120130405015
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...
 
G017553540
G017553540G017553540
G017553540
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
Br34422427
Br34422427Br34422427
Br34422427
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 

Destacado

Project Pitch: Answer Set Programming for Procedural Content Generation
Project Pitch: Answer Set Programming for Procedural Content GenerationProject Pitch: Answer Set Programming for Procedural Content Generation
Project Pitch: Answer Set Programming for Procedural Content GenerationAndrea Tucci
 
Everything is a Game
Everything is a GameEverything is a Game
Everything is a GameAhmed Mekkawy
 
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Amélie Gyrard
 
How to Get a PhD
How to Get a PhDHow to Get a PhD
How to Get a PhDadil raja
 
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013RightScale
 
Mobile Cloud Computing for Games - Gamelet
Mobile Cloud Computing for Games - Gamelet Mobile Cloud Computing for Games - Gamelet
Mobile Cloud Computing for Games - Gamelet Anand Bhojan
 
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...Elizabeth Steiner
 
Designing Serious Game for Behavioral Change in Healthcare
Designing Serious Game for Behavioral Change in HealthcareDesigning Serious Game for Behavioral Change in Healthcare
Designing Serious Game for Behavioral Change in HealthcareAntonio Grillo
 
final presentation. technology 2022
final presentation. technology 2022final presentation. technology 2022
final presentation. technology 2022rhyne_cory
 
Digital Railways presentation by Technology Strategy Board
Digital Railways presentation by Technology Strategy BoardDigital Railways presentation by Technology Strategy Board
Digital Railways presentation by Technology Strategy BoardKTN
 
Game theoretic approaches for Cloud Computing
Game theoretic approaches for Cloud ComputingGame theoretic approaches for Cloud Computing
Game theoretic approaches for Cloud ComputingDr Ganesh Iyer
 
Connecting the Internet of Things to the Semantic Web
Connecting the Internet of Things to the Semantic WebConnecting the Internet of Things to the Semantic Web
Connecting the Internet of Things to the Semantic WebDavid Janes
 
Game theory application
Game theory applicationGame theory application
Game theory applicationshakebaumar
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...Veselin Pizurica
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstDell World
 

Destacado (20)

Project Pitch: Answer Set Programming for Procedural Content Generation
Project Pitch: Answer Set Programming for Procedural Content GenerationProject Pitch: Answer Set Programming for Procedural Content Generation
Project Pitch: Answer Set Programming for Procedural Content Generation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Everything is a Game
Everything is a GameEverything is a Game
Everything is a Game
 
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
Gyrard ssn2014 Helping IoT Application Developers with Sensor-based Linked Op...
 
How to Get a PhD
How to Get a PhDHow to Get a PhD
How to Get a PhD
 
Using Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of FinanceUsing Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of Finance
 
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013
 
A Proposal of Postgraduate Programme for Software Testing Specialization
A Proposal of Postgraduate Programme for Software Testing SpecializationA Proposal of Postgraduate Programme for Software Testing Specialization
A Proposal of Postgraduate Programme for Software Testing Specialization
 
Mobile Cloud Computing for Games - Gamelet
Mobile Cloud Computing for Games - Gamelet Mobile Cloud Computing for Games - Gamelet
Mobile Cloud Computing for Games - Gamelet
 
Graph Theory and Databases
Graph Theory and DatabasesGraph Theory and Databases
Graph Theory and Databases
 
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...
Knowledge-Based Analysis and Design (KBAD): An Approach to Rapid Systems Engi...
 
PhD Proposal Seminar_Revised__Apurva 21oct2010
PhD Proposal Seminar_Revised__Apurva 21oct2010PhD Proposal Seminar_Revised__Apurva 21oct2010
PhD Proposal Seminar_Revised__Apurva 21oct2010
 
Designing Serious Game for Behavioral Change in Healthcare
Designing Serious Game for Behavioral Change in HealthcareDesigning Serious Game for Behavioral Change in Healthcare
Designing Serious Game for Behavioral Change in Healthcare
 
final presentation. technology 2022
final presentation. technology 2022final presentation. technology 2022
final presentation. technology 2022
 
Digital Railways presentation by Technology Strategy Board
Digital Railways presentation by Technology Strategy BoardDigital Railways presentation by Technology Strategy Board
Digital Railways presentation by Technology Strategy Board
 
Game theoretic approaches for Cloud Computing
Game theoretic approaches for Cloud ComputingGame theoretic approaches for Cloud Computing
Game theoretic approaches for Cloud Computing
 
Connecting the Internet of Things to the Semantic Web
Connecting the Internet of Things to the Semantic WebConnecting the Internet of Things to the Semantic Web
Connecting the Internet of Things to the Semantic Web
 
Game theory application
Game theory applicationGame theory application
Game theory application
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 

Similar a A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
QoS Based Scheduling Techniques in Cloud Computing: Systematic Review
QoS Based Scheduling Techniques in Cloud Computing: Systematic ReviewQoS Based Scheduling Techniques in Cloud Computing: Systematic Review
QoS Based Scheduling Techniques in Cloud Computing: Systematic ReviewIJCSIS Research Publications
 
Resource Allocation for Task Using Fair Share Scheduling Algorithm
Resource Allocation for Task Using Fair Share Scheduling AlgorithmResource Allocation for Task Using Fair Share Scheduling Algorithm
Resource Allocation for Task Using Fair Share Scheduling AlgorithmIRJET Journal
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...IJCI JOURNAL
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelTELKOMNIKA JOURNAL
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Journals
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
 
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudTracy Drey
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingIOSRjournaljce
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTpharmaindexing
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudEditor IJCATR
 

Similar a A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
QoS Based Scheduling Techniques in Cloud Computing: Systematic Review
QoS Based Scheduling Techniques in Cloud Computing: Systematic ReviewQoS Based Scheduling Techniques in Cloud Computing: Systematic Review
QoS Based Scheduling Techniques in Cloud Computing: Systematic Review
 
Resource Allocation for Task Using Fair Share Scheduling Algorithm
Resource Allocation for Task Using Fair Share Scheduling AlgorithmResource Allocation for Task Using Fair Share Scheduling Algorithm
Resource Allocation for Task Using Fair Share Scheduling Algorithm
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation model
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
A Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management TechniquesA Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management Techniques
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In Cloud
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
 
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in Cloud
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR

  • 1. Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013 pp. 01–09, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3401 A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR Ashish Tiwari*, Amit Kumar Tiwari, Hukam Chand Saini, Amit Kumar Sharma, and Anoop Kumar Yadav Central University of Rajasthan, Computer Science and Engineering, NH-8,Bandarsindri, Kisangarh, Ajmer, Rajasthan {ashishtiwari@curaj.ac.in,kumartiwariamit@gmail.com, hukamchand@curaj.ac.in,amitsharma@curaj.ac.in, anoop15690@gmail.com} ABSTRACT : Cloud Computing is an awesome technology which have go ahead and annex the computing world. The development of cloud computing embed its sprouting continually in the recent era. Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud simulator working in our algorithm which is prepared with the help of rough set theory. The algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers are created to perform the algorithms with the help of rough sets. The Ontology is the system consists of cloud services in which cloud service discovery system is maintained. At last there is the implementation of work done using the rough set in cloud simulator using net beans and sql as back end. The net beans is loaded with the cloud Sim packages in which some of the packages are prepared according to our algorithm and gives the expected output of the optimization using rough set as a new concept. KEYWORDS : Cloud Simulator, Rough Set Theory, Cloudlets, Datacenters , Cloud Ontology System and Parameters 1. INTRODUCTION In the day today world Computing is moving in its seven heavens where it is making its place like a worm in a fruit. The most important thing to see here is its play a vital in businesses. By this rapid development in businesses most number of people wants to save their money, time, ____________ *M.Tech Final Year Student (Dept. of CSE), I want to give special thanks to Dr.A.Nagaraju, Mehul Mahrishi (Assistant Professor Central University of Rajasthan) and Pradeep Kumar (M.Sc) for backgroud support.
  • 2. 2 Computer Science & Information Technology (CS & IT) space and performance etc. This increment done is due to the people requirements in the web applications, by these application they are enjoying the life and consuming the time and money. This may increment in the field of ebusiness by see the demand of people. In this world Cloud Computing is spreading very rapidly through internet. So from all over analysis the basic definition of the cloud computing can be given as the computing which tells about both the applications providing services with the help of internet and available scalable hardware and the software running on the systems may provide the services.[1] [2] Its basic definition tells as you pay as you go manner. There are many computing present in the clouds like public, private and hybrid. These computing play an important role in cloud computing concept. Here the cloud computing is dealing with the cloud service providers which play an vital role for the formation of the scheduling performed in the cloud computing.[4] Fig. 1. Basic Structure of Cloud Computing. There is a advanced study of the various cloud service providers and the parameters found after the survey may play an important role for the formulation. The Deep study of the standard organizations which are providing the various certification and protocols to perform their tasks in well ordered and organized manner.[3] Cloud Ontology is the system that is maintained to determine the similarities between and among services.[9] Ontology when retrieving information about Cloud services. The relations among the different types of Cloud services and determining which service(s) would be the best or most appropriate service for meeting consumers service requirements.[7][8] On the calculated parameters there is the working of the cloud service providers and standard organizations are helping the services on that basis. Fig. 2. Cloud Ontology System
  • 3. Computer Science & Information Technology (CS & IT) 3 2. PROBLEM STATEMENTS The problem in cloud computing here deals with the cloud service providers selection of the formulated parameters. For some CSPs there may be certain services or activity that may be declining and not possible to be accessed at certain points during the day. This kind of unwanted selections defeats the purpose of the cloud. If we are investing a lot of projects in the cloud, then we expect the cloud service to be reliable. Even the top CSPs in the market have been facing the similar problems in the cloud environment. Here we have seen a lot of importance of CSPs for taking in account the features or characteristics such as Infrastructure, Platform, and Services. The method of selecting a Cloud Service Provider is evaluated on the basis of Which-Cloud Provider-Provides- What. The Basic Questions which comes in mind for the selection process are as follows. • Why we will use this Provider? • Does it satisfy our problems? • How Costly It is May to Me? • Is Data or information is safe in it? • What Security features they are providing with it? • What should be the limit of storage and Recovery of Data if Cloud or Office Destroyed as per act of God or Different accidents? • Which type of access control is provided to the user as per safety purpose? • How we can give the payments and at that level which security is applied? • How will cloud Provider Checks that the user added in its Cloud is valid or not? 3. RELATED WORK In this survey be having taken various parameters for the resource managements and users in benefits in terms of time and money.We have collected a set of parameter requirements and guidelines devised for cloud platform and service. The conformance of the cloud service platform and service considered for evaluation, with the requirements and guidelines is done by doing manual assessment. The algorithm internally calculates two scores based on the assessment results. One score is denotes the strength of parameter architecture of the cloud service, the second score denotes the fuzzy value associated with each service provider's. The requirements and guidelines has been collected in a technology and implementation through agnostic way. Proper scheduling can have significant impact on the performance of the system. However, in general, the problem of mapping tasks on distributed services belongs to a class of problems known as NP-hard problems. For such problems, no known algorithms are able to generate the optimal solution within polynomial time. Even though the workflow scheduling problem can be solved by using exhaustive search, the complexity of the methods for solving it is very high. Upto now there are two major types of workflow scheduling, best-effort based and Quality of Services constraint based scheduling. The idea of Adaptive Scheduling Algorithm is to divide the scheduling process into 2 phases: (1) a logical partition step and (2) a physical allocation step. The key motivation behind this multistage procedure is to reduce the complexity of scheduling problem. The Adaptive Scheduling Algorithm (ASA) [11] is proposed to find a suitable execution sequence for work
  • 4. 4 Computer Science & Information Technology (CS & IT) flow activities by additionally considering resource allocation constraints and dynamic topology changes. This algorithm utilises a multistage distribution algorithm to cope with network dynamics. [11] The two major challenges exist in multimedia cloud are the resource cost and the service response time. [13] The author proposed queuing model to optimize the resource allocation for multimedia cloud in priority service scheme. There is also the formulation and solution of the resource cost minimization problem and the service response time minimization problem. The author has the priority service scheme in multimedia cloud datacenter as three concatenated queuing systems, which are schedule queue, computation queue and transmission queue. [13] 4. TECHNIQUES USED Now the techniques of job scheduling and allocation to the cloud service providers gains a lot of attraction of the cloud researchers. The algorithms for task ordering on the basis of their arrival and task mapping are already proposed. We are proposing a similar kind of approach but to a level above that of job scheduling. It is a responsibility of the cloud computing service provider to provide the adequate service level satisfaction, so we are proposing to devise an algorithm which made possible the cloud middleware to determine capability of CSP by using Rough Set analysis on the basis of level of satisfaction of service. Rough set model can handle with objects and its characteristics. Fig. 3. Cloud Ontology System 4.1 Cloud Computing Parameters On the above mentioned CSPs we have noticed out some of the important Services and the parameters according to that services? The Services and parameters are explained with its importance are as follows. The first one is Data Operation which deals with the different data operation such as searching of data either on the basis of content or location. Moreover some security and access mechanism issues are also discussed. Lastly, it also touches the data persistance methods. The second is Legal Issues in which we have found that it deals with the legal issues that could be generated when data is moved to the cloud, issues regarding NDA and other agreements between CSP and the customer and other issues that are resolved under laws and litigations of a country. The Third one is Risk Management in which we may deal about
  • 5. Computer Science & Information Technology (CS & IT) 5 Organizations shall develop and maintain a cloud oriented risk management framework to manage risk as defined in the master agreement or industry best practices and standards. The Fourth one is the Compliance And Audit in which Customer and provider both must understand the importance and should follow the implications on existing compliances, audits and other best practices. The fifth one is the Inter-portability and Portability is explained to interoperability features provided shall support security of the data exchanges and messages at protocol level, policy level and identity level. There shall be a mechanism to support integration of services, each of which has a different security mechanism. There are many more parameters found out but from all these are the best surved in our survey. 4.2 Cloud Service Providers As per the Survey we have studied more than 30 CSPs and now going to represent the study on that CSP in detailed manner which are on the top of the levels according to the survey of Users and Functionalities given by gaining mind share. The Cloud Service providers are as follows according to their rating are as follows. Amazon Web Services (AWS), Second is Google Apps (AppEngine), Third VMWare vSphere (Virtualization), Fourth Rackspace Mosso, Fifth Cisco and so on. 4.3 Standard Organization There are many standard organizations for cloud management and certifications provided by them for the safety purpose. Some of the Organizations are explained in detailed manner as follows. The Cloud Security Alliance is made to provide the excellent security in Cloud Computing. The main aim is to make proper researches, Understanding, awareness, Education and many more functionalities. According to Cloud Security Alliance mission statement is "To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing." The Distributed Management Task Force (DMTF) it is an organization built in 1992 whose aim was on IaaS (Infrastructure as a Service) which is giving high performance, scalable, flexible infrastructure. The National Institute of Standards and Technology (NIST) NIST is a non-regulatory federal agency whose goal is to promote innovation and United States competitiveness by advancing standards, measurement science, and technology. They are focused on helping federal agencies understand cloud computing. There are many more organizations in which we have gone through the survey and got help. 5. ROUGH SET MODEL Rough set theory is a new mathematical approach to imperfect knowledge. The problem of imperfect knowledge has been tackled for a long time by philosophers, logicians and mathematicians. Recently it became also a crucial issue for computer scientists, particularly in the area of artificial intelligence.[14] The rough set approach seems to be of fundamental importance to AI and cognitive sciences, especially in the areas of machine learning, knowledge acquisition, decision analysis, knowledge discovery from databases, expert systems, inductive reasoning and
  • 6. 6 Computer Science & Information Technology (CS & IT) pattern recognition.[15] The formulation of upper and lower approximation are under Crisp Sets. The approximation of set may be Fuzzy Sets. The equivalence class of R determined by element x will be denoted by R(x). The indiscernibility relation in certain sense describes our lack of knowledge about the universe. Equivalence classes of the indiscernibility relation, called granules generated by R, represent elementary portion of knowledge we are able to perceive due to R. Formal definitions of approximations and the boundary region are as follows: 1. R-lower approximation of X 2. R-upper approximation of X 3. R-boundary region of X Rough set analysis will be on the basis of level of satisfaction of service Parameters. We know that all service providers are not all-rounder's i.e. they cannot be counted non-stop utilization for all kind of services. By applying Rough set model we are able to categorize each CSP on the basis of its speciality in service providing. For each attribute the value of The value 1 and 0 above represents that either a CSP is specialized in a particular service or not. If the resultant value is 1 that means the CSP can be considered for the request otherwise not. We also categorise the attributes on the basis of relevance to tenant and CSP's. The relevance generates a threshold value for each attribute out of a scale of 10. 6. METHODOLOGY As per the Rough Set representation, we have represented the CSP and their attributes in a tabular form called Information System. The rows of the table contain the list of cloud service providers and the columns consist of the attributes of the respective cloud service provider. When we talk about attributes that means the parameters we have identified in our study (Data Operations, Risk Management etc.)
  • 7. Computer Science & Information Technology (CS & IT) 7 Fig. 4. Algorithm Proposed by Us. In rough set model we represent the CSP and their attributes in a tabular form. The rows of the table contain the list of cloud service providers and the columns consist of the attributes of the respective cloud service provider. This table 1 is converted into table 2. As per the rough set analysis processes table 2 is divided into lower and upper approximations. The lower one we cannot consider for assigning to the jobs because these are not suitable according to user standards. A very simple information system is shown in the following table 1, which contains rating of CSPs attributes ratings in a Cloud environment. These rating are just for example, as we can find the original ratings for original CSPs by performing some surveys. Here we considered seven service providers with four attributes: Application Security, Legal Issues, Virtualization and Compliance Audit.
  • 8. 8 Computer Science & Information Technology (CS & IT) Fig. 5. Information System Table 1 Fig. 6. Information System Table 2 Fig. 7. Fuzzy Cost Value. 7. CONCLUSION AND FUTURE WORK In this research work we have proposed the scheduling for cloud service providers. After identifying the service requirements, the user can submit their job to the cloud and there the middleware can implement this mathematical model to rate CSPs and on the basis of their capabilities. In this system we are trying to develop the Ontology system which may give the actual values of the CSPs on the basis of the parameters taken for more efficient scheduling. The scope of this research can be extend further, in which apart from taking the cumulative cost function, we can also generate the cost on the basis of individual capability of CSP for an individual attribute. For example if a user needs a cloud that CSP whose cost function is maximum for security attribute rather than maximum value from the fuzzy costs. REFERENCES [1] J. Octavio, Gutierrez-Garcia, Kwang Mong Sim: A family of heuristics for agent based elastic Cloud bag of tasks concurrent scheduling. Future Generation Computer Systems, SciVerse Science Direct, doi:10.1016/j.future.2012.01.005. [2] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi on Pipeline: The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment. In: Springer Science+Business Media, LLC 2011.
  • 9. Computer Science & Information Technology (CS & IT) 9 [3] Jan Komorowski: Rough Sets: A Tutorial In .Department of Computer and Information Science Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway. [4] Rodrigo N. Calheiros: CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services. In: Computing and Distributed Systems (GRIDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia. [5] Ashish Tiwari,Dr.A.Nagaraju and Mehul Mahrishi : An Optimized Scheduling Algorithm for Cloud Broker using Adaptive Cost Model: 3rd IEEE (International Advanced Computing Conference-2013). [6] Smitha Sundareswaran : A Brokerage-Based Approach for Cloud Service Selection In : 2012 IEEE Fifth International Conference on Cloud Computing. [7] Taekgyeong Han and Kwang Mong Sim : An Ontology-enhanced Cloud Service Discovery System : Proceedings of the International MultiConference of Enginers and Computer Scientists 2010 Vol I, IMECS 2010,March 17-19,2010,Hong kong . [8] Haytham Tawfeek al Feel : OCSS: Ontology Cloud Storage System : 2011 First International Symposium on Network Cloud Computing and Applications. [9] Use of Ontology in Cloud Computing, http://cloudontology.wikispaces.asu.edu/Use+of+Ontology+in+Cloud+Computing. [10] Fangpeng Dong and Akl, S.G. : An Adaptive Double-layer Work ow Scheduling Approach for Grid Computing In : High Performance Computing Systems and Applications, 2007. HPCS 2007. 21st International Symposium on. [11] A. Avanes and J. Freytag : Adaptive Workflow Scheduling under Resource Allocation Constraints and Network Dynamics In : Proc. VLDB Endow, 1(2), 1631-1637,2008. [12] Radulescu, A. and Van Gemund, A. J C : Low-cost task scheduling for distributed memory machines In : Parallel and Distributed Systems, IEEE Transactions 2002. [13] Nan, Xiaoming and Yifeng He and Ling Guan : Optimal resource allocation for multimedia cloud in priority service scheme In : Circuits and Systems (ISCAS), 2012 IEEE International Symposium. [14] Rough Set Theory, http://www.en.wikipedia.org/wiki/Rough-set [15] Rough sets, http://rst2009.disco.unimib.it/. [16] Jan Komorowski ,Rough Sets: A Tutorial , Department of Computer and Information Science Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway. [17] Amit Kumar Sharma ,MADAM ID FOR INTRUSION DETECTION USING DATA MINING ,IJRIM , Volume 2, Issue 2 (February 2012). [18] Mehul Mahrishi and Dr.A.Nagaraju ,Optimizing Cloud Service Provider Scheduling by Rough Set model,International Conference on Cloud Computing Techno and Management (ICCEAM-12). [19] Mehul Mahrishi and Dr.A.Nagaraju ,Rating Based Formulation for Scheduling of Cloud Service Providers , National Confrance on Emerging treands in IT. [20] Z. Pawlak, Rough sets, International Journal of Computer and Information Sciences, 11(5):341356, 1982. [21] Mehul Mahrishi ,Globally Recorded binary encoded Domain Compression algorithm in Column Oriented Databases,Global Journals of Computer Science and technology Vol. 11 issue 23, Page 27- 30. [22] Amit Nathani, Sanjay Chaudharya, Gaurav Somani ,Policy based resource allocation in IaaS Cloud, Generation Computer Systems 28 (2012) 94103 doi:10.1016/j.future.2011.05.016. [23] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi ,The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment, Springer Science+Business Media, LLC 2011.