SlideShare a Scribd company logo
Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
Abstract:
A large-scale resource sharing system (e.g., collaborative cloud computing and grid computing)
creates a virtual supercomputer by providing an infrastructure for sharing tremendous amounts of
resources (e.g., computing, storage, and data)distributed over the Internet. A resource
information service, which collects resource data and provides resource search functionality for
locating desired resources, is a crucial component of the resource sharing system. In addition to
resource discovery speed and cost (i.e., efficiency), the ability to accurately locate all satisfying
resources (i.e., fidelity) is also an important metric for evaluating service quality. Previously, a
number of resource information service systems have been proposed based on Distributed Hash
Tables (DHTs) that offer scalable key-based lookup functions. However, these systems either
achieve high fidelity at low efficiency, or high efficiency at low fidelity. Moreover, some
systems have limited flexibility by only providing exact-matching services or by describing a
resource using a pre-defined list of attributes. This paper presents a resource information service
that offers high efficiency and fidelity without restricting resource expressiveness, while also
providing a similar-matching service. Extensive simulation and PlanetLab experimental results
show that the proposed service outperforms other services in terms of efficiency, fidelity, and
flexibility; it dramatically reduces overhead and yields significant enhancements in efficiency
and fidelity.
Algorithm:
 Cooperative Game Theory.[Sharing]
User friendly file sharing
u1 + v2 ≥ α
u2 + v2 ≥ α
u3 + v1 ≥ α
 Upload, Download Algorithm.
File, image upload download.
 Distributed Hase Table.
Store The File.
Key points:
1. File Uploading, Downloading.
2. Data Sharing [user to user]
EXISTING SYSTEM
The system then maps the resource point to a DHT node. This guarantees that all existing
resources that match a query are foundwith bounded costs in terms of the number ofmessages
and nodes involved. A resource has a vector, the size of which is the number of dimensions.
PIRD relies on an existing LSH technique in Euclidean spaces [32] to create a number of IDs for
a resource, and then maps the resource to DHT nodes. In a system with a tremendous number of
resource attributes, PIRD leads to dramatically high memory consumption and low efficiency of
resource ID creation due to long resource vectors.
PROPOSED SYSTEM
Schmidt and Parashar proposed a dimension reducing indexing scheme for resource discovery.
They built a multidimensional space with each coordinate representing a resource attribute. The
Fig shows an example of a 3-dimensional keyword space. The resources are viewed as base-
numbers, where is the total number of attributes in the grid system. Since one-point mapping
and PIRDbuild a pre-defined attribute list, they are not sufficiently flexible in dealing with new
attributes. To overcome this problem, our proposed LIS builds new LSH functions to transform
resources to resource IDs, which does not require a pre-defined attribute list. Thus, LIS
significantly reduces memory consumption and improves the efficiency of resource ID creation.
All methods approximately only need no more than 3 ms. This result indicates that our proposed
load balancing algorithm only generates a very short latency.
Advantage
Easy to Share files
User to User File Sharing
Provide files.
System architecture
MODULE DESCRIPTION
MODULE
Case Study and Data Collection
User
Admin Authentication
Cloud
MODULE DESCRIPTION
Case Study and Data Collection
We consider a case study of a web-based collaboration application for evaluating performance.
The application allows users to store, manage, and share documents and drawings related to large
construction projects. The service composition required for this application includes: Firewall
(x1), Intrusion Detection (x1), Load Balancer (x1), Web Server (x4), Application Server (x3),
Database Server (x1), Database Reporting Server (x1), Email Server (x1), and Server Health
Monitoring (x1). To meet these requirements, our objective is to find the best Cloud service
composition
USER
A common approach to improve reliability and other QoS parameters of a service composition is
by dynamic service selection at run time. In a dynamic service composition a set of functionally
equivalent services exists for each service invocation and actual services are incorporated into
the execution configuration depending on their most recent QoS parameters. However, two
dominant issues limit the application of dynamic compositions on a larger scale: service
selection and detection of equivalent services. Since service selection at run time is bonded by
additional constraints, like statefullness and composability, statebased reliability models need to
be applied. However, such models are prone to state explosions, making it difficult to support
more complex compositions. The other commonly used approach treats service selection as an
optimization problem.
Share Data
The user can share their data into another user in same group the data will translate by path
setting data.
Upload File
The user can upload the file to cloud. And the Admin can allow the data to store the cloud.
Download File
The user also download the cloud file by the conditions.
Admin Authentication
We propose an iterative reliability improvement method for service compositions based on the
extension of our previous work in [20]. The method consists of: reliability estimation, weak point
recommendation and weak point strengthening steps, as defined by the overview. In the rest of
this section, we briefly describe each of the stated steps.
Accept user
The admin can accept the new user request and also black the users.
Allow user file
The users can upload the file to cloud. And the admin can allow the files to cloud then only the
file can store the cloud.
CLOUD
However, other SOA implementations can be expected to gain more traction in the coming years
with the continuous proliferation of cloud computing and increasing popularity of software as a
service (SaaS) platforms . One of the most pronounced benefits of SOA are service
compositions, component-based applications built by combining the existing services. The
concept of compositions makes SOA particularly popular in designing a large variety of systems
that benefit from clear separation of interests. For instance, when designing enterprise systems,
different segments of functionality within a business process can be developed independently by
different organizational units. However, designing service compositions also presents additional
challenges as services can be deployed by third parties over which the composition developer has
no supervision. A strong concern in such an environment is the necessity to design a composition
with an adequate level of non-functional properties, like reliability, availability or other Quality
of Service (QoS)parameters.
Download File
The user also download the cloud file by the conditions.
Admin Authentication
We propose an iterative reliability improvement method for service compositions based on the
extension of our previous work in [20]. The method consists of: reliability estimation, weak point
recommendation and weak point strengthening steps, as defined by the overview. In the rest of
this section, we briefly describe each of the stated steps.
Accept user
The admin can accept the new user request and also black the users.
Allow user file
The users can upload the file to cloud. And the admin can allow the files to cloud then only the
file can store the cloud.
CLOUD
However, other SOA implementations can be expected to gain more traction in the coming years
with the continuous proliferation of cloud computing and increasing popularity of software as a
service (SaaS) platforms . One of the most pronounced benefits of SOA are service
compositions, component-based applications built by combining the existing services. The
concept of compositions makes SOA particularly popular in designing a large variety of systems
that benefit from clear separation of interests. For instance, when designing enterprise systems,
different segments of functionality within a business process can be developed independently by
different organizational units. However, designing service compositions also presents additional
challenges as services can be deployed by third parties over which the composition developer has
no supervision. A strong concern in such an environment is the necessity to design a composition
with an adequate level of non-functional properties, like reliability, availability or other Quality
of Service (QoS)parameters.

More Related Content

DOC
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
DOCX
COMBINING EFFICIENCY, FIDELITY, AND FLEXIBILITY IN RESOURCE INFORMATION SERV...
PDF
Combiningefficiencyfidelityandflexibilityin 150511053028-lva1-app6892
DOC
Combining efficiency, fidelity, and flexibility in resource information services
PDF
An efficient resource sharing technique for multi-tenant databases
PPT
Open Grid Service Architecture By Gargishankar Verma - RCET Bhilai
PDF
Design and Implementation of SOA Enhanced Semantic Information Retrieval web ...
PDF
An Algorithm to synchronize the local database with cloud Database
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
COMBINING EFFICIENCY, FIDELITY, AND FLEXIBILITY IN RESOURCE INFORMATION SERV...
Combiningefficiencyfidelityandflexibilityin 150511053028-lva1-app6892
Combining efficiency, fidelity, and flexibility in resource information services
An efficient resource sharing technique for multi-tenant databases
Open Grid Service Architecture By Gargishankar Verma - RCET Bhilai
Design and Implementation of SOA Enhanced Semantic Information Retrieval web ...
An Algorithm to synchronize the local database with cloud Database

What's hot (16)

PDF
Mining Of Big Data Using Map-Reduce Theorem
PPT
gLite Information System
PDF
Efficient and reliable hybrid cloud architecture for big database
PDF
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
PDF
Resource usage optimization in cloud based networks
PDF
1732 1737
PDF
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
PDF
7. the grid ogsa
PDF
A Threshold Secure Data Sharing Scheme for Federated Clouds
PDF
M035484088
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
PDF
Reactive Stream Processing for Data-centric Publish/Subscribe
PDF
C1803041317
PDF
Management of context aware software resources deployed in a cloud environmen...
PDF
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
PDF
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Mining Of Big Data Using Map-Reduce Theorem
gLite Information System
Efficient and reliable hybrid cloud architecture for big database
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
Resource usage optimization in cloud based networks
1732 1737
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
7. the grid ogsa
A Threshold Secure Data Sharing Scheme for Federated Clouds
M035484088
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
Reactive Stream Processing for Data-centric Publish/Subscribe
C1803041317
Management of context aware software resources deployed in a cloud environmen...
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Ad

Viewers also liked (13)

PPTX
Мультимедійні технології
DOC
Space efficient verifiable secret sharing using polynomial interpolation
PPSX
запись географических названий
PPTX
Genre Analysis
DOCX
Script
PPTX
Question 6- What have you learnt about technologies from the process of const...
DOCX
Digipak Analysis
DOC
Page a partition aware engine for parallel graph computation
PPTX
Genre Analysis
DOCX
Annotated lyrics
DOC
Query aware determinization of uncertain objects
DOCX
Script
DOCX
Shot List
Мультимедійні технології
Space efficient verifiable secret sharing using polynomial interpolation
запись географических названий
Genre Analysis
Script
Question 6- What have you learnt about technologies from the process of const...
Digipak Analysis
Page a partition aware engine for parallel graph computation
Genre Analysis
Annotated lyrics
Query aware determinization of uncertain objects
Script
Shot List
Ad

Similar to Combining efficiency, fidelity, and flexibility in resource information services (20)

PDF
Location-aware deep learning-based framework for optimizing cloud consumer q...
PPTX
How to Measure the the Quality of Service in Cloud Based Technology?
PDF
Seminar pasqualina potena
PDF
M.Phil Computer Science Server Computing Projects
PDF
M phil-computer-science-server-computing-projects
PDF
M.E Computer Science Server Computing Projects
PPTX
Effective SOA
PDF
Hire some ii towards privacy-aware cross-cloud service composition for big da...
PDF
Cloud computing
PPTX
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
PDF
A ranking mechanism for better retrieval of data from cloud
PDF
phd_thesis_PierreCHATEL_en
PPTX
Cloud computing and Service model
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
Falcon Security Essay
PDF
Survey on cloud computing security techniques
PDF
Survey on cloud computing security techniques
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...
Location-aware deep learning-based framework for optimizing cloud consumer q...
How to Measure the the Quality of Service in Cloud Based Technology?
Seminar pasqualina potena
M.Phil Computer Science Server Computing Projects
M phil-computer-science-server-computing-projects
M.E Computer Science Server Computing Projects
Effective SOA
Hire some ii towards privacy-aware cross-cloud service composition for big da...
Cloud computing
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
A ranking mechanism for better retrieval of data from cloud
phd_thesis_PierreCHATEL_en
Cloud computing and Service model
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
Falcon Security Essay
Survey on cloud computing security techniques
Survey on cloud computing security techniques
2014 IEEE JAVA CLOUD COMPUTING PROJECT Scalable analytics for iaas cloud avai...

More from CloudTechnologies (20)

DOCX
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
DOCX
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
DOCX
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
DOCX
Machine Learning Classification to predict water purity based on Viruses and ...
DOCX
iot based safety and health monitoring for construction workers
DOCX
Intelligent neonatal monitoring system based on android application using mul...
DOCX
An iot based smart garden with weather station system
DOCX
A deep learning facial expression recognition based scoring system for restau...
DOCX
Diabetes prediction using different machine learning approaches
DOCX
machine learning based predictive analytics of student academic performance i...
DOCX
Image based estimation of real food size for accurate food calorie estimation
DOCX
Network intrusion detection using supervised machine learning technique with ...
DOCX
Io t projects
DOCX
Cloud computing projects
DOCX
Data mining projects
DOCX
Python IEEE 2019 Projects List
DOCX
Machine learning projects
DOCX
Raspberry Pi based voice-operated personal assistant (Neobot)
DOCX
Automation in Agriculture and IoT
DOCX
Gas Leakage Detection Based on IOT
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
Machine Learning Classification to predict water purity based on Viruses and ...
iot based safety and health monitoring for construction workers
Intelligent neonatal monitoring system based on android application using mul...
An iot based smart garden with weather station system
A deep learning facial expression recognition based scoring system for restau...
Diabetes prediction using different machine learning approaches
machine learning based predictive analytics of student academic performance i...
Image based estimation of real food size for accurate food calorie estimation
Network intrusion detection using supervised machine learning technique with ...
Io t projects
Cloud computing projects
Data mining projects
Python IEEE 2019 Projects List
Machine learning projects
Raspberry Pi based voice-operated personal assistant (Neobot)
Automation in Agriculture and IoT
Gas Leakage Detection Based on IOT

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
master seminar digital applications in india
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Pre independence Education in Inndia.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Institutional Correction lecture only . . .
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Classroom Observation Tools for Teachers
PPTX
Pharma ospi slides which help in ospi learning
PPH.pptx obstetrics and gynecology in nursing
master seminar digital applications in india
Renaissance Architecture: A Journey from Faith to Humanism
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
VCE English Exam - Section C Student Revision Booklet
Pre independence Education in Inndia.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Institutional Correction lecture only . . .
TR - Agricultural Crops Production NC III.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Sports Quiz easy sports quiz sports quiz
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning

Combining efficiency, fidelity, and flexibility in resource information services

  • 1. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services Abstract: A large-scale resource sharing system (e.g., collaborative cloud computing and grid computing) creates a virtual supercomputer by providing an infrastructure for sharing tremendous amounts of resources (e.g., computing, storage, and data)distributed over the Internet. A resource information service, which collects resource data and provides resource search functionality for locating desired resources, is a crucial component of the resource sharing system. In addition to resource discovery speed and cost (i.e., efficiency), the ability to accurately locate all satisfying resources (i.e., fidelity) is also an important metric for evaluating service quality. Previously, a number of resource information service systems have been proposed based on Distributed Hash Tables (DHTs) that offer scalable key-based lookup functions. However, these systems either achieve high fidelity at low efficiency, or high efficiency at low fidelity. Moreover, some systems have limited flexibility by only providing exact-matching services or by describing a resource using a pre-defined list of attributes. This paper presents a resource information service that offers high efficiency and fidelity without restricting resource expressiveness, while also providing a similar-matching service. Extensive simulation and PlanetLab experimental results show that the proposed service outperforms other services in terms of efficiency, fidelity, and flexibility; it dramatically reduces overhead and yields significant enhancements in efficiency and fidelity. Algorithm:  Cooperative Game Theory.[Sharing] User friendly file sharing u1 + v2 ≥ α u2 + v2 ≥ α u3 + v1 ≥ α
  • 2.  Upload, Download Algorithm. File, image upload download.  Distributed Hase Table. Store The File. Key points: 1. File Uploading, Downloading. 2. Data Sharing [user to user] EXISTING SYSTEM The system then maps the resource point to a DHT node. This guarantees that all existing resources that match a query are foundwith bounded costs in terms of the number ofmessages and nodes involved. A resource has a vector, the size of which is the number of dimensions. PIRD relies on an existing LSH technique in Euclidean spaces [32] to create a number of IDs for a resource, and then maps the resource to DHT nodes. In a system with a tremendous number of resource attributes, PIRD leads to dramatically high memory consumption and low efficiency of resource ID creation due to long resource vectors. PROPOSED SYSTEM Schmidt and Parashar proposed a dimension reducing indexing scheme for resource discovery. They built a multidimensional space with each coordinate representing a resource attribute. The Fig shows an example of a 3-dimensional keyword space. The resources are viewed as base- numbers, where is the total number of attributes in the grid system. Since one-point mapping and PIRDbuild a pre-defined attribute list, they are not sufficiently flexible in dealing with new attributes. To overcome this problem, our proposed LIS builds new LSH functions to transform resources to resource IDs, which does not require a pre-defined attribute list. Thus, LIS significantly reduces memory consumption and improves the efficiency of resource ID creation.
  • 3. All methods approximately only need no more than 3 ms. This result indicates that our proposed load balancing algorithm only generates a very short latency. Advantage Easy to Share files User to User File Sharing Provide files. System architecture MODULE DESCRIPTION MODULE Case Study and Data Collection User Admin Authentication
  • 4. Cloud MODULE DESCRIPTION Case Study and Data Collection We consider a case study of a web-based collaboration application for evaluating performance. The application allows users to store, manage, and share documents and drawings related to large construction projects. The service composition required for this application includes: Firewall (x1), Intrusion Detection (x1), Load Balancer (x1), Web Server (x4), Application Server (x3), Database Server (x1), Database Reporting Server (x1), Email Server (x1), and Server Health Monitoring (x1). To meet these requirements, our objective is to find the best Cloud service composition USER A common approach to improve reliability and other QoS parameters of a service composition is by dynamic service selection at run time. In a dynamic service composition a set of functionally equivalent services exists for each service invocation and actual services are incorporated into the execution configuration depending on their most recent QoS parameters. However, two dominant issues limit the application of dynamic compositions on a larger scale: service selection and detection of equivalent services. Since service selection at run time is bonded by additional constraints, like statefullness and composability, statebased reliability models need to be applied. However, such models are prone to state explosions, making it difficult to support more complex compositions. The other commonly used approach treats service selection as an optimization problem. Share Data The user can share their data into another user in same group the data will translate by path setting data. Upload File The user can upload the file to cloud. And the Admin can allow the data to store the cloud.
  • 5. Download File The user also download the cloud file by the conditions. Admin Authentication We propose an iterative reliability improvement method for service compositions based on the extension of our previous work in [20]. The method consists of: reliability estimation, weak point recommendation and weak point strengthening steps, as defined by the overview. In the rest of this section, we briefly describe each of the stated steps. Accept user The admin can accept the new user request and also black the users. Allow user file The users can upload the file to cloud. And the admin can allow the files to cloud then only the file can store the cloud. CLOUD However, other SOA implementations can be expected to gain more traction in the coming years with the continuous proliferation of cloud computing and increasing popularity of software as a service (SaaS) platforms . One of the most pronounced benefits of SOA are service compositions, component-based applications built by combining the existing services. The concept of compositions makes SOA particularly popular in designing a large variety of systems that benefit from clear separation of interests. For instance, when designing enterprise systems, different segments of functionality within a business process can be developed independently by different organizational units. However, designing service compositions also presents additional challenges as services can be deployed by third parties over which the composition developer has no supervision. A strong concern in such an environment is the necessity to design a composition with an adequate level of non-functional properties, like reliability, availability or other Quality of Service (QoS)parameters.
  • 6. Download File The user also download the cloud file by the conditions. Admin Authentication We propose an iterative reliability improvement method for service compositions based on the extension of our previous work in [20]. The method consists of: reliability estimation, weak point recommendation and weak point strengthening steps, as defined by the overview. In the rest of this section, we briefly describe each of the stated steps. Accept user The admin can accept the new user request and also black the users. Allow user file The users can upload the file to cloud. And the admin can allow the files to cloud then only the file can store the cloud. CLOUD However, other SOA implementations can be expected to gain more traction in the coming years with the continuous proliferation of cloud computing and increasing popularity of software as a service (SaaS) platforms . One of the most pronounced benefits of SOA are service compositions, component-based applications built by combining the existing services. The concept of compositions makes SOA particularly popular in designing a large variety of systems that benefit from clear separation of interests. For instance, when designing enterprise systems, different segments of functionality within a business process can be developed independently by different organizational units. However, designing service compositions also presents additional challenges as services can be deployed by third parties over which the composition developer has no supervision. A strong concern in such an environment is the necessity to design a composition with an adequate level of non-functional properties, like reliability, availability or other Quality of Service (QoS)parameters.