Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 9529526, 14 pages
http://dx.doi.org/10.1155/2016/9529526
Research Article

Multiobjective Reliable Cloud Storage with Its Particle Swarm Optimization Algorithm

1Institute of Software Engineering, School of Software, Xidian University, Xi’an 710071, China
2School of Computer Science and Technology, Xidian University, Xi’an, China

Received 26 May 2016; Accepted 9 November 2016

Academic Editor: Marco Mussetta

Copyright © 2016 Xiyang Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Brodkin, Gartner: Seven Cloud-computing Security Risks, Infoworld, 2008.
  2. S. Zhang, S. Zhang, X. Chen, and S. Wu, “Analysis and research of cloud computing system instance,” in Proceedings of the 2nd International Conference on Future Networks (ICFN '10), pp. 88–92, IEEE, Hainan, China, 2010. View at Publisher · View at Google Scholar
  3. B. Hayes, “Cloud computing,” Communications of the ACM, vol. 51, no. 7, pp. 30–34, 2008. View at Google Scholar
  4. S. Gurumurthi, “Architecting storage for the cloud computing era,” IEEE Micro, vol. 29, no. 6, pp. 68–71, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Y. Wu, L. D. Ping, and X. P. Ge, “Cloud storageas the infrastructure of cloud computing,” in Proceedings of the International Conference on Intelligent Computing and Cognitive Informatics (ICICCI '10), pp. 380–383, 2010.
  6. P. Buxmann, T. Hess, and S. Lehmann, “Software as a service,” Wirtschaftsinformatik, vol. 50, no. 6, pp. 500–503, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. L. A. Barroso and U. Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines, Morgan & Claypool Publishers, 2009.
  8. L. Fan, S. Meng, X. Liu, and Y. Liang, “Improved CTT-SP algorithm with critical path method for massive data storage in scientific workflow systems,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 30, no. 8, Article ID 1659023, 22 pages, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  9. S. Ghemawat, H. Gobioff, and S. T. Leung, “The Google file system,” ACM SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 29–43, 2003. View at Publisher · View at Google Scholar
  10. S. Aameek, M. Korupolu, and D. Mohapatra, “Server-storage virtualization: integration and load balancing in data centers,” in Proceedings of the ACM/IEEE Conference on High Performance Computing (SC '08), pp. 1–12, Austin, Tex, USA, November 2008. View at Publisher · View at Google Scholar
  11. M. Vukolic and I. Z. Laboratory, “Reliable distributed storage,” Computer, vol. 42, no. 4, p. 6067, 2009. View at Google Scholar
  12. Y. Deng, F. Wang, N. Helian, S. Wu, and C. Liao, “Dynamic and scalable storage management architecture for Grid Oriented Storage devices,” Parallel Computing, vol. 34, no. 1, pp. 17–31, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Y. Zhang, K. Q. Li, and Y. Zhang, “Minimum-cost virtual machine migration strategy in datacenter,” Concurrency and Computation-Practice & Experience, vol. 27, pp. 5177–5187, 2015. View at Google Scholar
  14. R. W. Ahmad, A. Gani, S. H. A. Hamid et al., “A survey on virtual machine migration and server consolidation frameworks for cloud data centers,” Journal of Network and Computer Applications, vol. 52, pp. 11–25, 2015. View at Publisher · View at Google Scholar
  15. J. Dong, H. Wang, Y. Li, and S. Cheng, “Virtual machine scheduling for improving energy efciency in IaaS cloud,” China Communications, vol. 11, no. 3, Article ID 6825253, pp. 1–12, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Sanchez-Artigas, “Toward efficient data access privacy in the cloud,” IEEE Communications Magazine, vol. 51, no. 11, pp. 39–45, 2013. View at Publisher · View at Google Scholar
  17. Y. X. Guo and Y. G. Fang, “Electricity cost saving strategy in data centers by using energy storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1149–1160, 2013. View at Publisher · View at Google Scholar
  18. B. Mao, H. Jiang, S. Wu, Y. Fu, and L. Tian, “Read-performance optimization for deduplication-based storage systems in the cloud,” ACM Transactions on Storage (TOS), vol. 10, no. 2, pp. 193–206, 2014. View at Publisher · View at Google Scholar
  19. W. Liu, S. Peng, W. Du, W. Wang, and G. S. Zeng, “Security-aware intermediate data placement strategy in scientific cloud workflows,” Knowledge and Information Systems, vol. 41, no. 2, pp. 423–447, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Y. Guo, “Static and dynamic locality optimizations using integer linear programming,” ACM SIGPLAN Notices, vol. 49, no. 5, p. 83, 2014. View at Google Scholar
  21. Y. Wang, P. Lu, and K. B. Kent, “WaFS: a workflow-aware file system for effective storage utilization in the cloud,” IEEE Transactions on Computers, vol. 64, no. 9, pp. 2716–2729, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. M. Jarrah, M. Jaradat, Y. Jararweh, M. Al-Ayyoub, and A. Bousselham, “A hierarchical optimization model for energy data flow in smart grid power systems,” Information Systems, vol. 53, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proceedings of the 17th International Workshop on Quality of Service (IWQoS '09), pp. 1–9, IEEE, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. M. Alves, C. V. Damasio, W. Nejdl, and D. Olmedilla, “A distributed tabling algorithm for rule based policy systems,” in Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 123–132, June 2006. View at Publisher · View at Google Scholar
  25. T. C. Jepsen, “The basics of reliable distributed storage networks,” IT Professional, vol. 6, no. 3, pp. 18–24, 2004. View at Publisher · View at Google Scholar · View at Scopus
  26. C. E. Perkins, Ad Hoc Networking, Addison-Wesley, Boston, Mass, USA, 2001.
  27. V. PournaghshbandL, L. Kleinrock, P. Reiher, and A. Afanasyev, “Controlling applications by managing network characteristics,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 1085–1090, IEEE, Ottawa, Canada, June 2012.
  28. F. Kurose James and W. Ross Keith, Computer Networking: A Top-Down Approach, Pearson Education, 6th edition, 2012.
  29. K. C. Mansfield and J. L. Antonakos, Computer Networking from LANs to WANs: Hardware, Software, and Security, Course Technology Cengage Learning, Boston, Mass, USA, 2010.
  30. S. Krishnamurthy and A. P. Mathur, “On the estimation of reliability of a software system using reliabilities of its components,” in Proceedings of the 8th International Symposium on Software Reliability Engineering, pp. 146–155, Albuquerque, NM, USA, November 1997. View at Publisher · View at Google Scholar
  31. IEEE Std 1633, “IEEE Recommended Practice on Software Reliability,” IEEE, 2008.
  32. D. W. Carman, A. A. Dolinsky, M. R. Lyu, and J. S. Yu, “Software reliability engineering study of a large-scale telecommunications software system,” in Proceedings of the 6th International Symposium on Software Reliability Engineering, pp. 350–359, Toulouse, France, October 1995. View at Scopus
  33. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of the IEEE International Conference on Neural Networks, vol. 4, pp. 1942–1948, Perth, Australia, November 1995. View at Publisher · View at Google Scholar
  34. J. Kennedy, “The particles warm: sociala daptation of knowledge,” in Proceedings of the IEEE International Conference on Evolutionary Computation, pp. 303–308, Indianapolis, Ind, USA, April 1997. View at Publisher · View at Google Scholar
  35. Y. Shi and R. C. Eberhart, “A modified particle swarm optimizer,” in Proceedings of the IEEE International Conference on Evolutionary Computation, pp. 69–73, IEEE Press, Anchorage, Alaska, USA, May 1998. View at Publisher · View at Google Scholar
  36. M. Mussetta, P. Pirinoli, S. Selleri, and R. E. Zich, “Meta-PSO for multi-objective EM problems,” in Multi-Objective Swarm Intelligent Systems: Theory & Experiences, N. Nedjah, L. dos Santos Coelho, and L. de Macedo Mourelle, Eds., vol. 261 of Studies in Computational Intelligence, pp. 125–150, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  37. J. Kennedy and R. C. Eberhart, Swarm Intelligence, Morgan Kaufmann, 2001.
  38. C. Blum and X. Li, “Swarm intelligence in optimization,” in Swarm Intelligence, Natural Computing Series, pp. 43–85, Springer, Berlin, Germany, 2008. View at Google Scholar
  39. M. Kotinis, “A particle swarm optimizer for constrained multi-objective engineering design problems,” Engineering Optimization, vol. 42, no. 10, pp. 907–926, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  40. X. Wang, C. Wang, and M. Yu, “Swarm intelligence algorithm for interconnect model order reduction with sub-block structure preserving,” International Journal of Systems Science, vol. 47, no. 9, pp. 2178–2192, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  41. S. Selleri, M. Mussetta, P. Pirinoli, R. E. Zich, and L. Matekovits, “Differentiated meta-PSO methods for array optimization,” IEEE Transactions on Antennas and Propagation, vol. 56, no. 1, pp. 67–75, 2008. View at Publisher · View at Google Scholar · View at Scopus
  42. R. Poli, “Analysis of the publications on the applications of particle swarm optimisation,” Journal of Artificial Evolution and Applications, vol. 2008, Article ID 685175, 10 pages, 2008. View at Publisher · View at Google Scholar
  43. A. P. Engelbrecht, “Particle swarm optimization with crossover: a review and empirical analysis,” Artificial Intelligence Review, vol. 45, no. 2, pp. 131–165, 2016. View at Publisher · View at Google Scholar · View at Scopus
  44. Y. Shi and R. C. Eberhart, “Empirical study of particle swarm optimization,” in Proceedings of the Congress on Evolutionary Computation (CEC '99), pp. 1945–1960, Washington, DC, USA, July 1999. View at Publisher · View at Google Scholar · View at Scopus
  45. R. Eberhart and Y. Shi, “Comparing inertia weights and constriction factors in particle swarm optimization,” in Proceedings of the Congress on Evolutionary Computation (CEC '00), pp. 84–88, IEEE, San Diego, Calif, US, 2000. View at Publisher · View at Google Scholar
  46. K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182–197, 2002. View at Publisher · View at Google Scholar · View at Scopus
  47. E. Zitzler, K. Deb, and L. Thiele, “Comparison of multiobjective evolutionary algorithms: empirical results,” Evolutionary Computation, vol. 8, no. 2, pp. 173–195, 2000. View at Publisher · View at Google Scholar · View at Scopus
  48. X. Liu, L. Fan et al., “PSO based multiobjective reliable optimization model for cloud storage,” in Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 2263–2269, Liverpool, UK, October 2015. View at Publisher · View at Google Scholar