Mobile Networks and Applications

, Volume 21, Issue 5, pp 846–855 | Cite as

Learning-Based Data Envelopment Analysis for External Cloud Resource Allocation

  • Hsin-Hung Cho
  • Chin-Feng Lai
  • Timothy K. Shih
  • Han-Chieh Chao


A mature cloud system needs a complete resource allocation policy which includes internal and external allocation. They not only enable users to have better experiences, but also allows the cloud provider to cut costs. In the other words, internal and external allocation are indispensable since a combination of them is only a total solution for whole cloud system. In this paper, we clearly explain the difference between internal allocation (IA) and external allocation (EA) as well as defining the explicit IA and EA problem for the follow up research. Although many researchers have proposed resource allocation methods, they are just based on subjective observations which lead to an imbalance of the overall cloud architecture, and cloud computing resources to operate se-quentially. In order to avoid an imbalanced situation, in previous work, we proposed Data Envelopment Analysis (DEA) to solve this problem; it considers all of a user’s demands to evaluate the overall cloud parameters. However, although DEA can provide a higher quality solution, it requires more time. So we use the Q-learning and Data Envelopment Analysis (DEA) to solve the imbalance problem and reduce computing time. As our simulation results show, the proposed DEA+Qlearning will provide almost best quality but too much calculating time.


Cloud computing Resource allocation Data envelopment analysis Q-learning 



This research was partly funded by the National Science Council of the R.O.C. under grants MOST 104-2221-E-197-014.


  1. 1.
    Reza Rahimi M, Ren J, Liu CH, Vasilakos AV, Venkatasubramanian N (2013) Mobile cloud computing: a survey, state of art and future directions. In: ACM/Springer mobile application and networks (MONET). doi: 10.1007/s11036-013-0477-4
  2. 2.
    Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: a Berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
  3. 3.
    Mell P, Grance T (2011) The NIST definition of Cloud Computing. Gaithersburg, MD: NIST, Special Publication, p 800–145 (cloud)Google Scholar
  4. 4.
    Kosta S, Aucinas A, Hui P, Mortier R, Zhang X (2012) ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code o ffloading. In: IEEE INFOCOM’12, p 945–953Google Scholar
  5. 5.
    Tsai CW, Rodrigues JJ (2014) Metaheuristic scheduling for cloud: a survey. IEEE Syst J 8(1):279–291CrossRefGoogle Scholar
  6. 6.
    Tseng FH, Chen X, Chou LD, Chao HC, Chen S (2015) Support vector machine approach for virtual machine migration in cloud data center. Multimedia Tools Appl 74(10):3419–3440CrossRefGoogle Scholar
  7. 7.
    Zhang Y, Li B, Huang Z, Wang J, Zhu J (2015) TVDA: truthful volume discount auction design for cloud resource allocation. J Internet Technol 16(6):1023–103Google Scholar
  8. 8.
    Patel P, Ranabahu A, Sheth A (2009) Service level agreement in cloud computing. In: Cloud Workshops at OOPSLAGoogle Scholar
  9. 9.
    Bouchenak S (2010) Automated control for SLA-aware elastic clouds. In: Proceedings of the 5th international workshop on feedback control implementation and design in computing systems and networks, p 27–28. doi: 10.1145/1791204.1791210(SLA)
  10. 10.
    Wu L, Garg SK, Versteeg S, Buyya R (2014) SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments. IEEE Trans Serv Comput 7(3):465–485CrossRefGoogle Scholar
  11. 11.
    Zhu W, Luo C, Wang J, Li S (2011) Multimedia cloud computing. IEEE Signal Process Mag 28(3):59–69CrossRefGoogle Scholar
  12. 12.
    Lai CF, Wang H, Chao HC, Nan G (2013) A network and device aware QoS approach for cloud-based mobile streaming. IEEE Trans Multimedia 15(4):747–757CrossRefGoogle Scholar
  13. 13.
    Sun Y, White J, Eade S (2014) A model-based system to automate cloud resource allocation and optimization. In: Model-Driven Engineering Languages and Systems (pp. 18–34). Springer International PublishingGoogle Scholar
  14. 14.
    Wan J, Zhang D, Zhao S, Yang L, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions. IEEE Commun Mag 52(8):106–113CrossRefGoogle Scholar
  15. 15.
    Wan J, Zhang D, Sun Y, Lin K, Zou C, Cai H (2014) VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. Mob Netw Appl 19(2):153–160CrossRefGoogle Scholar
  16. 16.
    Greenberg A, Hamilton J, Maltz DA, Patel P (2008) The cost of a cloud: research problems in data center networks. ACM SIGCOMM Comput Commun Rev 39(1):68–73CrossRefGoogle Scholar
  17. 17.
    Tseng FH, Chen CY, Chou LD, Chao HC, Niu JW. Service-oriented virtual machine placement optimization for green data center. Mob Netw Appl, p 1–11Google Scholar
  18. 18.
    Chen M, Jin H, Wen Y, Leung VCM (2013) Enabling technologies for future data center networking: a primer. IEEE Netw 27(4):8–15CrossRefGoogle Scholar
  19. 19.
    Cho HH, Chen CY, Li HW, Shih TK, Chao HC (2014) A fair cloud resource allocation using data envelopment analysis. In: Heterogeneous networking for quality, reliability, security and robustness (QShine), 2014 10th International Conference on (p 31–36). IEEEGoogle Scholar
  20. 20.
    Chen F, Deng P, Wan J, Zhang D, Vasilakos AV, Rong X (2015) Data mining for the internet of things: literature review and challenges. Int J Distrib Sens Netw 2015:12Google Scholar
  21. 21.
    Coelli TJ, Prasada Rao DS, O’Donnell CJ, Battese GE (2005) Data envelopment analysis. an introduction to efficiency and productivity analysis, 161–181Google Scholar
  22. 22.
    Shoval O, Sheftel H, Shinar G, Hart Y, Ramote O, Mayo A, … & Alon U (2012) Evolutionary trade-offs, Pareto optimality, and the geometry of phenotype space. Science 336(6085):1157–1160Google Scholar
  23. 23.
    Watkins CJ, Dayan P (1992) Q-learning. Mach Learn 8(3–4):279–292MATHGoogle Scholar
  24. 24.
    Cooper WW, Seiford LM, Tone K (2007) Data envelopment analysis: a comprehensive text with models, applications, references and DEA-solver software. Springer Science & Business MediaGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Hsin-Hung Cho
    • 1
  • Chin-Feng Lai
    • 2
  • Timothy K. Shih
    • 1
  • Han-Chieh Chao
    • 3
    • 4
    • 5
    • 6
    • 7
  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityTaoyuanTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiTaiwan
  3. 3.College of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  4. 4.College of Mathematics and Computer ScienceWuhan Polytechnic UniversityWuhanChina
  5. 5.Department of Electrical EngineeringNational Dong Hwa UniversityHualienTaiwan
  6. 6.Department of Computer Science and Information EngineeringNational Ilan UniversityYilanTaiwan
  7. 7.School of Information Science and EngineeringFujian University of TechnologyFujianChina

Personalised recommendations