Abstract
This article presents the algorithm of resource usage optimization for highly complex computer system architectures, such as Cloud Computing solutions. The main problem of such solutions is predicting the resources usage for allocating and dismissal. The proposed algorithm, based on OFN, allows to recognize the trend in the processed requests by the servers. In effect, the CC solutions allow to add resources dynamically, according to the amount of connections, and manage them in real time. This article proposes a fuzzy logic load balancing method for highly complex system architecture, which makes possible to use the resources in more efficient way. Description of the proposed algorithm is followed by simulation test results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alliance, C.S.: Top threats to cloud computing v1. 0 (2010). http://www.cloudsecurityalliance.org/topthreats
Apiecionek, L., Czerniak, J., Dobrosielski, W.: Quality of services method as a DDoS protection tool. In: Advances in Intelligent Systems and Computing, pp. 225â234. Springer, New York (2015)
Apiecionek, L., Czerniak, J.M.: QoS solution for network resource protection. In: Proceedings of the Twelfth International Conference on Informatics, Informatics 2013, pp. 73â76 (2013)
Apiecionek, L., Czerniak, J.M., Dobrosielski, W.T.: Quality of services method as a DDoS protection tool. In: Intelligent Systems 2014, Vol. 2: Tools, Architectures, Systems, Applications, vol. 323, 225â234 (2015)
Apiecionek, L., Czerniak, J.M., Ewald, D.: New QoS Concept for Protecting Network Resources, pp. 234â239. Springer International Publishing, Cham (2017)
Apiecionek, L., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. Beyond Databases, Archit. Struct., BDAS 424, 405â414 (2014)
Apiecionek, Ć., Sobczak, M., Makowski, W., Vince, T.: Multi path transmission control protocols as a security solution. In: 2015 IEEE 13th International Scientific Conference on Informatics, pp. 27â31. IEEE (2015)
Apiecionek, M., et al.: Biblioteka przy parafii pw. ĆwiÄtych polskich braci mÄczennikĂłw w bydgoszczy. Fides. Biuletyn Bibliotek KoĆcielnych 21(41(2)), 73â80 (2015)
Czerniak, J., Ewald, D., Macko, M., Smigielski, G., Tyszczuk, K.: Approach to the monitoring of energy consumption in Eco-grinder based on ABC optimization. Beyond Databases Archit. Struct. BDAS 521, 516â529 (2015)
Czerniak, J.: Evolutionary approach to data discretization for rough sets theory. Fundamenta Informaticae 92(1â2), 43â61 (2009)
Czerniak, J.M., Dobrosielski, W., Zarzycki, H., Apiecionek, L.: A proposal of the new owlANT method for determining the distance between terms in ontology. Intelligent Systems 2014, Vol. 2: Tools, Architectures, Systems, Applications, vol. 323, 235â246 (2015)
Czerniak, J.M., Dobrosielski, W.T., Apiecionek, Ć., Ewald, D., Paprzycki, M.: Practical application of OFN arithmetics in a crisis control center monitoring, pp. 51â64. Springer International Publishing, Cham (2016)
Czerniak, J.M., Ewald, D., Ćmigielski, G., Dobrosielski, W.T., Apiecionek, Ć.: Optimization of fuel consumption in firefighting water capsule Flights of a Helicopter, pp. 39â49. Springer International Publishing, Cham (2016)
Czerniak, J.M., Zarzycki, H.: Artificial acari optimization as a new strategy for global optimization of multimodal functions. J. Comput. Sci. 348, 1â22 (2017)
Czerniak, J.M., Zarzycki, H., Ewald, D.: AAO as a new strategy in modeling and simulation of constructional problems optimization. In: Simulation Modelling Practice and Theory (2017). http://www.sciencedirect.com/science/article/pii/S1569190X17300709
Czerniak, J., Apiecionek, Ć., Zarzycki, H., Ewald, D.: Proposed CAEva simulation method for evacuation of people from a buildings on fire. Adv. Intell. Syst. Comput. 401, 315â326 (2016)
Czerniak, J., Dobrosielski, W., Apiecionek, L.: Representation of a trend in OFN during fuzzy observance of the water level from the crisis control center. In: Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE Digital Library, ACSIS, vol. 5, pp. 443-447 (2015)
Czerniak, J., Macko, M., Ewald, D.: The cutmag as a new hybrid method for multi-edge grinder design optimization. Adv. Intell. Syst. Comput. 401, 327â337 (2016)
Czerniak, J., Smigielski, G., Ewald, D., Paprzycki, M.: New proposed implementation of ABC method to optimization of water capsule flight. In: Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE Digital Library, ACSIS, vol. 5, pp. 489-493 (2015)
Ewald, D., Czerniak, J.M., Zarzycki, H.: Approach to solve a criteria problem of the ABC algorithm used to the WBDP multicriteria optimization. In: Intelligent Systems 2014, Vol. 1: Mathematical Foundations, Theory, Analyses, vol. 322, pp. 129â137 (2015)
Horrigan, J.B.: Cloud computing gains in currency (2008). http://pewresearch.org/pubs/948/cloud-computing-gains-in-currency
Kosinski, W., Prokopowicz, P., Rosa, A.: Defuzzification functionals of ordered fuzzy numbers. IEEE Trans. Fuzzy Syst. 21(6), 1163â1169 (2013)
Kozik, R., ChoraĆ, M., HoĆubowicz, W.: Packets tokenization methods for web layer cyber security. Logic J. IGPL 25(1), 103â113 (2017)
Kozik, R., ChoraĆ, M., Renk, R., HoĆubowicz, W.: Cyber security of the application layer of mission critical industrial systems. In: IFIP International Conference on Computer Information Systems and Industrial Management, pp. 342â351. Springer, New York (2016)
Mace, J.C., Van Moorsel, A., Watson, P.: The case for dynamic security solutions in public cloud workflow deployments. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, pp. 111â116. IEEE (2011)
Macko, M., Flizikowski, J.: The method of the selection of comminution design for non-brittle materials. In: AIChE Annual Meeting, Conference Proceedings (2010)
Macko, M., Flizikowski, J., SzczepaĆski, Z., Tyszczuk, K., Ćmigielski, G., MroziĆski, A., Czerniak, J., Tomporowski, A.: CAD/CAE Applications in Millâs Design and Investigation, pp. 343â351. Springer International Publishing, Cham (2017)
Palka, R., Makowski, W., Wozniak, M., Brazkiewicz, P., Wosinski, K., Baturo, P., Terlecki, M., Gromacki, T.: QoS mechanism for low speed radio networks-case study. In: International Conference on Image Processing and Communications, pp. 240â246. Springer, New York (2016)
Pearson, S.: Toward accountability in the cloud. IEEE Internet Comput. 15(4), 64â69 (2011)
Sharma, P.D.: A classification of distinct vulnerabilities in cloud computing. World J. Sci. Technol. 2, 103 (2012)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1â11 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Apiecionek, Ć., Czerniak, J.M., Dobrosielski, W., Ewald, D. (2018). Fuzzy Logic Load Balancing for Cloud Architecture Network - A Simulation Test. In: Kacprzyk, J., Szmidt, E., ZadroĆŒny, S., Atanassov, K., Krawczak, M. (eds) Advances in Fuzzy Logic and Technology 2017. EUSFLAT IWIFSGN 2017 2017. Advances in Intelligent Systems and Computing, vol 641. Springer, Cham. https://doi.org/10.1007/978-3-319-66830-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-66830-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66829-1
Online ISBN: 978-3-319-66830-7
eBook Packages: EngineeringEngineering (R0)