A task scheduling algorithm considering game theory designed for energy management in cloud computing

Abstract With the increasing popularity of cloud computing products, task scheduling problem has become a hot research topic in this field. The task scheduling problem of cloud computing system is more complex than the traditional distributed system. Based on the analysis of cloud computing in related literature, we established a simplified model for task scheduling system in cloud computing.Different from the previous research of cloud computing task scheduling algorithm, the simplified model in this paper is based on game theory as a mathematical tool. Based on game theory, the task scheduling algorithm considering the reliability of the balanced task is proposed. Based on the balanced scheduling algorithm, the task scheduling model for computing nodes is proposed. In the cooperative game model, game strategy is used for the task in the calculation of rate allocation strategy on the node. Through analysis of experimental results, it is shown that the proposed algorithm has better optimization effect.

[1]  Wenwen Li,et al.  Constructing gazetteers from volunteered Big Geo-Data based on Hadoop , 2013, Comput. Environ. Urban Syst..

[2]  Yang Xiao,et al.  Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[3]  Lea Skorin-Kapov,et al.  Design and evaluation of a multi-user virtual audio chat , 2003, Future Gener. Comput. Syst..

[4]  Chao-Tung Yang,et al.  Accessing medical image file with co-allocation HDFS in cloud , 2015, Future Gener. Comput. Syst..

[5]  Kim-Kwang Raymond Choo,et al.  Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data , 2017, Softw. Pract. Exp..

[6]  Stefan Voß,et al.  A Scientometric Analysis of Cloud Computing Literature , 2014, IEEE Transactions on Cloud Computing.

[7]  Shrisha Rao,et al.  Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory , 2016, IEEE Systems Journal.

[8]  Liang Zhong,et al.  EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments , 2009, 2009 IEEE International Conference on Cloud Computing.

[9]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[10]  Md. Rafiqul Islam,et al.  A secure and resilient cross‐domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy , 2017, Concurr. Comput. Pract. Exp..

[11]  Youfu Li,et al.  GM-PHD-Based Multi-Target Visual Tracking Using Entropy Distribution and Game Theory , 2014, IEEE Transactions on Industrial Informatics.

[12]  Ioan Raicu,et al.  Understanding the Performance and Potential of Cloud Computing for Scientific Applications , 2017, IEEE Transactions on Cloud Computing.

[13]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[14]  Yicong Zhou,et al.  Image encryption using a new parametric switching chaotic system , 2013, Signal Process..

[15]  Tom Wypych,et al.  Low bandwidth desktop and video streaming for collaborative tiled display environments , 2016, Future Gener. Comput. Syst..

[16]  Bartosz Czaplewski,et al.  Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia , 2015, Signal Process..

[17]  Yang Xiao,et al.  Achieving Accountable MapReduce in cloud computing , 2014, Future Gener. Comput. Syst..

[18]  Vijay Varadharajan,et al.  Secure administration of cryptographic role-based access control for large-scale cloud storage systems , 2014, J. Comput. Syst. Sci..

[19]  Lan Chen,et al.  Semantic Link Network-Based Model for Organizing Multimedia Big Data , 2014, IEEE Transactions on Emerging Topics in Computing.

[20]  Jie Wu,et al.  Generating trusted graphs for trust evaluation in online social networks , 2014, Future Gener. Comput. Syst..

[21]  Liang Dong,et al.  Spectrum Sharing in MIMO Cognitive Radio Networks Based on Cooperative Game Theory , 2014, IEEE Transactions on Wireless Communications.

[22]  Sujit Dey,et al.  Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications , 2013, IEEE Transactions on Multimedia.

[23]  Sherali Zeadally,et al.  Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges , 2015, J. Netw. Comput. Appl..

[24]  Muriati Mukhtar,et al.  A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..

[25]  Xiong Li,et al.  On the design of a secure user authentication and key agreement scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[26]  Simon Y. Berkovich,et al.  Novel Metaknowledge-Based Processing Technique for Multimediata Big Data Clustering Challenges , 2015, 2015 IEEE International Conference on Multimedia Big Data.

[27]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[28]  Kin F. Li,et al.  Optimal Quality of Service routing and admission control using the Utility Model , 2003, Future Gener. Comput. Syst..

[29]  Fei Tao,et al.  CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System , 2014, IEEE Transactions on Industrial Informatics.

[30]  Ilya V. Kolmanovsky,et al.  Game Theory Controller for Hybrid Electric Vehicles , 2014, IEEE Transactions on Control Systems Technology.

[31]  Giancarlo Fortino,et al.  BodyCloud: A SaaS approach for community Body Sensor Networks , 2014, Future Gener. Comput. Syst..

[32]  Kim-Kwang Raymond Choo,et al.  A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network , 2014, SecureComm.

[33]  Sos S. Agaian,et al.  A symmetric image cipher using wave perturbations , 2014, Signal Process..

[34]  Yue-Shan Chang,et al.  Mobile cloud-based depression diagnosis using an ontology and a Bayesian network , 2015, Future Gener. Comput. Syst..

[35]  Balasubramanian Raman,et al.  A blind watermarking algorithm based on fractional Fourier transform and visual cryptography , 2012, Signal Process..

[36]  Joonsang Baek,et al.  A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.

[37]  Steven Guan,et al.  Modeling adaptable multimedia and self-modifying protocol execution , 2004, Future Gener. Comput. Syst..

[38]  Mateu Sbert,et al.  Bandwidth reduction for remote navigation systems through view prediction and progressive transmission , 2004, Future Gener. Comput. Syst..

[39]  Antonio Corradi,et al.  VM consolidation: A real case based on OpenStack Cloud , 2014, Future Gener. Comput. Syst..

[40]  Madjid Merabti,et al.  An access control model for cloud computing , 2014, J. Inf. Secur. Appl..

[41]  Yong Yu,et al.  Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..

[42]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[43]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .