• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Haitao, Li Zhanhuai, Zhang Xiao, Bu Hailong, Kong Lanxin, Zhao Xiaonan. Virtual Machine Resources Allocation Methods Based on History Data[J]. Journal of Computer Research and Development, 2019, 56(4): 779-789. DOI: 10.7544/issn1000-1239.2019.20170831
Citation: Wang Haitao, Li Zhanhuai, Zhang Xiao, Bu Hailong, Kong Lanxin, Zhao Xiaonan. Virtual Machine Resources Allocation Methods Based on History Data[J]. Journal of Computer Research and Development, 2019, 56(4): 779-789. DOI: 10.7544/issn1000-1239.2019.20170831

Virtual Machine Resources Allocation Methods Based on History Data

More Information
  • Published Date: March 31, 2019
  • Virtualization technology is widely used in cloud datacenters to realize on-demand resources allocation so as to lower operating costs. Moreover, the technology can also improve the flexibility and scalability of datacenters. Despite various merits, these features of virtualization technology also introduce an issue about how to allocate the virtual machines to make the best of physical resources while reducing the resource collision rate in the meantime. To this end, this paper proposes two resource allocation methods for virtual machines based on statistical analysis of history data. Combined with commonly-used placement strategies, these two methods are more effective compared with some state-of-art virtual machine resource allocation methods. In addition, existing independent indicators are incomplete to reflect the overall effectiveness of allocation methods. In order to solve the issue, this paper also proposes an integrated effectiveness indicator which combines different indicators from three separate aspects including the number of consumed physical machines, resource utilization and resource collision of physical machines to evaluate the effectiveness of allocation schemes. In the end, through tests of realistic cloud computing overhead, we prove that the proposed allocation methods of virtual machines are superior to common methods, and the integrated effectiveness indicator can reasonably evaluate the overall effectiveness of virtual machine allocation schemes.
  • Related Articles

    [1]Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei. Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme[J]. Journal of Computer Research and Development, 2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
    [2]Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470
    [3]Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    [4]Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han. Privacy-Preserving Statistics Protocol for Set-Based Computation[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231. DOI: 10.7544/issn1000-1239.2020.20200444
    [5]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [6]Liu Junxu, Meng Xiaofeng. Survey on Privacy-Preserving Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362. DOI: 10.7544/issn1000-1239.2020.20190455
    [7]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [8]Zhou Jun, Dong Xiaolei, Cao Zhenfu. Research Advances on Privacy Preserving in Recommender Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048. DOI: 10.7544/issn1000-1239.2019.20190541
    [9]Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
    [10]Zhang Zhancheng, Wang Shitong, Fu-Lai Chung. Collaborative Classification Mechanism for Privacy-Preserving[J]. Journal of Computer Research and Development, 2011, 48(6): 1018-1028.

Catalog

    Article views (1132) PDF downloads (374) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return