A task scheduling algorithm considering game theory designed for energy management in cloud computing

Future Generation Computer Systems - Tập 105 - Trang 985-992 - 2020
Jiachen Yang1, Bin Jiang1, Zhihan Lv2, Kim-Kwang Raymond Choo3,4
1School of Electrical Automation and Information Engineering, Tianjin University, Tianjin, China
2School of Data Science and Software Engineering, Qingdao University, Qingdao, China
3Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX 78249 USA
4School of Information Technology & Mathematical Sciences, University of South Australia, Adelaide, SA 5095, Australia

Tài liệu tham khảo

Ge, 2016, Survey on key revocation mechanisms in wireless sensor networks, J. Netw. Comput. Appl., 63, 24, 10.1016/j.jnca.2016.01.012 Buyya, 2009, Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Gener. Comput. Syst., 25, 599, 10.1016/j.future.2008.12.001 Jiang, 2014, Generating trusted graphs for trust evaluation in online social networks, Future Gener. Comput. Syst., 31, 48, 10.1016/j.future.2012.06.010 Quick, 2016, Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data, Softw. Pract. Exper., 10.1002/spe.2429 Corradi, 2014, Vm consolidation: A real case based on openstack cloud, Future Gener. Comput. Syst., 32, 118, 10.1016/j.future.2012.05.012 Matijasevic, 2003, Design and evaluation of a multi-user virtual audio chat, Future Gener. Comput. Syst., 19, 229, 10.1016/S0167-739X(02)00149-8 Fortino, 2014, Bodycloud: A saas approach for community body sensor networks, Future Gener. Comput. Syst., 35, 62, 10.1016/j.future.2013.12.015 Botta, 2016, Integration of cloud computing and Internet of things: A survey, Future Gener. Comput. Syst., 56, 684, 10.1016/j.future.2015.09.021 Wei, 2014, Security and privacy for storage and computation in cloud computing, Inform. Sci., 258, 371, 10.1016/j.ins.2013.04.028 Tao, 2014, Cciot-cmfg: Cloud computing and Internet of things-based cloud manufacturing service system, IEEE Trans. Ind. Inf., 10, 1435, 10.1109/TII.2014.2306383 Xiao, 2014, Accountable mapreduce in cloud computing, Future Gener. Comput. Syst., 30, 1, 10.1016/j.future.2013.07.001 Ali, 2015, Security in cloud computing: Opportunities and challenges, Inform. Sci., 305, 357, 10.1016/j.ins.2015.01.025 Baek, 2015, A secure cloud computing based framework for big data information management of smart grid, IEEE Trans. Cloud Comput., 3, 233, 10.1109/TCC.2014.2359460 B. Li, J. Li, J. Huai, T. Wo, Q. Li, L. Zhong, Enacloud: An energy-saving application live placement approach for cloud computing environments, in: IEEE International Conference on Cloud Computing, Cloud 2009, Bangalore, India, 21–25 September, 2009, pp. 17–24. Samimi, 2014, A combinatorial double auction resource allocation model in cloud computing, Inform. Sci., 357, 201, 10.1016/j.ins.2014.02.008 Zhou, 2014, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, J. Comput. System Sci., 80, 1518, 10.1016/j.jcss.2014.04.019 Heilig, 2014, A scientometric analysis of cloud computing literature, IEEE Trans. Cloud Comput., 2, 266, 10.1109/TCC.2014.2321168 Saleem, 2015, Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges, J. Netw. Comput. Appl., 50, 15, 10.1016/j.jnca.2014.12.002 Sadooghi, 2015, Understanding the performance and potential of cloud computing for scientific applications, IEEE Trans. Cloud Comput., 1 Wang, 2013, Adaptive mobile cloud computing to enable rich mobile multimedia applications, IEEE Trans. Multimedia, 15, 870, 10.1109/TMM.2013.2240674 Kimball, 2016, Low bandwidth desktop and video streaming for collaborative tiled display environments, Future Gener. Comput. Syst., 54, 336, 10.1016/j.future.2015.07.009 Wu, 2014, A symmetric image cipher using wave perturbations, Signal Process., 102, 122, 10.1016/j.sigpro.2014.03.015 Hu, 2014, Semantic link network-based model for organizing multimedia big data, IEEE Trans. Emerging Top. Comput., 2, 376, 10.1109/TETC.2014.2316525 Czaplewski, 2015, Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia, Signal Process., 111, 150, 10.1016/j.sigpro.2014.12.026 Rawat, 2012, A blind watermarking algorithm based on fractional Fourier transform and visual cryptography, Signal Process., 92, 1480, 10.1016/j.sigpro.2011.12.006 Younis, 2014, An access control model for cloud computing, J. Inf. Secur. Appl., 19, 45 Zhou, 2013, Image encryption using a new parametric switching chaotic system, Signal Process., 93, 3039, 10.1016/j.sigpro.2013.04.021 N. Bari, R. Vichr, K. Kowsari, S.Y. Berkovich, Novel metaknowledge-based processing technique for multimedia big data clustering challenges, arXiv preprint arXiv:1503.00245. Chang, 2015, Mobile cloud-based depression diagnosis using an ontology and a Bayesian network, Future Gener. Comput. Syst., 43, 87, 10.1016/j.future.2014.05.004 Yang, 2015, Accessing medical image file with co-allocation hdfs in cloud, Future Gener. Comput. Syst., 43, 61, 10.1016/j.future.2014.08.008 Esposito, 2016, Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory, IEEE Trans. Comput., 65, 2348, 10.1109/TC.2015.2389952 Zhou, 2014, Gm-phd-based multi-target visual tracking using entropy distribution and game theory, IEEE Trans. Ind. Inf., 10, 1064, 10.1109/TII.2013.2294156 Dextreit, 2014, Game theory controller for hybrid electric vehicles, IEEE Trans. Control Syst. Technol., 22, 652, 10.1109/TCST.2013.2254597 Pillai, 2016, Resource allocation in cloud computing using the uncertainty principle of game theory, IEEE Syst. J., 10, 637, 10.1109/JSYST.2014.2314861 Liu, 2014, Spectrum sharing in mimo cognitive radio networks based on cooperative game theory, IEEE Trans. Wireless Commun., 13, 4807, 10.1109/TWC.2014.2331287 Kumari, 2016, On the design of a secure user authentication and key agreement scheme for wireless sensor networks, Wirel. Pers. Commun., 1 Aburumman, 2014 Aburumman, 2016, A secure and resilient cross domain sip solution for manets using dynamic clustering and joint spatial and temporal redundancy, Concurr. Comput.: Pract. Exp. Gao, 2014, Constructing gazetteers from volunteered big geo-data based on hadoop, Comput. Environ. Urban Syst., 61, 172, 10.1016/j.compenvurbsys.2014.02.004 Guan, 2004, Modeling adaptable multimedia and self-modifying protocol execution, Future Gener. Comput. Syst., 20, 123, 10.1016/S0167-739X(03)00127-4 Khan, 2003, Optimal quality of service routing and admission control using the utility model, Future Gener. Comput. Syst., 19, 1063, 10.1016/S0167-739X(03)00110-9 Vázquez, 2004, Bandwidth reduction for remote navigation systems through view prediction and progressive transmission, Future Gener. Comput. Syst., 20, 1251, 10.1016/j.future.2004.05.030