Machine Learning For Cloud Management
Machine Learning For Cloud Management
Cloud Management
Machine Learning for
Cloud Management
Jitendra Kumar
Ashutosh Kumar Singh
Anand Mohan
Rajkumar Buyya
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
© 2022 Jitendra Kumar, Ashutosh Kumar Singh, Anand Mohan, Rajkumar Buyya
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot as-
sume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have
attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders
if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please
write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho-
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for iden-
tification and explanation without intent to infringe.
DOI: 10.1201/9781003110101
Publisher’s note: This book has been prepared from camera-ready copy provided by the authors.
Dedicated to,
My wife: Gita, daughter: Aru, and Parents
∼Jitendra Kumar
∼Anand Mohan
∼Rajkumar Buyya
Contents
List of Figures xi
Preface xix
Author xxi
Abbreviations xxv
Chapter 1 Introduction 1
2.1 AUTOREGRESSION 14
2.2 MOVING AVERAGE 14
2.3 AUTOREGRESSIVE MOVING AVERAGE 15
vii
viii Contents
Bibliography 159
Index 171
List of Figures
xi
xii LIST OF FIGURES
3.1 Wilcoxon test statistics for error preventive and non-error preventive
time series forecasting model 57
3.2 Finner test post-hoc analysis of error preventive and non-error pre-
ventive time series forecasting models 57
xvii
xviii LIST OF TABLES
7.1 ARIMA analysis orders for cloud resource demand traces 124
7.2 Network configuration parameter choices for decomposition predictive
framework 124
7.3 List of experiments selected by D-Optimal Design 124
7.4 Mean squared error of short term forecast of ELM based predictive
framework 134
7.5 Mean squared error of long term forecast of ELM based predictive
framework 137
7.6 Forecast accuracy comparison of ELM based predictive models on
CPU trace with state-of-art models 138
7.7 Forecast accuracy comparison of ELM based predictive models on
Memory trace with state-of-art models 138
7.8 Forecast accuracy comparison of ELM based predictive models on
Google cluster trace and PlanetLab Trace with state-of-art models 139
Cloud computing has become one of the revolutionary technology in the history
of the computing world. It offers subscription-based on-demand services and has
emerged as the backbone of the computing industry. It has enabled us to share
resources among multiple users through virtualization by the means of creating a
virtual instance of a computer system running in an abstracted hardware layer. Unlike
early distributed computing models, it assures limitless computing resources through
its large-scale cloud data centers. It has gained wide popularity over the past few
years, with an ever-increasing infrastructure, number of users, and amount of hosted
data. The large and complex workloads hosted on these data centers introduce several
challenges: resource utilization, power consumption, scalability, operational cost, and
many others. Therefore, a practical resource management scheme is essential to bring
operational efficiency with improved elasticity. The elasticity of a system depends on
several factors such as the accuracy of anticipated workload information, performance
behavior of applications in different scenarios communicating the forecast results, use
of the anticipated information, and many others.
Effective resource management can be achieved through workload prediction,
resource scheduling, and provisioning, virtual machine placement, or a combination
of these approaches. The workload prediction has been widely explored and a number
of methods are presented. However, the existing methods suffer from various issues
including the incapability of capturing the non-linearity of workloads and iterative
training that consumes huge computing resources and time. This book discusses
the machine learning-based approaches to address the above-mentioned issues. The
highlights of the discussed models are continuous learning from error feedback, adaptive
nature, decomposition of workload traces, and ensemble learning. Detailed analysis of
predictive methods on different workload traces is also included and their performance
is compared with state-of-art models. Virtual machine placement is another aspect
that is explored to achieve efficient resource management. In general, virtual machine
placement is a multiobjective problem that involves multiple conflicting objectives to
be optimized simultaneously. The frameworks discussed in this book address the issues
of resource utilization, power consumption, and security while placing the workloads
on servers.
The remainder of the book is organized as follows: Chapter 1 briefs the basic cloud
computing concepts. The discussion on the workload prediction mechanisms begins
in chapter 2. First, the basic time series forecasting models are discussed with their
performance on different workload traces. Chapter 3 discusses the error preventive time
series forecasting models which significantly improve the performance over classical
time series models. Then, a discussion on various nature-inspired algorithms is included
xix
xx Preface
xxi
xxii Author
Indian Science Congress held in Chennai, INDIA, Best Paper Presenter of NSC’99
INDIA and Bintulu Development Authority Best Postgraduate Research Paper Award
for 2010, 2011, 2012.
He has served as an Editorial Board Member of International Journal of Networks
and Mobile Technologies, International Journal of Digital Content Technology and
its Applications. Also, he has shared his experience as a Guest Editor for Pertanika
Journal of Science and Technology, Chairman of CUTSE International Conference
2011, Conference Chair of series of International Conference on Smart Computing and
Communication (ICSCC), and as an editorial board member of UNITAR e-journal.
He is involved in reviewing processes in different journals and conferences of repute
including IEEE transaction of computer, IET, IEEE conference on ITC, ADCOM,
etc.
Prof. Anand Mohan has nearly 44 years of experience in teaching and research
and the administration and management of higher educational institutions. He is
currently an institute professor in the Department of Electronics Engineering, Indian
Institute of Technology (BHU), Varanasi, India. Besides his present academic assign-
ment, Prof. Mohan is a Member of the Executive Council of Banaras Hindu University
and Vice-Chairman of the Board of Governors of Indian Institute of Technology
(BHU), Varanasi, India. Prof. Mohan served as Director (June 2011-June 2016) of
the National Institute of Technology (NIT), Kurukshetra, Haryana, India, and was
also Mentor Director of the National Institute of Technology, Srinagar, Uttarakhand,
India. For his outstanding contributions in the field of Electronics Engineering, Prof.
Mohan was conferred the ’’Lifetime Achievement Award’’ (2016) by Kamla Nehru
Institute of Technology, Sultanpur, India.
Prof. Rajkumar Buyya is a Redmond Barry Distinguished Professor and Direc-
tor of the Cloud Computing and Distributed Systems (CLOUDS) Laboratory at the
University of Melbourne, Australia. He is also serving as the founding CEO of Manjra-
soft Pty Ltd., a spin-off company of the University, commercializing its innovations in
Cloud Computing. He served as a Future Fellow of the Australian Research Council
during 2012-2016. He serving/served as an Honorary/Visiting Professor for several
elite Universities including Imperial College London (UK), University of Birmingham
(UK), University of Hyderabad (India), and Tsinghua University (China). He received
B.E and M.E in Computer Science and Engineering from Mysore and Bangalore
Universities in 1992 and 1995 respectively; and a Doctor of Philosophy (Ph.D.) in
Computer Science and Software Engineering from Monash University, Melbourne,
Australia in 2002. He was awarded Dharma Ratnakara Memorial Trust Gold Medal
in 1992 for his academic excellence at the University of Mysore, India. He received
Richard Merwin Award from the IEEE Computer Society (USA) for excellence in
academic achievement and professional efforts in 1999. He received Leadership and
Service Excellence Awards from the IEEE/ACM International Conference on High-
Performance Computing in 2000 and 2003. He received the ‘‘Research Excellence
Awards’’ from the University of Melbourne for productive and quality research in
computer science and software engineering in 2005 and 2008. With over 112,400
citations, a g-index of 322, and an h-index of 145, he is the highest cited computer
scientist in Australia and one of the world’s Top 30 cited authors in computer science
Author xxiii
and software engineering. He received the Chris Wallace Award for Outstanding
Research Contribution 2008 from the Computing Research and Education Association
of Australasia, CORE, which is an association of university departments of computer
science in Australia and New Zealand. Dr. Buyya received the ‘‘2009 IEEE TCSC
Medal for Excellence in Scalable Computing’’ for pioneering the economic paradigm for
utility-oriented distributed computing platforms such as Grids and Clouds. He served
as the founding Editor-in-Chief (EiC) of IEEE Transactions on Cloud Computing
(TCC). Dr. Buyya is recognized as a ‘‘Web of Science Highly Cited Researcher’’ for
five consecutive years since 2016, a Fellow of IEEE and Scopus Researcher of the
Year 2017 with Excellence in Innovative Research Award by Elsevier, and ‘‘Lifetime
Achievement Award’’ from two Indian universities for his outstanding contributions
to Cloud computing and distributed systems. He has been recently recognized as the
‘‘Best of the Worl’’, in the Computing Systems field, by The Australian 2019 Research
Review.
Dr. Buyya has authored/co-authored over 850 publications. Since 2007, he received
twelve ‘‘Best Paper Awards’’ from international conferences/journals including a
‘‘2009 Outstanding Journal Paper Award’’ from the IEEE Communications Society,
USA. He has co-authored five text books: Microprocessor x86 Programming (BPB
Press, New Delhi, India, 1995), Mastering C++ (McGraw Hill Press, India, 1st
edition in 1997 and 2nd edition in 2013), Object Oriented Programming with Java:
Essentials and Applications (McGraw Hill, India, 2009), Mastering Cloud Computing
(Morgan Kaufmann, USA; McGraw Hill, India, 2013; China Machine Press, 2015),
and Cloud Data Centers and Cost Modeling (Morgan Kaufmann, USA, 2015). The
books on emerging topics that he edited include High Performance Cluster Computing
(Prentice Hall, USA, 1999), High Performance Mass Storage and Parallel I/O (IEEE
and Wiley Press, USA, 2001), Content Delivery Networks (Springer, Germany, 2008),
Market Oriented Grid and Utility Computing (Wiley Press, USA, 2009), and Cloud
Computing: Principles and Paradigms (Wiley, USA, 2011). He also edited proceedings
of over 25 international conferences published by prestigious organizations, namely
the IEEE Computer Society Press (USA) and Springer Verlag (Germany). He served
as Associate Editor of Elsevier’s Future Generation Computer Systems Journal (2004-
2009) and currently serving on editorial boards of many journals including Software:
Practice and Experience (Wiley Press). Dr. Buyya served as a speaker in the IEEE
Computer Society Chapter Tutorials Program (from 1999-2001), Founding Co-Chair
of the IEEE Task Force on Cluster Computing (TFCC) from 1999-2004, and member
of the Executive Committee of the IEEE Technical Committee on Parallel Processing
(TCPP) from 2003-2011. He served as the first elected Chair of the IEEE Technical
Committee on Scalable Computing (TCSC) during 2005-2007 and played a prominent
role in the creation and execution of several innovative community programs that
propelled TCSC into one of the most successful TCs within the IEEE Computer
Society. In recognition of these dedicated services to the computing community
over a decade, the President of the IEEE Computer Society presented Dr. Buyya a
Distinguished Service Award in 2008.
Dr. Buyya has contributed to the creation of high-performance computing and
communication system software for PARAM supercomputers developed by the Centre
xxiv Author
xxv
xxvi Abbreviations
Introduction
DOI: 10.1201/9781003110101-1 1
2 Machine Learning for Cloud Management
SaaS
User Ap-
plications
PaaS
Database Application
UI Services
Grid Grid
IaaS
disaster recovery, accessibility, measured services, and many others [25, 73, 75, 98].
However, various challenges and limitations are still open including inefficient resource
management, security and privacy, heterogeneity, elasticity, usability, response time,
and many more [18, 19, 21, 52--54, 90, 109, 124, 125].
Resource
Clients Information
Web
Portal
Resource Management
Resource Pool
Workload
Workload Resource
Analysis Provision
Cloud Scheduler
a modern cloud system tries to assign the workloads to one of the server machines
based on different criteria including resource utilization, system performance, user
priorities, operational cost, quality of service, etc. Typically, the complete process of
workload placement over a time to improve different variables of a system is referred
to as cloud resource management. As depicted in Fig. 1.2, the major tasks of a cloud
resource management application are workload analysis and forecasting, resource
provisioning, and scheduling the workloads on hardware. The workload analysis
module is responsible for analyzing the upcoming workload and for forecasting the
expected workload in the near future. This information is used by the resource
provisioning module to allocate the physical resources. The resource scheduler places
the workloads on the servers based on the input from the resource provisioning module
and current resource usage information. Typically, resource management is achieved
through prediction, scaling, provisioning, and load balancing, as shown in Fig. 1.3.
However, this book concentrates on workload forecasting using different approaches
of regression analysis and artificial neural networks, and load balancing.
Cloud Resource
Management
Forecaster
Cloud Datacenter
Se Se
rve rve
r r
Se Se
rve rv
r er
WWW Load
Balancer
Cloud Users
The effective load balancing is another approach that helps in achieving better
usage of resources and their management. The efficiency of load balancing approaches
has been an issue for cloud systems since its development [84, 129]. The efficiency in
load balancing can be achieved using different approaches such as optimal scheduling
and placement of workloads or virtual machines (VMs). The optimal mapping of
VMs is a complex and challenging task as it involves multiple objectives to optimize
at the same time and belongs to NP-Complete class of problems [16, 88]. Generally,
the existing VM placement algorithms consider the different dimensions of resource
utilization and power consumption in the data centers [4, 138]. We will focus on the
load balancing approaches, also dealing with the security while balancing the load on
cloud servers as it is one of the most important issues in the cloud architectures, and
various approaches have been discovered including [43, 85].
Output
Layer
Hidden Hidden
Layer-1 Layer-2
The key difference between a traditional computing approach and a neural network
is that the traditional approach follows a set of rules that must be known to the
computer in advance, while a neural network can learn from the data itself to draw
insightful inferences using some specific rules. Let κ1 = [x1 , x2 , . . . , xt ] be an input
vector, and the network, as shown in Fig. 1.6, is applied to estimate the value of xt+1 .
Assuming that ωi,j k
represents the weight of a synaptic connection between the ith
node of the k th layer and the j th node of the next layer, and ζk denotes the activation
function applied on k th layer nodes. The output of the j th node of layer k + 1 can be
computed as zj = ti=1 ζk+1 (xi · ωi,jk
) that acts as the input to next layer nodes.
P
farb
These algorithms can be classified into two major categories i.e. trajectory-based
and population-based approaches. A trajectory-based algorithm such as Simulated
Annealing works around a single solution to find an optimal solution for the problem
under consideration. On the other hand, a population-based algorithm uses a set
of solutions to search for an optimal solution. A detailed study on metaheuristic
optimization can be seen in [14].
HTTP-Web Server Logs: The HTTP traces of web servers of NASA, Calgary, and
Saskatchewan servers are used [1]. In this book, these data traces are referred to as
NASA Trace (D1 ), Calgary Trace (D2 ), Saskatchewan Trace (D3 ), respectively. The
D1 is composed of two months of HTTP web requests obtained from the WWW server
of NASA Kennedy Space Center in Florida. Similarly, the D2 data-trace contains the
HTTP request of one-year duration obtained from the WWW server located at the
University of Calgary, Alberta, Canada. On the other hand, the D3 is a data-trace
that contains the HTTP server requests of seven months obtained from a WWW
8 Machine Learning for Cloud Management
server of a university at Saskatchewan. Every data trace stores the records in ASCII
files, and every line stores one record. Every record is composed of five records i.e.
host, timestamp, request, HTTP reply code, and bytes in the reply.
Google Cluster Trace: It contains the data collected from the cluster cell of Google
for 29 days of duration. The workload trace was released in 2011, and it contains
the data from 10388 servers, 20 million tasks, and more than 0.67 million jobs [112].
A job is a set of one or more tasks, and tasks are further decomposed into one or
more processes. In this book, the CPU and Memory resource demands are used and
referred to as CPU Trace (D4 ) and Memory Trace (D5 ).
Mean Squared Error: The mean squared error (MSE) measures the forecast accuracy,
and it is one of the popular metrics used in the literature. This method heavily penalizes
the large error terms. Mathematically, it is denoted as given in eq. (1.2), where m
represents the size of data in a given trace. The term MSE and MPE (mean squared
prediction error) are interchangeably used in the book. Moreover, the square root of
MSE (RMSE) may also be used as an error metric.
m
1 X
M SE = (xt − x̂t )2 (1.2)
m t=1
Mean Absolute Error: A small number of very large magnitude errors may influence
the accuracy measured using mean squared error. Whereas mean absolute error equally
weights every error term, and it computes the mean of absolute differences between
predicted and actual workloads as given in eq. (1.3). The forecasts are close to the
actual workload values if the measured score is close to zero.
m
1 X
M AE = |xt − x̂t | (1.3)
m t=1
Introduction 9
Relative Mean Absolute Error: A scale-free error metric is required to compare the
forecast models on different data sets, and relative mean absolution error (RelMAE)
is one such metric. The score can be calculated using eq. (1.4), which represents the
mean absolute error of the algorithm (M AEA ) normalized by the mean absolute error
of a base or state of the art model (M AEBM )
M AEA
RelM AE = (1.4)
M AEBM
Mean Absolute Scaled Error: Rob J. Hyndman and Anne B. Koehler introduced a
new metric as a substitution of percentage error metrics [61]. The prediction errors
are scaled on the basis of the training mean absolute error of a naı̈ve forecast method.
It computes the measured score using eq. (1.5), where ms denotes the seasonal term.
This metric is a good choice of accuracy measurement when the prediction model is
compared across a number of different scales.
m
1 X
!
|xt − x̂t |
M ASE(x, x̂) = 1 Pm (1.5)
m t=1 m−ms t=ms +1 |xt − xt−1 |
Sum of Elasticity Index: Messias et al. proposed to use the sum of elasticity index
(SEI) as a measure of forecast accuracy [92]. This metric supports a forecast model
having the best performance most of the time. As opposed to MAE and RMSE, it is
very less sensitive to the outliers. The SEI score is computed as given in eq. (1.7) and
it always lies between zero and one, where zero and one define the worst and best
accuracy of the model.
m
min(xt , x̂t )
SEI = (1.7)
X
t=1
max(xt , x̂t )
i >0
2 i =0
1X
WC =
R− rank(i ) + rank(i ) (1.9)
X
i <0
2 i =0
significance level (ℵ) in a step-down manner [34]. Considering that the generated
p-values are sorted in an increasing fashion in such a way that pi ≤ pi+1 ; ∀i =
{1, 2, . . . , k − 2}. Let HiFN be the corresponding hypothesis for tests. The Finner test
rejects the hypothesis from H1FN to Hi−1 FN
provided i is the smallest integer number
k−1
that satisfy pi > 1 − (1 − ℵ) i property [34].
References
Traces available in the internet traffic archive . ftp://ita.ee.lbl.gov/html/. [Online: accessed on 01-05-2019].
Oludare Isaac Abiodun , Aman Jantan , Abiodun Esther Omolara , Kemi Victoria Dada , Abubakar Malah Umar
, Okafor Uchenwa Linus , Humaira Arshad , Abdullahi Aminu Kazaure , Usman Gana , and Muhammad Ubale
Kiru . Comprehensive review of artificial neural network applications to pattern recognition. IEEE Access,
7:158820–158846, 2019.
Joseph Ackora-Prah , Samuel Asante Gyamerah, and Perpetual Saah Andam. A heuristic crossover for
portfolio selection. 8(65):3215–3227, 2014.
Fares Alharbi , Yu-Chu Tian , Maolin Tang , Wei-Zhe Zhang , Chen Peng , and Minrui Fei . An ant colony
system for energy-efficient dynamic virtual machine placement in data centers. Expert Systems with
Applications, 120:228–238, 2019.
Osama Moh'd Alia and Rajeswari Mandava . The variants of the harmony search algorithm: an overview.
Artificial Intelligence Review, 36(1):49–68, Jun 2011.
Maryam Amiri and Leyli Mohammad-Khanli . Survey on prediction models of applications for resources
provisioning in cloud. Journal of Network and Computer Applications, 82:93–113, 2017.
E. Assareh , M.A. Behrang , M.R. Assari , and A. Ghanbarzadeh . Application of PSO (particle swarm
optimization) and GA (genetic algorithm) techniques on demand estimation of oil in iran. Energy,
35(12):5223–5229, 2010.
Rasoul Azizipanah-Abarghooee , Taher Niknam , Farhad Bavafa , and Mohsen Zare . Short-term scheduling of
thermal power systems using hybrid gradient based modified teaching-learning optimizer with black hole
algorithm. Electric Power Systems Research, 108:16–34, 2014.
Indu Bala and Anupam Yadav . Gravitational search algorithm: A state-of-the-art review. In Neha Yadav ,
Anupam Yadav , Jagdish Chand Bansal , Kusum Deep , and Joong Hoon Kim , editors, Harmony Search and
Nature Inspired Optimization Algorithms, pages 27–37, Singapore, 2019. Springer Singapore.
F. Baldan , S. Ramirez-Gallego , C. Bergmeir , F. Herrera , and J. M. Benitez . A forecasting methodology for
workload forecasting in cloud systems. IEEE Transactions on Cloud Computing, 6(04):929–941, oct 2018.
Anton Beloglazov and Rajkumar Buyya . Optimal online deterministic algorithms and adaptive heuristics for
energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency
Computing: Pract. Exper., 24(13):1397–1420, Sep 2012.
P. D. Bharathi , P. Prakash , and M. V. K. Kiran . Virtual machine placement strategies in cloud computing. In
2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pages 1–7, April 2017.
Mamun Bin Ibne REAZ and Mohd Marufuzzaman . Pattern matching and reinforcement learning to predict the
user next action of smart home device usage. Acta Technica Corviniesis - Bulletin of Engineering, 6(3):37–40,
2013.
Ilhem Boussaïd , Julien Lepagnot , and Patrick Siarry . A survey on optimization metaheuristics. Information
Sciences, 237:82–117, 2013.
George E. P. Box , Gwilym M. Jenkins , and Gregory C. Reinsel . Time Series Analysis. John Wiley & Sons,
Inc., 2008.
Wayne F. Boyer and Gurdeep S. Hura . Non-evolutionary algorithm for scheduling dependent tasks in
distributed heterogeneous computing environments. Journal of Parallel and Distributed Computing,
65(9):1035–1046, Sep 2005.
Rajkumar Buyya , James Broberg , and Andrzej M. Goscinski . Cloud Computing Principles and Paradigms.
Wiley Publishing, 2011.
Rajkumar Buyya , Satish Narayana Srirama , Giuliano Casale , Rodrigo Calheiros , and et al. A manifesto for
future generation cloud computing: Research directions for the next decade. ACM Comput. Surv.,
51(5):105:1–105:38, Nov 2018.
Rajkumar Buyya , Chee Shin Yeo , Srikumar Venugopal , James Broberg , and Ivona Brandic . Cloud
computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future
Generation Computer Systems, 25:599–616, 6 2009.
H. R. Cai , C. Y. Chung , and K. P. Wong . Application of differential evolution algorithm for transient stability
constrained optimal power flow. IEEE Transactions on Power Systems, 23(2):719–728, May 2008.
K. Chandrasekaran . Essentials of Cloud Computing. Chapman and Hall/CRC, 1 edition, 2014.
Mingzhe Chen , Ursula Challita , Walid Saad , Changchuan Yin , and Mérouane Debbah . Artificial neural
networks-based machine learning for wireless networks: A tutorial. IEEE Communications Surveys Tutorials,
21(4):3039–3071, 2019.
Z. Chen , A. Sinha , and P. Schaumont . Using virtual secure circuit to protect embedded software from side-
channel attacks. IEEE Transactions on Computers, 62(1):124–136, Jan 2013.
Sakshi Chhabra and Ashutosh Kumar Singh . Dynamic data leakage detection model based approach for
mapreduce computational security in cloud. In Proceedings on 5th International Conference on Eco-Friendly
Computing and Communication Systems, ICECCS 2016, pages 13–19, 4 2017.
Sakshi Chhabra and Ashutosh Kumar Singh . Optimal VM placement model for load balancing in cloud data
centers. In 2019 7th International Conference on Smart Computing and Communications, ICSCC 2019, 6 2019.
Sakshi Chhabra and Ashutosh Kumar Singh . A secure VM allocation scheme to preserve against co-resident
threat. International Journal of Web Engineering and Technology, 15:96–115, 2020.
R. B. Cleveland , W. S. Cleveland , J.E. McRae , and I. Terpenning . STL: A seasonal-trend decomposition
procedure based on loess. Journal of Official Statistics, 6:3–73, 1990.
William Jay Conover and William Jay Conover . Practical nonparametric statistics. Wiley New York, 1980.
Credit Suisse . 2018 Data Center Market Drivers: Enablers Boosting Enterprise Cloud Growth.
https://cloudscene.com/news/2017/12/2018-data-center-predictions/, 2017. [Online; accessed 19-05-2019].
M. E. Crovella and A. Bestavros . Self-similarity in world wide web traffic: evidence and possible causes.
IEEE/ACM Transactions on Networking, 5(6): 835–846, Dec 1997.
A. Cui , Y. Luo , and C. Chang . Static and dynamic obfuscations of scan data against scan-based side-channel
attacks. IEEE Transactions on Information Forensics and Security, 12(2):363–376, Feb 2017.
P.F. de Aguiar , B. Bourguignon , M.S. Khots , D.L. Massart , and R. Phan-Than-Luu . D-optimal designs.
Chemometrics and Intelligent Laboratory Systems, 30(2):199–210, 1995.
K. Deb , A. Pratap , S. Agarwal , and T. Meyarivan . A fast and elitist multiobjective genetic algorithm: NSGA-II.
IEEE Transactions on Evolutionary Computation, 6(2):182–197, April 2002.
Joaquín Derrac , Salvador García , Daniel Molina , and Francisco Herrera . A practical tutorial on the use of
nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms.
Swarm and Evolutionary Computation, 1(1):3–18, 2011.
Saber M. Elsayed , Ruhul A. Sarker , and Daryl L. Essam . An improved self-adaptive differential evolution
algorithm for optimization problems. IEEE Transactions on Industrial Informatics, 9:89–99, 2013.
F. Farahnakian , A. Ashraf , T. Pahikkala , P. Liljeberg , J. Plosila , I. Porres , and H. Tenhunen . Using ant
colony system to consolidate vms for green cloud computing. IEEE Transactions on Services Computing,
8(2):187–198, March 2015.
Araf Farayez , Mamun Bin Ibne Reaz , and Norhana Arsad . SPADE: Activity Prediction in Smart Homes Using
Prefix Tree Based Context Generation. IEEE Access, 7:5492–5501, 2019.
H. Finner . On a monotonicity problem in step-down multiple test procedures. Journal of the American
Statistical Association, 88(423):920–923, 1993.
Iztok Fister , Iztok Fister , Xin-She Yang , and Janez Brest . A comprehensive review of firefly algorithms.
Swarm and Evolutionary Computation, 13:34–46, 2013.
Milton Friedman . The use of ranks to avoid the assumption of normality implicit in the analysis of variance.
Journal of the American Statistical Association, 32(200):675–701, 1937.
Milton Friedman . A comparison of alternative tests of significance for the problem of m rankings. The Annals of
Mathematical Statistics, 11(1):86–92, 1940.
Alexander A. Frolov , Dusan Husek , and Pavel Yu. Polyakov . Recurrent-neural-network-based boolean factor
analysis and its application to word clustering. IEEE Transactions on Neural Networks, 20(7):1073–1086, 2009.
G S Smrithy , Alfredo Cuzzocrea , and Ramadoss Balakrishnan . Detecting Insider Malicious Activities in Cloud
Collaboration Systems. Fundamenta Informaticae, 161(3):299–316, Jul 2018.
Salvador García , Daniel Molina , Manuel Lozano , and Francisco Herrera . A study on the use of non-
parametric tests for analyzing the evolutionary algorithms' behaviour: a case study on the CEC'2005 special
session on real parameter optimization. Journal of Heuristics, 15(6):617, May 2008.
Zong Woo Geem , Joong Hoon Kim , and G.V. Loganathan . A new heuristic optimization algorithm: Harmony
search. SIMULATION, 76(2):60–68, 2001.
Salyean Giri , Abeer Alsadoon , Chandana Withana , Salih Ali , and A. Elchouemic . Prediction of dementia by
increasing subspace size in rank forest. In 2018 IEEE 8th Annual Computing and Communication Workshop
and Conference (CCWC), pages 255–260. IEEE, Jan 2018.
Fred Glover . Future paths for integer programming and links to artificial intelligence. Computers & Operations
Research, 13(5):533–549, Jan 1986.
Fred. Glover and Manuel. Laguna . Tabu search. Kluwer Academic Publishers, 1997.
M. Godfrey and M. Zulkernine . Preventing cache-based side-channel attacks in a cloud environment. IEEE
Transactions on Cloud Computing, 2(4):395–408, Oct 2014.
David Goldberg . Genetic algorithms in search, optimization and machine learning. MA: Addison-Wesley
Professional, ISBN 978-0201157673.
Guang-Bin Huang , Qin-Yu Zhu , and Chee-Kheong Siew . Extreme learning machine: a new learning scheme
of feedforward neural networks. In 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat.
No.04CH37541), volume 2, pages 985–990. IEEE.
Ishu Gupta , Rishabh Gupta , Ashutosh Kumar Singh , and Rajkumar Buyya . MLPAM: A machine learning and
probabilistic analysis based model for preserving security and privacy in cloud environment. IEEE Systems
Journal, 2020.
Ishu Gupta and Ashutosh Kumar Singh . A confidentiality preserving data leaker detection model for secure
sharing of cloud data using integrated techniques. In 2019 7th International Conference on Smart Computing
and Communications, ICSCC 2019. Institute of Electrical and Electronics Engineers Inc., 6 2019.
Ishu Gupta , Niharika Singh , and Ashutosh Kumar Singh . Layer-based privacy and security architecture for
cloud data sharing. Journal of Communications Software and Systems, 15:173–185, 6 2019.
Y. Han , J. Chan , T. Alpcan , and C. Leckie . Using virtual machine allocation policies to defend against co-
resident attacks in cloud computing. IEEE Transactions on Dependable and Secure Computing, 14(1):95–108,
Jan 2017.
Ahmad Hassanat and Esra' Alkafaween . On enhancing genetic algorithms using new crossovers. arXiv
preprint arXiv:1801.02335, 2018.
Abdolreza Hatamlou . Black hole: A new heuristic optimization approach for data clustering. Information
Sciences, 222:175–184, 2013.
John H Holland . Adaptation in natural and artificial systems: An introductory analysis with applications to
biology, control, and artificial intelligence. U Michigan Press, Oxford, England, 1975.
Guang-Bin Huang , Qin-Yu Zhu , and Chee-Kheong Siew . Extreme learning machine: Theory and applications.
Neurocomputing, 70:489–501, 2006.
Rob J Hyndman and Yeasmin Khandakar . Automatic time series forecasting: the forecast package for R.
Journal of Statistical Software, 26(3):1–22, 2008.
Rob J. Hyndman and Anne B. Koehler . Another look at measures of forecast accuracy. International Journal of
Forecasting, 22(4):679–688, 2006.
IDC . Cloud IT Infrastructure Revenues Surpassed Traditional IT Infrastructure Revenues for the First Time in
the Third Quarter of 2018, According to IDC. https://www.idc.com/getdoc.jsp?containerId=prUS44670519,
2019. [Online; accessed 19-05-2019].
Gartner Inc . Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17.3 Percent in 2019.
https://www.gartner.com/en/newsroom/press-releases/2018-09-12-gartner-forecasts-worldwide-public-cloud-
revenue-to-grow-17-percent-in-2019, 2018. [Online; accessed 19-05-2019].
S. M. Islam , S. Das , S. Ghosh , S. Roy , and P. N. Suganthan . An adaptive differential evolution algorithm
with novel mutation and crossover strategies for global numerical optimization. IEEE Transactions on Systems,
Man, and Cybernetics, Part B (Cybernetics), 42(2):482–500, April 2012.
Luke Jebaraj , Chakkaravarthy Venkatesan , Irisappane Soubache , and Charles Christober Asir Rajan .
Application of differential evolution algorithm in static and dynamic economic or emission dispatch problem: A
review. Renewable and Sustainable Energy Reviews, 77:1206–1220, 2017.
Brendan Jennings and Rolf Stadler . Resource management in clouds: Survey and research challenges.
Journal of Network and Systems Management, 23(3): 567–619, Jul 2015.
Yılmaz Kaya , Murat Uyar , Ramazan Tekđn . A novel crossover operator for genetic algorithms: Ring
crossover. 2011. https://arxiv.org/abs/1105.0355.
J. Kennedy and R. Eberhart . Particle swarm optimization. In Proceedings of ICNN'95 - International
Conference on Neural Networks, volume 4, pages 1942–1948, Nov 1995.
Paul C. Kocher . Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Neal
Koblitz , editor, Advances in Cryptology– CRYPTO '96, pages 104–113, Berlin, Heidelberg, 1996. Springer
Berlin Heidelberg.
Shiann-Rong Kuang , Kun-Yi Wu , Bao-Chen Ke , Jia-Huei Yeh , and Hao-Yi Jheng . Efficient architecture and
hardware implementation of hybrid fuzzy-kalman filter for workload prediction. Integration, the VLSI Journal,
47(4): 408–416, 2014.
Jitendra Kumar , Rimsha Goomer , and Ashutosh Kumar Singh . Long short term memory recurrent neural
network (LSTM-RNN) based workload forecasting model for cloud datacenters. In Procedia Computer Science,
volume 125, pages 676–682. Elsevier B.V., 2018.
Jitendra Kumar , Deepika Saxena , Ashutosh Kumar Singh , and Anand Mohan . Biphase adaptive learning-
based neural network model for cloud datacenter workload forecasting. Soft Computing, 24:14593–14610, 10
2020.
Jitendra Kumar and Ashutosh Kumar Singh . Dynamic resource scaling in cloud using neural network and black
hole algorithm. In Proceedings on 5th International Conference on Eco-Friendly Computing and Communication
Systems, ICECCS 2016, pages 63–67. Institute of Electrical and Electronics Engineers Inc., 4 2017.
Jitendra Kumar and Ashutosh Kumar Singh . Workload prediction in cloud using artificial neural network and
adaptive differential evolution. Future Generation Computer Systems, 81:41–52, 4 2018.
Jitendra Kumar and Ashutosh Kumar Singh . Cloud resource demand prediction using differential evolution
based learning. In 2019 7th International Conference on Smart Computing and Communications, ICSCC 2019.
Institute of Electrical and Electronics Engineers Inc., 6 2019.
Jitendra Kumar and Ashutosh Kumar Singh . An efficient machine learning approach for virtual ma-chine
resource demand prediction. International Journal of Advanced Science Technology, 123:21–30, 2019.
Jitendra Kumar and Ashutosh Kumar Singh . Adaptive learning based prediction framework for cloud
datacenter networks' workload anticipation. Journal of Information Science and Engineering, 36:981–992, 2020.
Jitendra Kumar and Ashutosh Kumar Singh . Cloud datacenter workload estimation using error preventive time
series forecasting models. Cluster Computing, 23:1363–1379, 6 2020.
Jitendra Kumar and Ashutosh Kumar Singh . Decomposition based cloud resource demand prediction using
extreme learning machines. Journal of Network and Systems Management, 28:1775–1793, 10 2020.
Jitendra Kumar and Ashutosh Kumar Singh . Performance assessment of time series forecasting models for
cloud datacenter networks' workload prediction. Wireless Personal Communications, 116:1949–1969, 2 2021.
Jitendra Kumar , Ashutosh Kumar Singh , and Rajkumar Buyya . Ensemble learning based predictive
framework for virtual machine resource request prediction. Neurocomputing, 397:20–30, 7 2020.
Jitendra Kumar , Ashutosh Kumar Singh , and Rajkumar Buyya . Self directed learning based workload
forecasting model for cloud resource management. Information Sciences, 543:345–366, 1 2021.
Jitendra Kumar , Ashutosh Kumar Singh , and Anand Mohan . Resource-efficient load-balancing framework for
cloud data center networks. ETRI Journal, 43: 53–63, 2 2021.
Mohit Kumar and S. C. Sharma . Dynamic load balancing algorithm to minimize the makespan time and utilize
the resources effectively in cloud environment. International Journal of Computers and Applications, pages
1–10, Nov 2017.
P. Ravi Kumar , P. Herbert Raj , and P. Jelciana . Exploring Data Security Issues and Solutions in Cloud
Computing. Procedia Computer Science, 125:691–697, Jan 2018.
J. K. Lenstra and A. H. G. Rinnooy Kan . Complexity of vehicle routing and scheduling problems. Networks,
11(2):221–227, 2006.
L. Lerman and O. Markowitch . Efficient profiled attacks on masking schemes. IEEE Transactions on
Information Forensics and Security, 14(6):1445–1454, June 2019.
Xin Li , Zhuzhong Qian , Sanglu Lu , and Jie Wu . Energy efficient virtual machine placement algorithm with
balanced and improved resource utilization in a data center. Mathematical and Computer Modelling,
58(5):1222–1235, 2013.
Lingyun Yang , I. Foster , and J. M. Schopf . Homeostatic and tendency-based CPU load predictions. In
Proceedings International Parallel and Distributed Processing Symposium, pages 1–9. IEEE Comput. Soc, Apr
2003.
Ang Ee Mae , Wee Kuok Kwee , Pang Ying Han , and Lau Siong Hoe . Resource Allocation for Real-time
Multimedia Applications in LTE's Two-level Scheduling Framework. International Journal of Computer Science,
43(4):1–11, 2016.
Spyros Makridakis , Steven C. Wheelwright , and Rob J. Hyndman . Forecasting: Methods and Applications.
Wiley, 3 edition, 1 1998.
Valter Rogério Messias , Julio Cezar Estrella , Ricardo Ehlers , Marcos José Santana , Regina Carlucci
Santana , and Stephan Reiff-Marganiec . Combining time series prediction models using genetic algorithm to
autoscaling web applications hosted in the cloud infrastructure. Neural Computing and Applications,
27(8):2383–2406, Nov 2016.
E. Mezura-Montes and Carlos A. Coello Coello . An empirical study about the usefulness of evolution strategies
to solve constrained optimization problems. International Journal of General Systems, 37(4):443–473, 2008.
L. Minas and B. Ellison . Energy Efficiency for Information Technology: How to Reduce Power Consumption in
Servers and Data Centers. Intel Press, 2009.
Banaja Mohanty and Sasmita Tripathy . A teaching learning based optimization technique for optimal location
and size of DG in distribution network. Journal of Electrical Systems and Information Technology, 3(1):33–44,
2016.
Sathyan Munirathinam and B. Ramadoss . Big data predictive analtyics for proactive semiconductor equipment
maintenance. In 2014 IEEE International Conference on Big Data (Big Data), pages 893–902. IEEE, Oct 2014.
Sathyan Munirathinam and Balakrishnan Ramadoss . Predictive Models for Equipment Fault Detection in the
Semiconductor Manufacturing Process. International Journal of Engineering and Technology, 8(4):273–285,
Apr 2016.
San Murugesan . Cloud computing: A new paradigm in IT that has the power to transform emerging markets.
International Journal on Advances in ICT for Emerging Regions, 4(2):4–11, Oct 2008.
Nong Nurnie , Mohd Nistah , King Hann Lim , Lenin Gopal , Firas Basim , and Ismail Alnaimi . Coal-Fired Boiler
Fault Prediction using Artificial Neural Networks. International Journal of Electrical and Computer Engineering
(IJECE), 8(4):2486–2493, 2018.
Eva Patel and Dharmender Singh Kushwaha . Analysis of workloads for cloud infrastructure capacity planning.
In Lakhmi C. Jain , Valentina E. Balas , and Prashant Johri , editors, Data and Communication Networks, pages
29–42. Springer Singapore, Singapore, 2019.
G Pavai and TV Geetha . A survey on crossover operators. ACM Computing Surveys (CSUR), 49(4):72, 2017.
Satish Penmatsa , Gurdeep S Hura , and Princess Anne . Adaptive Cost Optimization and Fair Resource
Allocation in Computational Grid Systems. In 29th International Conference on Computer Applications in
Industry and Engineering (CAINE 2016), pages 1–6, Denver, Colorado, USA, 2016.
V. P. Plagianakos , D. K. Tasoulis , and M. N. Vrahatis . A Review of Major Application Areas of Differential
Evolution, pages 197–238. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
J. J. Prevost , K. Nagothu , B. Kelley , and M. Jamshidi . Prediction of cloud data center networks loads using
stochastic and neural models. In 2011 6th International Conference on System of Systems Engineering, pages
276–281, June 2011.
Kenneth V Price. Differential evolution: a fast and simple numerical optimizer. In Fuzzy Information Processing
Society, 1996. NAFIPS., 1996 Biennial Conference of the North American, pages 524–527. IEEE, June 1996.
K.V. Price , R.M. Storn , and J.A. Lampinen . Differential Evolution: A Practical Approach to Global
Optimization. Natural Computing. Springer London, Limited, 2005.
A. K. Qin and P. N. Suganthan . Self-adaptive differential evolution algorithm for numerical optimization. In 2005
IEEE Congress on Evolutionary Computation, volume 2, pages 1785–1791, Sep. 2005.
Dang Minh Quan , Federico Mezza , Domenico Sannenli , and Raffaele Giafreda . T-alloc: A practical energy
efficient resource allocation algorithm for traditional data centers. Future Generation Computer Systems,
28(5):791–800, 2012. Special Section: Energy efficiency in large-scale distributed systems.
P Herbert Raj , P Ravi Kumar , and P Jelciana . Mobile Cloud Computing: A survey on Challenges and Issues.
International Journal of Computer Science and Information Security, 14(12):165–170, 2016.
R.V. Rao , V.J. Savsani , and D.P. Vakharia . Teaching-learning based optimization: A novel method for
constrained mechanical design optimization problems. Computer-Aided Design, 43(3):303–315, 2011.
Esmat Rashedi , Hossein Nezamabadi-Pour , and Saeid Saryazdi . GSA: A gravitational search algorithm.
Information Sciences, 179(13):2232–2248, 2009.
Charles Reiss , John Wilkes , and Joseph L. Hellerstein . Google cluster-usage traces: format + schema.
Technical report, Google Inc., Mountain View, CA, USA, November 2011.
I. Rodríguez-Fdez , A. Canosa , M. Mucientes , and A. Bugarín . STAC: A web platform for the comparison of
algorithms using statistical tests. In 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE),
pages 1–8, Aug 2015.
Deepika Saxena and Ashutosh Kumar Singh . Auto-adaptive learning-based workload forecasting in dynamic
cloud environment. International Journal of Computers and Applications, 2020.
Deepika Saxena and Ashutosh Kumar Singh . Security embedded dynamic resource allocation model for cloud
data centre. Electronics Letters, 56:1062–1065, 9 2020.
Deepika Saxena and Ashutosh Kumar Singh . Energy aware resource efficient-(EARE) server consolidation
framework for cloud datacenter. In Lecture Notes in Electrical Engineering, volume 668, pages 1455–1464.
Springer, 2021.
Deepika Saxena and Ashutosh Kumar Singh . A proactive autoscaling and energy-efficient VM allocation
framework using online multi-resource neural network for cloud data center. Neurocomputing, 426:248–264, 2
2021.
Deepika Saxena , Ashutosh Kumar Singh , and Rajkumar Buyya . OP-MLB: An online VM prediction based
multi-objective load balancing framework for resource management at cloud datacenter. IEEE Transactions on
Cloud Computing, 2021.
Stefano Secci and San Murugesan . Cloud Networks: Enhancing Performance and Resiliency. Computer,
47(10):82–85, Oct 2014.
N. K. Sharma and G. R. M. Reddy . Multi-objective energy efficient virtual machines allocation at the cloud data
center. IEEE Transactions on Services Computing, 12(1):158–171, Jan 2019.
Vartika Sharma , Sizman Kaur , Jitendra Kumar , and Ashutosh Kumar Singh . A fast parkinson's disease
prediction technique using PCA and artificial neural network. In 2019 International Conference on Intelligent
Computing and Control Systems, ICCS 2019, pages 1491–1496. Institute of Electrical and Electronics
Engineers Inc., 5 2019.
Ashutosh Kumar Singh and Jitendra Kumar . Secure and energy aware load balancing framework for cloud
data centre networks. Electronics Letters, 55: 540–541, 2019.
Ashutosh Kumar Singh and Deepika Saxena . A cryptography and machine learning based authentication for
secure data-sharing in federated cloud services environment. Journal of Applied Security Research, 2021.
Ashutosh Kumar Singh , Deepika Saxena , Jitendra Kumar , and Vrinda Gupta . A quantum approach towards
the adaptive prediction of cloud workloads. IEEE Transactions on Parallel and Distributed Systems, pages 1–1,
2021.
Niharika Singh and Ashutosh Kumar Singh . Data privacy protection mechanisms in cloud. Data Science and
Engineering, 3:24–39, 3 2018.
Rainer Storn and Kenneth Price . Differential evolution: A simple and efficient heuristic for global optimization
over continuous spaces. J. of Global Optimization, 11(4):341–359, December 1997.
M. Tang , M. Luo , J. Zhou , Z. Yang , Z. Guo , F. Yan , and L. Liu . Side-channel attacks in a real scenario.
Tsinghua Science and Technology, 23(5):586–598, Oct 2018.
Ruey S. Tsay . Time series and forecasting: Brief history and future research. Journal of the American
Statistical Association, 95(450):638–643, 2000.
Manu Vardhan , Shrabani Mallick , Shakti Mishra , and D. S. Kushwaha . A Demand Based Load Balanced
Service Replication Model. Journal on Computing, 2(4):5–10, 2018.
Frank Wilcoxon . Individual comparisons by ranking methods. Biometrics Bulletin, 1(6):80–83, 1945.
Bo K Wong , Thomas A Bodnovich , and Yakup Selvi . Neural network applications in business: A review and
analysis of the literature (1988–1995). Decision Support Systems, 19(4):301–320, 1997.
Alden H Wright . Genetic algorithms for real parameter optimization. In Foundations of genetic algorithms,
volume 1, pages 205–218. Elsevier, 1991.
R. Xu , L. Zhu , A. Wang , X. Du , K. R. Choo , G. Zhang , and K. Gai . Side-channel attack on a protected RFID
card. IEEE Access, 6:58395–58404, 2018.
Preetesh K. Yadav , Sourav Pareek , Saif Shakeel , Jitendra Kumar , and Ashutosh Kumar Singh .
Advancements and security issues of IoT cyber physical systems. In 2019 International Conference on
Intelligent Computing and Control Systems, ICCS 2019, pages 940–945. Institute of Electrical and Electronics
Engineers Inc., 5 2019.
Xin-She Yang . Nature-Inspired Metaheuristic Algorithms. Luniver Press, 2008.
Xin She Yang and Xingshi He . Firefly algorithm: recent advances and applications. International Journal of
Swarm Intelligence, 1(1):36–50, 2013.
Q. Zhang , L. T. Yang , Z. Yan , Z. Chen , and P. Li . An efficient deep learning model to predict cloud workload
for industry informatics. IEEE Transactions on Industrial Informatics, 14(7):3170–3178, 2018.
Xinqian Zhang , Tingming Wu , Mingsong Chen , Tongquan Wei , Junlong Zhou , Shiyan Hu , and Rajkumar
Buyya . Energy-aware virtual machine allocation for cloud with resource reservation. Journal of Systems and
Software, 147:147–161, 2019.