Please wait a minute...
JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE)
Service Computing     
Research on sub-health in cloud environment
YOU Lu-jin, LU Xing-jian, HE Gao-qi
1. College of Electronics and Information Engineering, Tongji University, Shanghai 200233, China;
2. School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China; 
3. Smart City Collaborative Innovation Center, Shanghai Jiao Tong University, Shanghai 200240, China
Download:   PDF(1130KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

Diagnosis and analysis of sub-health status in cloud environment is a key problem of cloud environment health assessment and analysis. A series of measurable and quantifiable indicators and models are urgently required for the theoretical analysis and system evaluation of sub-health status in cloud environment. The definition and connotation of sub-health status in cloud environment were proposed; the knowledge structure that was summarized, in terms of the standard and evaluation system of cloud health, and the formal model, diagnosis and analysis, and the treatment of sub-health status in cloud environment. The existing work on cloud environment sub-health was also summarized, in terms of cloud monitoring, cloud architecture, cloud platform performance evaluation and analysis, energy control, and cloud security.



Published: 11 June 2017
CLC:  TP 393  
Cite this article:

YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1181-1189.


云环境亚健康研究

云环境亚健康状态诊断与分析是云环境健康状况评估领域亟待解决的关键难题,迫切需要一套可度量、可量化的指标和模型来进行云环境亚健康状态的理论分析与系统评估.结合医学领域亚健康的概念及模型,提出云环境亚健康状态的定义及内涵,并从云环境健康标准及测评体系、云环境亚健康状态形式化模型、云环境亚健康状态诊断及分析、云环境亚健康状态治疗等方面总结云环境亚健康研究的知识结构;从云监控、云架构、云平台性能评价与分析、云平台能耗控制、云安全等方面对云环境亚健康相关的研究现状进行总结与分析.

参考文献(References):
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1): 71-83.
QIN Deng-guo, ZHANG Min, ZHANG Yan, et al. Cloud computing security research [J]. Journal of Software, 2011, 22 (1): 71-83.
[2] 赵瑞芹,宋振峰.亚健康问题的研究进展[J].国外医学:社会学分册,2002,21(4): 10-13.
ZHAO Rui-qin, SONG Zhen-feng. The research progress of sub health problems [J]. Foreign Medical Sciences: Section of Social Medicine, 2002, 21 (41):10-13.
[3] 倪红梅,方盛泉,何裕民,等.试析亚健康状态与心身病证的相关性[J].上海中医药大学学报,2008,22(1):13-15.
NI Hong-mei, FANG Sheng-quan, HE Yu-min, et al. Correlation analysis of sub-health status and psychosomatic diseases [J]. Journal of Shanghai University of Traditional Chinese Medicine, 2008, 22 (1): 13-15.
[4] 贾平.关注网络的“亚健康”[J].兵团教育学院学报,2004,14(2): 78-79.
JIA Ping. Concern on the sub-health state of networks [J]. Journal of Bingtuan Education Institute, 2004,14 (2): 78-79.
[5] 黄大荣,汪鹏.网络系统“亚健康”状态的性能退化评估模型[J].南京航空航天大学学报,2011,43(7): 60-63.
HUANG Da-rong, WANG Peng. Performance degradation assessment model of "sub health" state of network system [J]. Journal of Nanjing University of Aeronautics and Astronautics, 2011, 43 (7): 60-63.
[6] 王光辉,王琦,薛俊宏,等.亚健康干预的现状与进展[J].世界中西医结合杂志,2010,5(10): 908-913.
WANG Guang-hui, WANG Qi, XUE Jun-hong, et al. Current situation and development of sub health intervention [J]. World Journal of Integrated Traditional and Western Medicine, 2010, 5(10): 908-913.
[7] 胡镜清,江丽杰,彭锦,等.现代医学模式下亚健康概念特征属性的思考及意义[J].中国中医基础医学杂志,2011,17(6): 683-690.
HU Jing-qing, JIANG Li-jie, PENG Jin, et al. Thinking and meaning of the characteristics of subhealth concept in modern medical mode [J]. China Journal of Basic Medicine in Traditional Chinese Medicine, 2011, 17 (6): 683-690.
[8] 黄鹂,原嘉民,欧爱华,等.基于决策树的亚健康状态影响因素模型[J].使用医学杂志,2011,27(1): 121-124.
HUANG Li, YUAN Jia-min, OU Ai-hua, et al. Influence factors model of sub health state based on decision tree [J]. The Journal of Practical Medicine, 2011,27(1): 121-124.
[9] 王利敏,曲彬彬,赵歆,等.基于结构方程模型的亚健康状态中医症候量化分析研究[J].中华中医药杂志,2011, 26(5): 1033-1036.
WANG Li-min, QU Bin-bin, ZHAO Xin, et al. Quantitative analysis and research of TCM symptoms of sub-health status based on the structural equation model [J]. China Journal of Traditional Chinese Medicine and Pharmacy, 2011, 26(5): 1033-1036.
[10] 罗晓芳.基于模糊集与神经网络的亚健康诊断[J].杭州师范学院学报,2004,3(2): 105-109.
LUO Xiao-fang. Diagnosis of the quasi-health state based on the fuzzy sets and neural networks [J]. Journal of Hangzhou Teachers College, 2004, 3(2):105-109.
[11] 林森.复杂系统评价方法研究——以科研系统评价为例[D].山东:青岛大学, 2007.
LIN Sen. Research on the evaluation method of complex systems: taking the evaluation of scientific research system as an example [D]. Shandong: Qingdao University, 2007.
[12] 郭东强, 王志江. 管理信息系统综合评价的数学模型\[J\]. 运筹与管理, 2000,9(3): 74-80.
GUO Dong-qiang,WANG Zhi-jiang. The mathematical model of thecomprehensive evalua tion on MIS. Operations Research and Management Science[J]. 2000,9(3): 74-80.
[13] 闵文杰,陈建明,张仲义.信息系统评价指标体系及方法的研究[J].铁道学报,2000,22(5): 37-41.
MIN Wen-jie, CHEN Jian-ming, ZHANG Zhong-yi. Research on index system and method of information system evaluation [J]. Railway Transaction, 2000,22(5): 37-41.
[14] 汤志伟,符萍.基于小波神经网络的信息系统综合评价模型[J].电子科技大学学报,2005, 34(5): 672-675.
TANG Zhiwei, FU Ping. Integrated evaluation model of information system based on wavelet neural network [J]. Journal of University of Electronic Science and Technology of China, 2005, 34(5): 672-675.
[15] BALSAMO S, MARCO A D, INVERARDI P, et al. Modelbased performance prediction in software development: a survey [J], IEEE Transactions on Software Engineering, 2004, 30(5): 295-310.
[16] LIU X, ZHU X, SINGHAL S, et al. Adaptive entitlement control of resource containers on shared Servers [C] ∥ Proceedings of 9th IFIP/IEEE International Symposium on Integrated Network Management. Nice: IEEE, 2005: 163-176.
[17] XING F, YOU H, LU C D. Statistical performanceanalysis for scientific applications [C] ∥ ACM Conference on Extreme Science and Engineering Discovery Environment. Atlanta: ACM, 2014: 1-8.
[18] SHEN S, VAN BEEK V, IOSUP A. Statistical characterization of business-critical workloads hosted in cloud datacenters [C] ∥ IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Shenzhen: IEEE, 2015: 465-474.
[19] OZISIKYILMAZ B, MEMIK G, CHOUDHARY A. Machine learning models to predict performance of computer system design alternatives [C] ∥ Proceedings of the 37th International Conference on Parallel Processing, Portland: IEEE, 2008: 495-502.
[20] GANAPATHI A, KUNO H, DAYAL U, et al. Predicting multiple metrics for queries: better decisions enabled by machine learning [C] ∥ Proceedings of the 2009 IEEE International Conference on Data Engineering. Shanghai: IEEE, 2009: 592-603.
[21] KWONG R H, YONGE-MALLO D L. Fault diagnosis in discrete-event systems with incomplete models: learnability and diagnosability [J]. IEEE Transactions on Cybernetics, 2015, 45(7): 1236-1249.
[22] 欧阳丹彤,李江娜,耿雪娜.离散事件系统故障的极小观测序列[J].湖南大学学报:自然科学版,2016,43(4): 147-152.
OU YANG Dan-tong, LI Jiang-na, GENG Xue-na. Minimal observation sequence of discrete event system fault [J]. Journal of Hunan University: Natural Science Edition, 2016, 43(4): 147-152.
[23] Google App Engine. Google Inc. [EB/OL]. [2017-01-10]. http:∥code.google.com/appengine/.
[24] Cloudstatus. Hyperic Inc. [EB/OL].[2017-01-10]. http:∥www.cloudstatus.com/.
[25] WARD J S, BARKER A. Observing the clouds: a survey and taxonomy of cloud monitoring [J]. Journal of Cloud Computing, 2014, 3(1): 1-30.
[26] ALHAMAZANI K, RANJAN R, MITRA K, et al. An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J]. Computing, 2013, 97(4): 357-377.
[27] HUANG H, WANG L. P&P: a combined pushpull model for resource monitoring in cloud computing environment [C] ∥ IEEE 3rd International Conference on Cloud Computing. Miami: IEEE, 2010: 260-267.
[28] LI D Z, LIU J H, DONG X, et al. Application-oriented cloud monitoring data distribution mechanism [J]. Journal of Shanghai Jiaotong University, 2015, 20(2): 149-155.
[29] BRUMMETT T, SHEINIDASHTEGOL P, SARKAR D, et al. Performance metrics of local cloud computing architectures [C] ∥ IEEE International Conference on Cyber Security and Cloud Computing. New York: IEEE, 2015: 25-30.
[30] CAO B Q, LI B, XIA Q M. A service-oriented qos-assured and multiagent cloud computing architecture [J]. Cloud Computing, 2009: 644-649.
[31] PAPAZOGLOU M P, VAN D H W. Blueprinting the cloud [J]. IEEE Internet Computing, 2011, 15(6):74-79.
[32] COOPER B F, SILBERSTEIN A, TAM E, et al. Benchmarking cloud serving systems with YCSB [C] ∥ Proceedings of ACM Symposium on Cloud Computing. Indianapolis: ACM, 2010: 143-154.
[33] CHHETRI M B, CHICHIN S, VO Q B, et al. Smart CloudBench: a framework for evaluating cloud infrastructure performance [J]. Information Systems Frontiers, 2016, 18(3): 413-428.
[34] HWANG K, BAI X, SHI Y, et al. Cloud performance modeling with benchmark evaluation of elastic scaling strategies [J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(1): 130-143.
[35] CHEN P, XIA Y, PANG S, et al. A probabilistic model for performance analysis of cloud infrastructures [J]. Concurrency and Computation Practice and Experience, 2015, 27(17): 4784-4796.
[36] HEALTH T, DINIZ B, CARRERA E V, et al. Energy conservation in heterogeneous server clusters [C] ∥ Proceedings of the ACM SIGPLAN Symp osium on Principles and Practice of Parallel Programming. Chicago: ACM, 2005: 186-195.
[37] CHEN G, HE W B, LIU J, et al. Energy-Aware server provisioning and load dispatching for connectionintensive Internet services [C] ∥ Proceedings of the NSDI. San Francisco: ACM, 2008: 337-350.
[38] 基于电压动态调整技术设计的启发式调度算法. [EB/OL]. [2010-3-26]. http:∥www.searchdatacenter.com.cn/showcontent_33068.htm.
[39] GHOR HE,CHETTO M. EDeg-fs: a heuristic for scheduling and dynamic power management in embedded energy harvesting systems with DVFS facilities [C] ∥2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), Dubai: WASET, 2015: 1-6.
[40] PADALA P, ZHU X Y, WANG Z K, et al. Performance evaluation of virtualization technologies for server consolidation[J].Virtualization with VMware Esx Server, 2007(9): 161-196.
[41] SONG Y, ZHANG Y W, SUN Y Z, et al. Utilityanalysis for Internet-oriented server consolidation in VM-based data centers [C]∥ Proceedings of the CLUSTER, New Orleans: IEEE, 2009: 1-10.
[42] 宋杰,李甜甜,阎振兴,等.一种云计算环境下的能效模型和度量方法[J].软件学报,2012, 23(2): 200-214.
SONG Jie, ZHANG Tian-tian, YAN Zhen-xing, et al. A model of energy efficiency and measurement method in cloud computing environment [J]. Journal of Software, 2012, 23(2): 200-214.
[43] OpenSolaris VPC Gateway. Oracle Inc. [EB/OL]. (2009-12-07) [2017-01-10]. http:∥kenai.com/projects/osolvpc/pages/Home.
[44] MEDHIOUB M, HAMDI M, KIM T H. Requirements capture and comparative analysis of cloud security techniques [J]. International Journal of Grid and Distributed Computing, 2015, 8(2): 285-308.
[45] SONI D, PATEL H. Privacy preservation using novel identity management scheme in cloud computing [C] ∥ Fifth International Conference on Communication Systems and Network Technologies. Gwalior: IEEE 2015: 714-719.
[46] MUHAMMAD A, SHAKEEL H. Virtualization security: analysis and open challenges [J]. International Journal of Law and Information Technology, 2015,8(2): 237-246.
[47] RAJ H, NATHUJI R, SINGH A, et al. Resource management for isolation enhanced cloud services [C] ∥ Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago: ACM, 2009: 77-84.
[48] SEN P, SAHA P, KHATUA S. A distributed approach towards trusted cloud computing platform [C] ∥ Applications and Innovations in Mobile Computing. Kolkata: IEEE, 2015: 146-151.

[1] Yi-xuan ZHANG,Jian GONG. Multi-layer domain name detection and measurement based on DNS traffic[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(12): 2423-2429.
[2] Hai-xiu CHENG,Guan-lin LI,Ling ZHANG. Dynamic resource reservation algorithm for core network video business with bandwidth reduction based on time slot[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(9): 1746-1752.
[3] Dong LI,Yu LU,Jun-qing YU. Security of source address validation improvement binding table in software defined network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1543-1549.
[4] Qiu-yun WU,Wei DING. Analysis of Internet scanning behavior based on dynamic dark network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1550-1556.
[5] Ping QI,Hong SHU. Task offloading strategy considering terminal mobility in medical wisdom scenario[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(6): 1126-1137.
[6] Yi-han LUO,Jie-ren CHENG,Xiang-yan TANG,Ming-wang OU,Tian WANG. Early warning model of DDoS attack situation based on adaptive threshold[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 704-711.
[7] Wei CHEN,Xue-jiao LIU,Ying-jie XIA. Multi-factor reputation evaluation model based on analytic hierarchy process in vehicle Ad-hoc networks[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 722-731.
[8] ZHANG Xin-xin, XU Ke, ZHONG Yi-Feng, SU Hui. Evolutionary game analysis on cooperative behaviors of  internet service providers[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1214-1224.
[9] LI Jian-li, DING Ding, LI Tao. Multi-objective hybrid cloud task scheduling using twice clustering[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1233-1241.
[10] WANG Yu-xiang, LI Sheng-jie, WANG Hao, MA Jun-yi, WANG Ya-sha, ZHANG Da-qing. Survey on Wi-Fi based contactless activity recognition[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 648-654.
[11] QIAN Liang-fang, ZHANG Sen-lin, LIU Mei-qin. Reservation-based MAC protocol for underwater wireless sensor networks with data train[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 691-696.
[12] LI Xiao-dong, ZHU Yue-fei, LIU Sheng-li, XIAO Rui-qing. Permission-based Android application security evaluation method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 590-597.
[13] HUANG Yan, WANG Peng, XIE Gao hui, AN Jun xiu. Data center energy cost optimization in smart grid: a review[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(12): 2386-2399.
[14] YU Yang,XIA Chun he,YUAN Zhi chao,LI Zhong. Trust bootstrapping model for computer network collaborative defense system[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(9): 1684-1694.
[15] QI Ping, LI Long shu, LI Xue jun. Cloud resource scheduling algorithm with failure recovery mechanism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(12): 2305-2315.