Skip to main content
Computational Intelligence and Neuroscience logoLink to Computational Intelligence and Neuroscience
. 2022 May 12;2022:4343476. doi: 10.1155/2022/4343476

Chaotic Salp Swarm Optimization-Based Energy-Aware VMP Technique for Cloud Data Centers

S Parthiban 1, A Harshavardhan 2, S Neelakandan 3, Vempaty Prashanthi 2, Abdul-Rasheed Akeji Alhassan Alolo 4,, S Velmurugan 5
PMCID: PMC9119772  PMID: 35602619

Abstract

The amount of energy required by Cloud Data Centers (CDCs) has increased significantly in this digital age, and as a result, there is a pressing need to reduce CDC energy ingesting. Consolidation of virtual machines (VMs) and effective virtual machine placement (VMP) techniques are commonly employed in large data middles to reduce energy consumption. The VMP is an NP-hard subject with infeasible optimum explanations even for tiny data middles, and it is dealt with using the Metaheuristic Optimization Algorithm, which is an experiential approach to optimization. With this in mind, this study introduces a novel energy-aware VMP technique for CDCs that is founded on the Disordered Salp Swarm Optimization Algorithm (EAVMP-CSSA) and is enhanced for energy efficiency (EAVMP-CSSA). The EAVMP-CSSA technique attempts to reduce CDC energy ingesting by dropping the quantity of active servers supporting virtual machines. The recommended EAVMP-CSSA strategy also aims to balance the resource operation of active servers (i.e., CPU, RAM, and Bandwidth), hence reducing waste and increasing efficiency. Furthermore, by combining the ideas of chaotic maps with the standard Salp Swarm Optimization Algorithm (SSA), the CSSA is intended to improve overall performance and reduce computational costs (SSA). A comprehensive range of experimental analyses are performed to ensure that the EAVMP-CSSA technique performs better, and the findings are compared to current VMP techniques. The EAVMP-CSSA approach achieves an effective outcome with a maximum service rate of 98.12%, whereas the Random, FFD, ACO, and AP-ACO procedures achieve a minimum service rate of 74.40%, 78.80%, 90.70%, and 96.31%, respectively. The experimental results demonstrate that the EAVMP-CSSA approach outperforms other assessment metrics.

1. Introduction

Cloud Computing (CC) is one of the effective computing modules that delivers and hosts a broad variety of services via Internet. Several enterprises are based on cloud framework instead of in-house framework for the benefits provided by cloud platforms like removing maintenance burden, attaining on demand scalability, and pay as you go pricing module [1]. The data center is utilized in the cloud platforms for providing cloud services that consumes a huge amount of energy for its processes. An overview of CC perfect is shown in Figure 1. The information center is generally equipped with huge number of physical attendants. Nearly 60% of the overall liveliness ingesting in information midpoint originate from the IT framework that is managed using Physical Machines (PMs). Thus, reducing the number of lively PMs in a data center would greatly enhance the less vigor operation rate. Virtualization is one of the advanced techniques where the CC assets are given to clients through limitless amount of Virtual Machine (VM) depending upon a group of Service Level Agreements (SLAs) among cloud customers and providers [2]. Virtualization performs a critical part in attaining energy efficiency and high server consumption as numerous VMs are assigned to the same corporeal attendant. In a virtualized cloud platform, a sufficient quantity of active attendants is placed based on the VM deployment [3]. Henceforth, utilizing an effective Virtual Machine Placement (VMP) method could attain major impact on a data centers' power utilization.

Figure 1.

Figure 1

Overview of cloud computing.

The VMP problem is similar to the resource allocation problems, concentrating on how to assign physical resources of PM to VM of users with their needs. The main problem in network virtualization is that the VMP problem has attained substantial interest recently. The multidimensional physical resource of the server in data center includes storage resources (Storage), computing resources (CPU), and memory resources (Memory) [4]. To assure the quality of service, it is essential that the server must have adequate multidimensional assets for the application it transports [5]. Through an additional development in transmission methods, it has increasingly different applications [6]. Particularly, memory-intensive, I/O-intensive, and computation-intensive applications coexist on the Internet recently. Apparently, the multiresource requirements vary from application to application. The computationally intensive task is starving for huge CPU prerequisite; however, it demands only small memory.

The VMP method attempts to discover optimum allocations of VM over PM to attain their objectives of the design [7]. Several design objectives are considered in the survey, for example, reducing SLA violation, improving the power utilization, optimizing resource consumption, and so on. The VMP problematic can be considered as an NP-hard optimization problematic. Thus, various metaheuristic methods like Biogeography-Based Optimization (BBO), Glowworm Swarm Optimization (GSO), and Firefly Algorithm (FA) are applied for generating effective solutions within the moderate time [8]. Though, numerous VMP techniques [9, 10] are presented for addressing the energy utilization optimization problem in cloud platforms; they ensure well-adjusted utilization of multidimensional assets amongst dynamic PMs. These methods might allocate distinct number of residual assets for all resource types of PM. In expectation with upcoming demands, the resource left on every PMs must be balanced. Otherwise, the unbalanced residual resources might be avoided by the other VMPs, which leads to wastage of computing resource.

This study designs VMP approach using Chaotic Salp Swarm Optimization Algorithm (EAVMP-CSSA) for Cloud Data Centers (CDCs). The design of CSSA for the optimal placement of VMs shows the novelty of the work. The EAVMP-CSSA technique intends to effectively utilize the energy at the CDCs by reducing the active server count hosting VMs and turning off the idle ones. The planned EAVMP-CSSA technique derives a Fitness Function to achieve minimization of the complete liveliness ingesting of the cloud information servers with minimal resource wastage. Furthermore, it accomplishes the balanced utilization of multiple resources of the active sources to minimalize the resource wastage. To highlight the improved performance of the proposed EAVMP-CSSA technique, a set of simulations are performed and the results are investigated under different aspects.

2. Prior Works on VMP Techniques

In Ramalingam and Mohan's work [11], a novel method is presented in accordance with the integration of hybrid optimization algorithms for optimum deployment in CDCs. The initial impartial of the projected method is to decrease the influence utilization of CDCs during the reduction of active PMs. The next aim is to reduce the resource consumption and manage resources by an optimum deployment of VM on PM in the CDC. Nabavi et al. [12] presented a multiobjective VMP system (consider VM as a fog task) for the ECDC is known as TRACTOR that uses an ABC optimization method for energy aware assignments of VM on PM. The projected system aims to reduce the network traffic of the related VMs and energy exploitation during the data center changes and PMs.

Alboaneen et al. [13] planned a novel metaheuristic technique for enhancing Joint Task Scheduling and VMP (JTSVMP) in CDC. The JTSVMP problems consists of two processes, namely, VM placement and task scheduling, that are processed as a combined problematic to be resolved by MOA method. The projected cooptimization procedure purposes to allocate task for the VM that has the minimum performance cost within the fixed limits and later deploy the chosen VM on maximum used PH within capability limit. Gharehpasha et al. [14] projected a novel method with an integration of the SCA and SSA as separate multiobjective and disordered function for a best VMP. The initial purpose of the projected method is to decrease the control utilization in CDCs by reducing the number of lively PMs.

In Abdel-Basset et al.'s work [15], a bandwidth-conscious VMP method has been presented based on the enhanced WOA hybridized by a novel BWAP. The projected study concentrates on improving the bandwidth when the other significant aspects like CPU and memory utilization are not considered. In addition, the power utilization optimization problem was not tackled. At last, Alresheedi et al. [16] presented a cross multiobjective VMP method based on SSA and SCA. The presented method is intended to enhance the SLA violation, MTBHS, and power utilization. The presented method is related to various metaheuristics, and the attained result supports its dominance. But the bandwidth has not been utilized while illustrating PMs and VMs. Additionally, the balanced utilization of multidimensional resources in physical server was not assured.

Wei et al. [17] presented an energy-effective VMP system that continued to decrease the control utilization and transmission cost on circulation conscious datacenter network. For solving this optimization problem, an enhanced ACO using adaptive variable set was proposed for balancing its strong searching ability and fast convergence. Torre et al. [18] presented a multi-impartial technique for active VMP that examines the live relocation method for concurrently improving the overcommitment ratio, migration energy, and resource waste. This optimization method utilizes a new evolution meta-experiential approach founded on the key populace method for approximating the Pareto-optimum set of VMP using better diversity and accuracy.

In Abohamama and Hamouda's work [19], a hybrid VMP method is presented in accordance with permutation-based GA and multidimensional supply conscious best appropriate distribution approach. The projected VMP method purposes at the minimum liveliness utilization amount of cloud datacenters by reducing the number of active servers that hosts VMs. In addition, the suggested VMP method tries to attain balanced application of multidimensional resources (Bandwidth, RAM, and CPU) of lively server that consecutively reduces the resource wastage. Wei et al. [20] balance the multiple resource application for alleviating resource fragmentation when increasing the service rate for VMP, thus avoiding excess of physical resource. For solving this biobjective optimization problem, they presented a joint bin packing heuristic and GA that attains an accurate optimum solution at low time complexity. Reducing the power cost and maintaining the QoS assurance are the two major objectives of this research [2, 18]. To effectively tackle this issue, the presented VM merging method reflects the present and upcoming consumption of possessions by the host Underload Detection (UP-PUD) and host Overload Detection (UP-POD) [19, 21]. The upcoming resource consumptions are precisely forecasted using Gray Markov-based method.

3. Background Information and Problem Statement

This section discusses the background details of PMs and VMs. Besides, the problem statement of the proposed model is as follows.

3.1. Physical Machines (PMs)

The data center contains m PMs P={p1,…, pm}. A resource capacity vector CVJ2=c1,,cv defines every PM pP, whereas each dimension k ∈ [1,  v] denotes the capability of all PM physical resources rk in the set R={r1,…, rv}. In a usual Cloud situation, R= {CPU, memory, disk, network}, abstracted using the virtualization technique [18]. This research emphasizes on memory and CPU, the most committed resource in data center that affects the VM migration [22, 23].

3.2. Virtual Machines (VMs)

They recognize dual groups of VMs that contribute to the deployment procedure. The received VMs are the novel VM, which increases the application or generate novel application placements. The hosted VM is now the running one [24, 25]. Together, they determine a set VM={vm1,…, vmn} deployed on enhanced subsets of PM PusedP. All vm ∈ VM contains two v‐dimensional vectors. Resource size vectorSVwn=s1,,sv denotes the quantity Sk of resource rk requested by the VM vm, using k ∈ [1,  v], Resource demand vectorDVvm,t=d1t,,dvt determines the vm task demands dk(t) for every resource rk at time instance t, through k ∈ [1, v].

3.3. Problem Statement

EAVMP The VSBPP could be summarized as follows: assume an established of inseparable substances by specific masses and established of containers through parameter size (or type), pack the entire items to the quantity of bins; thus, the amount of wasted space of the utilized bin is reduced. In this work, VMs and PHs are signified by the tierce greatest important capitals such as system bandwidth, the CPU, and memory [19, 26]. Given that “N” VMs and “M” PHs and the overall demand for the VM are lesser compared to the overall capabilities of PH. All VMs should be exactly allocated to one PM ((2) and (4)). All PMs should contain sufficient resources for the allocated VMs ((5)–(7). νcpui, νmemi, and νBWi represent the network bandwidth, the CPU, and memory demand of VMi, respectively. pcpuj, Pmemj, and pBwf denote the network bandwidth, the CPU, and memory capabilities of PHj, respectively. The overall procedure of VMP is publicized in Figure 2.

Figure 2.

Figure 2

General process involved in VMP.

The VMP problems could be equated as VSBPP.

Minimizej=1Mcjyj, (1)

subjected to

χij=1,if server PHj is allocated to VMi,0,Otherwise, (2)
yj=1,if  i=1Nxij10,Otherwise,, (3)
j=1Mxij=1, (4)
j,i=1Nνcpui×xijpcpuj, (5)
j,i=1Nνmemi×xijpmemj, (6)
j,i=1NνBWi×xijpBwj. (7)

Here, yj denotes the binary parameter that specifies whether PHj has VMs or not, cj represents the cost/wasted space of PM PHj, xij represents the binary parameter that specifies whether VMi is allocated to PHj or not, N indicates the overall VMs, and M represents the overall PMs, i ∈ {1,  2,…, N} and j ∈ {1,  2,…, M}.

4. Design of EAVMP-CSSA Technique

SSA is a recently presented metaheuristic algorithm that inspires the behaviour of salps in ocean. It is a class of Salpidae similar to that of jelly fish. It forages as well as navigates in a swarm that represents salp chain. SSA is a new kind of PSO that modules the salp cable [21, 27]. The salp populace has follower and leader salps. The location of every salp is in d dimension search space, where d denotes the quantity of parameters in a specific problematic, like additional group-built method. The present location course of n salp in the exploration interplanetary is Xj=[x1j, x2j,  x3j,…, xdj], j=1,2,…, n. The spearhead salp upgrades its location, and it is given by

Xi1=Fi+C1ubiuliC2+lbi,C30,FiC1ubiuliC2+lbi,C3<0, (8)

where Xi1 denotes the location of the spearhead salp in the ith measurement, Fi represents food location in the ith measurement, and ubi and lbi characterize higher and lesser boundaries in the ith measurement correspondingly. C1, C2, and C3 denote module coefficients. These coefficients are arbitrary values that are utilized for specific determinations [26, 27]. The initial coefficient C1 represents the balance between exploitation and exploration that denotes the primary variable in the method. C1 is determined by

C1=2e4t/Tmax2, (9)

where t denotes the present repetition and Tmax indicates the extreme number of repetitions. C2 and C3 represent arbitrary values created uniformly that lies between zero and one. The follower salp updates their position based on Newton's law of motion, and it is given by

Xik=12Xjk+Xik12k<n, (10)

where Xik denotes the location of kth supporter salp in the ith dimension and n represents the entire amount of salp subdivisions. The process involved in SSA is given in Algorithm 1. Population-based metaheuristic method shares different benefits that includes simplicity, scalability, and computation time reduction. But this method has two major drawbacks, namely, low convergence rate and recession in local optimal. A specific method to conquer this problem and improve the efficacy of meta experiential procedures is to place the disorder model. The disordered chart is applied rather than arbitrary values in PSO-based method for enhancing the convergence.

In this technique, the present chaotic-based SSA (CSSA) substitutes arbitrary variable quantity with disordered ones. CSSA utilizes chaotic map for adjusting the values of succeeding constant C2. The value of C2 could be substituted by the value of a suitable disordered chart at the present repetition, and it is given by

C2t=ωt, (11)

where ω(t) denotes the rate of disordered chart at tth repetition. Equation (8) could be rephrased with the novel rate of C2, and it is given by

Xi1=Fi+C1ubiuliωr+lbi,C30,FiC1ubiuliωr+lbi,C3<0. (12)

The chaos model is a popular numerical method utilized for analyzing the behavior of dynamic systems using crucial primary conditions. The specific method to show this behavior by utilizing chaotic map is moreover separate or else incessant. Disordered charts could be placed only for deterministic organizations using prediction performance. At present, confusion model turns more interesting in many streams like robotics, computer science, microbiology, and physics. The chaotic map becomes the robust solution for enhancing the efficiency of metaheuristic method with the enhancement of their arbitrary variables [2729]. This arbitrary parameter is extracted on the basis of unchanging or Gaussian delivery and hence they could be managed better by using the chaotic maps that share the similar characteristic through higher efficiency. Manage this parameter using a chaotic chart, and the local optimal is reduced, whereas the meeting is increased. The logistic chart is the optimal disordered chart for this optimizer based on the outcome of the optimization. Robert first presented the logistic chart on May 1, 1976, and it has been in use ever since. The following is the most commonly used formula for a logistic disordered map:

ωt+1=aωt1ωt,a=4, (13)

where ω(t) means the rate of disordered chart at tth repetition. The original disorder of the disordered charts is considered to be 0.7 (ω(0)=0.7).

Provided “N” VMs and “M” PMs, the EAVMP-CSSA technique recommends various variations for the VMs, which is required to be allocated to the existing PMs. The main objective of the EAVMP-CSSA technique is to decrease the total liveliness operation of the used PMs and thereby minimize the total cost of the cloud provider. The fitness function is given as follows.

Minimize fx=j=1Myj×PjbusyPjidle×Ujcpu+Pjidle, (14)

where f(x) signifies the entire liveliness utilization of the PMs, yj is a binary mutable that designates whether PHj comprises VMs or not, Pjbusy is the higher energy operation of PM PHj, Pjidle is the lower energy utilization of PM PHj(Pjidle ≈ 0.6∗Pjbusy), and Ujcpu is the CPU operation ratio of PM PHj, and it is given by

Ujcpu=i=1Nxij×νcpuipcpuj, (15)

where xij is the binary parameter indicating whether VMi is allocated to PHj or not, νcpui is the CPU demand of VM VMi, and pcpuj is the CPU volume of PM PHj.

Provided a VM which is to be allocated, the EAVMP-CSSA technique selects a PM which offers the capitals (CPU, memory, and system bandwidth) required by the VMs [7, 3032]. The EAVMP-CSSA technique chooses the PM with low-resource wastage after allocating to the present VM. In order to completely exploit the multidimensional resources, the following equation is used to determine the wasted resources.

Wj=2LjcpuLjmemLjBW+εUjcpu+Ujmem+UjBW, (16)

where Wj denotes the resource wastage of PM PHj.Ljcpu, Ljmem, and LjBW represent the normalized residual CPU, memory, and bandwidth of PM PHj, respectively. Ujcpu, Ujmem, and UjBW represent the regularized CPU, reminiscence, and bandwidth utilization of PM PHj correspondingly [33]. ε is an actual unimportant hopeful real number and the value is fixed to 0.0001. The aim of (16) is to successfully utilize the multidimensional resources and stability the residual possessions on every PM along distinct extent. Ujcpu is already represented in (15), while the rest of the rapports are represented as follows:

Ljcpu=pcpuji=1Nxij×νcpuipcpuj,Ljmem=pmemji=1Nxij×νmemipmemmj,LjBW=pBWJi=1Nxij×νBWipBWj,Ujmem=i=1Nxij×νmemipmemj,UjBW=i=1Nxij×νBWipBWj, (17)

where νcpui, νmemi, and νBWi signify the CPU, reminiscence, and system bandwidth anxieties of VMj correspondingly. pcpuj, pmemj, and pBWj signify the CPU, reminiscence, and network bandwidth dimensions of PHj correspondingly. xij is a binary adjustable representing whether VMj is allocated to PHj or not.

5. Performance Validation

This unit deals with the presentation analysis of the EAVMP-CSSA method with other prevailing methods in terms of different evaluation parameters. Table 1 and Figure 3 investigate the power consumption examination of the EAVMP-CSSA method with other methods under varying VMs. The experimental result highlights that the EAVMP-CSSA technique has attained a minimal power consumption over the other methods under distinct VMs.

Table 1.

Power consumption analysis of EAVMP-CSSA technique under varying VMs.

Power consumption (W)
No. of VMs EAVMP-CSSA AP-ACO ACO FFD Random

VM = 54 4817 5283 5399 5690 6853
VM = 81 5573 6039 6795 6911 8074
VM = 108 6097 6562 7376 7783 9121
VM = 135 6155 7144 8772 9063 13774
VM = 162 6504 7725 9005 9761 14472

Figure 3.

Figure 3

Comparative result analysis of EAVMP-CSSA technique in terms of power consumption.

For instance, with 54 VMs, the EAVMP-CSSA technique has attained a reduced power consumption of 4817 W whereas the AP-ACO, ACO, FFD, and Random techniques have achieved an increased power consumption of 5283 W, 5399 W, 5690 W, and 6853 W, respectively. Moreover, with 108 VMs, the EAVMP-CSSA technique has resulted a lower power consumption of 6097 W whereas the AP-ACO, ACO, FFD, and Random techniques have attained a higher power consumption of 6562 W, 7376 W, 7783 W, and 9121 W, respectively. Furthermore, with 162 VMs, the EAVMP-CSSA technique has attained a reduced power consumption of 6504 W whereas the AP-ACO, ACO, FFD, and Random techniques have achieved an increased power consumption of 7725 W, 9005 W, 9761 W, and 14472 W, respectively.

Table 2 and Figure 4 examine the communication cost examination of the EAVMP-CSSA method with other methods under varying VMs. The simulation values pointed out that the EAVMP-CSSA technique has gained the least communication cost over the other methods underneath variable VMs. For occurrence, with 54 VMs, the EAVMP-CSSA method has an effective outcome with the least communication cost of 41.24 W whereas the AP-ACO, ACO, FFD, and Random techniques have accomplished a higher communication cost of 45.83 W, 52.32 W, 56.91 W, and 64.55 W, respectively.

Table 2.

Communication cost analysis of EAVMP-CSSA technique under varying VMs.

Communication cost (watt)
No. of VMs EAVMP-CSSA AP-ACO ACO FFD Random

VM = 54 41.24 45.83 52.32 56.91 64.55
VM = 81 51.18 55.00 59.97 67.99 75.25
VM = 108 59.58 65.32 71.43 80.22 89.01
VM = 135 69.52 74.10 79.45 89.77 102.00
VM = 162 73.72 81.36 92.44 96.67 105.79

Figure 4.

Figure 4

Comparative result analysis of EAVMP-CSSA technique in terms of communication cost.

Eventually, with 108 VMs, the EAVMP-CSSA technique has gained a reduced communication cost of 59.58 W whereas the AP-ACO, ACO, FFD, and Random techniques have resulted an increased communication cost of 65.32 W, 71.43 W, 80.22 W, and 89.01 W, respectively. Meanwhile, with 162 VMs, the EAVMP-CSSA technique has demonstrated better performance with the minimal communication cost of 73.72 W whereas the AP-ACO, ACO, FFD, and Random techniques have accomplished a maximum communication cost of 81.36 W, 92.44 W, 96.67 W, and 105.79 W, respectively.

Table 3 and Figure 5 assess the time examination of the EAVMP-CSSA method with other methods under varying bandwidth. The found simulation result depicts that the EAVMP-CSSA method has occasioned with the larger presentation with minimum time over the other approaches under varying bandwidth. For instance, under 100 Mbps bandwidth, the EAVMP-CSSA technique has portrayed effectual performance with the lesser time of 1.62 s whereas the AP-ACO, ACO, FFD, and Random techniques have depicted a higher time of 2.77 s, 2.98 s, 3.18 s, and 3.78 s, respectively.

Table 3.

Running time analysis of EAVMP-CSSA technique under varying bandwidth.

Time (s)
Bandwidth (Mbps) EAVMP-CSSA AP-ACO ACO FFD Random

100 1.62 2.77 2.98 3.18 3.78
300 1.38 2.14 2.65 2.57 3.65
500 1.12 1.45 1.96 1.85 3.40
700 0.68 0.72 0.93 1.10 3.21
900 0.09 0.11 0.54 0.63 3.03

Figure 5.

Figure 5

Comparative result analysis of EAVMP-CSSA technique in terms of running time.

Additionally, with 500 Mbps bandwidth, the EAVMP-CSSA technique has demonstrated with the lesser time of 1.12 s whereas the AP-ACO, ACO, FFD, and Random techniques have taken an increased time of 1.45 s, 1.96 s, 1.85, and 3.40 s, respectively. At last, with 900 Mbps bandwidth, the EAVMP-CSSA technique has gained an optimal outcome with the minimal time of 0.09 s whereas the AP-ACO, ACO, FFD, and Random techniques have accomplished with the maximum time of 0.11 s, 0.54 s, 0.63 s, and 3.03 s, respectively.

Finally, a service rate examination of the EAVMP-CSSA method takes residence beneath varying number of VMs in Table 4 and Figure 6. The figure proves that the EAVMP-CSSA system has outperformed over the other methods with the maximum service rate for all the VMs. For instance, with 54 VMs, the EAVMP-CSSA technique attains an effectual outcome with the maximum service rate of 98.12% whereas the Random, FFD, ACO, and AP-ACO techniques have gained a minimum service rate of 74.40%, 78.80%, 90.70%, and 96.31%, respectively.

Table 4.

Service rate analysis of EAVMP-CSSA technique under varying VMs.

Service rate (%)
No. of VMs Random FFD ACO AP-ACO EAVMP-CSSA
VM = 54 74.40 78.80 90.70 96.31 98.12
VM = 81 53.54 57.10 72.90 79.10 84.20
VM = 108 51.30 54.80 57.80 61.60 66.70
VM = 135 46.20 49.90 53.20 59.50 62.10
VM = 162 38.00 42.10 51.20 54.80 59.20

Figure 6.

Figure 6

Comparative result analysis of EAVMP-CSSA technique in terms of service rate.

In the same way, with the presence of 162 VMs, the EAVMP-CSSA technique has illustrated proficient performance with an increased service rate of 59.20% whereas the Random, FFD, ACO, and AP-ACO methods have caused in the abridged service rate of 38%, 42.10%, 51.20%, and 54.80%, respectively. From the above benches and statistics, it is obvious that the EAVMP-CSSA method is originate to be an effective instrument for VMP in CDCs.

6. Conclusion

This paper has designed a novel EAVMP-CSSA method to achieve liveliness competence in CDCs. The EAVMP-CSSA method is mainly based on the design of CSSA with the integration of chaotic maps and conventional SSA. In addition, the EAVMP-CSSA technique derives an objective function to reduce energy utilization and resource wastage (e.g., CPU, RAM, and bandwidth). The proposed model has the ability to reduce the active server count by balancing the active servers that enables them to accommodate the upcoming VMP requests and eliminates the requirement of activating other servers. The performance of the EAVMP-CSSA technique is examined by the CloudSim tool and the results are investigated under different dimensions. The simulation results confirmed the betterment of the proposed EAVMP-CSSA technique over the recent state of art techniques. EAVMP-CSSA technique attains an effectual outcome with the maximum service rate of 98.12% whereas the Random, FFD, ACO, and AP-ACO techniques have gained a minimum service rate of 74.40%, 78.80%, 90.70%, and 96.31%, respectively. In the future, the design of EAVMP-CSSA technique can be extended to the design of task scheduling techniques to allocate resources in an optimal way. Besides, the presented technique can be employed to eradicate the overutilization of resources, which degrades the VM performance.

Algorithm 1.

Algorithm 1

Pseudocode of SSA.

Data Availability

The manuscript contains all of the data.

Conflicts of Interest

The authors state that they do not have any conflicts of interest.

References

  • 1.Abohamama A. S., Alrahmawy M. F., Elsoud M. A. Improving the dependability of cloud environment for hosting real time applications. Ain Shams Engineering Journal . 2018;9(4):3335–3346. doi: 10.1016/j.asej.2017.11.006. [DOI] [Google Scholar]
  • 2.Hsieh S.-Y., Liu C.-S., Buyya R., Zomaya A. Y. Utilization-prediction-aware virtual machine consolidation approach for energy-efficient cloud data centers. Journal of Parallel and Distributed Computing . 2020;139:99–109. doi: 10.1016/j.jpdc.2019.12.014. [DOI] [Google Scholar]
  • 3.Divyabharathi S. Large Scale Optimization to Minimize Network Traffic Using MapReduce in Big Data Applications. Proceedings of the International Conference on Computation of Power, Energy Information and Communication (ICCPEIC); April 2016; Melmaruvathur, India. pp. 193–199. [DOI] [Google Scholar]
  • 4.Qiu H., Noura H., Qiu M., Ming Z., Memmi G. A user-centric data protection method for cloud storage based on invertible dwt. IEEE Trans Cloud Comput . 2019;9 doi: 10.1109/TCC.2019.2911679. [DOI] [Google Scholar]
  • 5.Huang D., Du P., Zhu C., Zhang H., Liu X. Multi-resource packing for job scheduling in virtual machine based cloud environment. Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering; March 2015; Athens, Greece. pp. 216–221. [DOI] [Google Scholar]
  • 6.Liu L., Chen C., Pei Q., Maharjan S., Zhang Y. Vehicular edge computing and networking: a survey. Mobile Networks and Applications . 2020;26(3):1145–1168. doi: 10.1007/s11036-020-01624-1. [DOI] [Google Scholar]
  • 7.Neelakandan S., Berlin M. A., Tripathi S., Devi V. B., Bhardwaj I., Arulkumar N. IoT-based traffic prediction and traffic signal control system for smart city. Soft Computing . 2021;25(18) doi: 10.1007/s00500-021-05896-x.12241 [DOI] [Google Scholar]
  • 8.Yan J., Zhang H., Xu H., Zhang Z. Discrete PSO-based workload optimization in virtual machine placement. Personal and Ubiquitous Computing . 2018;22(3):589–596. doi: 10.1007/s00779-018-1111-z. [DOI] [Google Scholar]
  • 9.Alharbi F., Tian Y. C., Tang M., Zhang W. Z., Peng C., Fei M. An ant colony system for energy-efficient dynamic virtual machine placement in data centers. Expert Systems with Applications . 2019;120:228–238. doi: 10.1016/j.eswa.2018.11.029. [DOI] [Google Scholar]
  • 10.Paulraj D. An automated exploring and learning model for data prediction using balanced CA-svm. Journal of Ambient Intelligence and Humanized Computing . 2020;12:1–12. doi: 10.1007/s12652-020-01937-9. [DOI] [Google Scholar]
  • 11.Ramalingam C., Mohan P. Addressing semantics standards for cloud portability and interoperability in multi cloud environment. Symmetry . 2021;13(2):p. 317. doi: 10.3390/sym13020317. [DOI] [Google Scholar]
  • 12.Nabavi S. S., Gill S. S., Xu M., Masdari M., Garraghan P. TRACTOR: traffic-aware and power-efficient virtual machine placement in edge-CDCs using artificial bee colony optimization. International Journal of Communication Systems . 2021;35(6) doi: 10.1002/dac.4747.e4747 [DOI] [Google Scholar]
  • 13.Alboaneen D., Tianfield H., Zhang Y., Pranggono B. A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers. Future Generation Computer Systems . 2021;115:201–212. doi: 10.1016/j.future.2020.08.036. [DOI] [Google Scholar]
  • 14.Gharehpasha S., Masdari M., Jafarian A. Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm. Cluster Computing . 2021;24(2):1293–1315. doi: 10.1007/s10586-020-03187-y. [DOI] [Google Scholar]
  • 15.Abdel-Basset M., Abdle-Fatah L., Sangaiah A. K. An Improved Lévy Based Whale Optimization Algorithm for Bandwidth-Efficient Virtual Machine Placement in Cloud Computing Environment. Cluster Computer . 2019;22 doi: 10.1007/s10586-018-1769-z. [DOI] [Google Scholar]
  • 16.Alresheedi S. S., Lu S., Abd Elaziz M., Ewees A. A. Improved multiobjective salp swarm optimization for virtual machine placement in cloud computing. Human-centric Computing and Information Sciences . 2019;9(1):p. 15. doi: 10.1186/s13673-019-0174-9. [DOI] [Google Scholar]
  • 17.Wei W., Gu H., Lu W., Zhou T., Liu X. Energy efficient virtual machine placement with an improved ant colony optimization over data center networks. IEEE Access . 2019;7 doi: 10.1109/access.2019.2911914.60625 [DOI] [Google Scholar]
  • 18.Torre E., Durillo J. J., de Maio V., et al. A dynamic evolutionary multi-objective virtual machine placement heuristic for CDCs. Information and Software Technology . 2020;128 doi: 10.1016/j.infsof.2020.106390.106390 [DOI] [Google Scholar]
  • 19.Abohamama A. S., Hamouda E. A hybrid energy–aware virtual machine placement algorithm for cloud environments. Expert Systems with Applications . 2020;150 doi: 10.1016/j.eswa.2020.113306.113306 [DOI] [Google Scholar]
  • 20.Wei W., Wang K., Wang K., Gu H., Shen H. Multi-resource balance optimization for virtual machine placement in cloud data centers. Computers & Electrical Engineering . 2020;88 doi: 10.1016/j.compeleceng.2020.106866.106866 [DOI] [Google Scholar]
  • 21.Ateya A. A., Muthanna A., Vybornova A., et al. Chaotic salp swarm algorithm for SDN multi-controller networks. Engineering Science and Technology, an International Journal . 2019;22(4):1001–1012. doi: 10.1016/j.jestch.2018.12.015. [DOI] [Google Scholar]
  • 22.Mohan P., Chelliah S. An authentication technique for accessing de-duplicated data from private cloud using one time password. International Journal of Information Security and Privacy . 2017;11(2):1–10. doi: 10.4018/IJISP.2017040101. [DOI] [Google Scholar]
  • 23.Saravanan S., Hailu M., Gouse G. M., Lavanya M., Vijaysai R. Optimized secure scan flip flop to thwart side channel attack in crypto-chip. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering . 2019;274:410–417. doi: 10.1007/978-3-030-15357-1_34. [DOI] [Google Scholar]
  • 24.Gupta R., Tanwar S., Al-Turjman F., Italiya P., Nauman A., Kim S. W. Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access . 2020;8 doi: 10.1109/ACCESS.2020.2970576.24746 [DOI] [Google Scholar]
  • 25.Paulraj D. A gradient boosted decision tree-based sentiment classification of twitter data. International Journal of Wavelets, Multiresolution and Information Processing . 2020;18(4):1–21.205027 [Google Scholar]
  • 26.Neelakandan S., Arun A., Ram R. B., Hardas B. M. An automated word embedding with parameter tuned model for web crawling. Intelligent Automation & Soft Computing . 2022;32(3):1617–1632. doi: 10.32604/iasc.2022.022209. [DOI] [Google Scholar]
  • 27.Gokul Anand J. Trust based optimal routing in MANET’s. Proceedings of the 2011 International Conference on Emerging Trends in Electrical and Computer Technology; March 2011; Nagercoil, India. pp. 1150–1156. [DOI] [Google Scholar]
  • 28.Cyril C. P. D., Beulah J. R., Subramani N., Harshavardhan A., Sivabalaselvamani D. An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurrent Engineering . 2021;29(4):386–395. doi: 10.1177/1063293x211031485. [DOI] [Google Scholar]
  • 29.Geetha B. T., Santhosh P. K., Bama B. S., Neelakandan S., Vijendra D. B., Vijendra D. Green energy aware and cluster-based communication for future load prediction in IoT. Sustainable Energy Technologies and Assessments . 2022;52 doi: 10.1016/j.seta.2022.102244.102244 [DOI] [Google Scholar]
  • 30.Singh H., Ramya D., Saravanakumar R., et al. Artificial intelligence based quality of transmission predictive model for cognitive optical networks. Optik . 2022;257 doi: 10.1016/j.ijleo.2022.168789.168789 [DOI] [Google Scholar]
  • 31.Asha P., Sumathy R., Geetha B., Varalakshmi G., Beulah J. R., Neelakandan S. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environmental Research . 2022;205 doi: 10.1016/j.envres.2021.112574.112574 [DOI] [PubMed] [Google Scholar]
  • 32.Venu D., Mayuri A. V. R., Neelakandan S., Murthy G., Arulkumar N., Shelke N. An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication. Optik . 2022;252 doi: 10.1016/j.ijleo.2021.168545.168545 [DOI] [Google Scholar]
  • 33.Ramalingam C., Mohan P. An efficient applications cloud interoperability framework using I-anfis. Symmetry . 2021;13(2):p. 268. doi: 10.3390/sym13020268. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The manuscript contains all of the data.


Articles from Computational Intelligence and Neuroscience are provided here courtesy of Wiley

RESOURCES