Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 79References:
[1] Syed, H.J., Gani, A., Ahmad, R.W., Khan, M.K. and Ahmed, A.I.A, "Cloud monitoring: A review, taxonomy, and open research issues," Journal of Network and Computer Applications, pp. 11-26, 2017.
[2] Simic, V., Stojanovic, B. and Ivanovic, M.,, "Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approach," Future Generation Computer Systems, vol. 1, no. 101, pp. 909-920, 2019.
[3] Moses, J., Iyer, R., Illikkal, R., Srinivasan, S. and Aisopos, K., "Shared resource monitoring and throughput optimization in cloud-computing datacenters," in IEEE International Parallel & Distributed Processing Symposium, Alaska USA, 2011.
[4] Zeb, S., Mahmood, A., Hassan, S.A., Piran, M.J., Gidlund, M. and Guizani, M, "Industrial digital twins at the nexus of nextG wireless networks and computational intelligence: A survey," ournal of Network and Computer Applications, vol. 1, no. 200, p. 103309, 2022.
[5] S. Pargaonkar, "A Comprehensive Review of Performance Testing Methodologies and Best Practices," Software Quality Engineering. International Journal of Science and Research (IJSR), vol. 12, no. 8, pp. 2008-2014, 2023.
[6] Prasad, V.K., Dansana, D., Bhavsar, M.D., Acharya, B., Gerogiannis, V.C. and Kanavos, A, "Efficient Resource Utilization in IoT and Cloud Computing," Information, vol. 14, no. 11, p. 619, 2023.
[7] Alipour, H., Liu, Y. and Hamou-Lhadj, A, "Analyzing auto-scaling issues in cloud environments," CASCON, vol. 14, pp. 75-89, 2014.
[8] Hussain, H., Malik, S.U.R., Hameed, A., Khan, S.U., Bickler, G., Min-Allah, N., Qureshi, M.B., Zhang, L., Yongji, W., Ghani, N. and Kolodziej, J, "A survey on resource allocation in high performance distributed computing systems," Parallel Computing, vol. 39, no. 11, pp. 709-736, 2013.
[9] Lorido-Botran, T., Miguel-Alonso, J. and Lozano, J.A., 2014., "A review of auto-scaling techniques for elastic applications in cloud environments," Journal of grid computing, vol. 12, pp. 559-592, 2014.
[10] Milani, A.S. and Navimipour, N.J., 2016, "Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends," Journal of Network and Computer Applications, no. 71, pp. 86-98, 2016.
[11] Rodríguez-Mazahua, L., Rodríguez-Enríquez, C.A., Sánchez-Cervantes, J.L., Cervantes, J., García-Alcaraz, J.L. and Alor-Hernández, G., "A general perspective of Big Data: applications, tools, challenges and trends," The Journal of Supercomputing, no. 72, pp. 3073-3113, 2016.
[12] T. Muhammad, " A Comprehensive Study on Software-Defined Load Balancers: Architectural Flexibility & Application Service Delivery in On-Premises Ecosystems," International Journal of Computer Science and Technology, vol. 6, no. 1, pp. 1-24, 2022.
[13] Raj, P., Raman, A., Raj, P. and Raman, A., "Multi-cloud management: Technologies, tools, and techniques. Software-Defined Cloud Centers," Operational and Management Technologies and Tools, pp. 219-240, 2018.
[14] Odun-Ayo, I., Udemezue, B. and Kilanko, "Cloud service level agreements and resource management," Adv. Sci. Technol. Eng. Syst, vol. 4, no. 2, pp. 228-236, 2019.
[15] Hugos, M.H. and Hulitzky, D, "Business in the cloud: what every business needs to know about cloud computing," John Wiley & Sons, 2010.
[16] A. J. A. P. P. C. H. a. G. L. Sangaiah, "Cost-effective resources for computing approximation queries in mobile cloud computing infrastructure," Sensors, vol. 23, no. 17, p. 7416, 2023.
[17] R. Dittakavi, "Evaluating the Efficiency and Limitations of Configuration Strategies in Hybrid Cloud Environments," International Journal of Intelligent Automation and Computing, vol. 5, no. 2, pp. 29-45, 2022.
[18] A. Kunduru, "Artificial intelligence usage in cloud application performance improvement," Central Asian Journal of Mathematical Theory and Computer Sciences, vol. 4, no. 8, pp. 42-47, 2023.
[19] Hassan, A. and Mhmood, A.H, "Optimizing Network Performance, Automation, and Intelligent Decision-Making through Real-Time Big Data Analytics," International Journal of Responsible Artificial Intelligence, vol. 11, no. 8, pp. 12-22, 2021.
[20] Kaaniche, N. and Laurent, M., 2017, "Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms," Computer Communications, no. 111, pp. 120-141, 2017.
[21] Alenezi, M.N., Alabdulrazzaq, H. and Mohammad, N.Q, "Symmetric encryption algorithms: Review and evaluation study," International Journal of Communication Networks and Information Security, vol. 12, no. 2, pp. 256-272, 2020.
[22] Wang, L., Ranjan, R., Chen, J. and Benatallah, B. eds, Cloud computing: methodology, systems, and applications. CRC press., 2017.
[23] S. Faizan, "SDN based security using cognitive algorithm against DDOS," 2018.
[24] Xu, F., Liu, F., Jin, H. and Vasilakos, A.V., 2013, "Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions," Proceedings of the IEEE, vol. 102, no. 1, pp. 11-31, 2013.
[25] Devi, T. and Ganesan, R., 2015, "Platform-as-a-Service (PaaS): model and security issues," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 15, no. 1, pp. 151-161, 2015.
[26] M. 2. Wilgus, "Best Practices When Implementing Web Application Scanning into an SDLC," ISSA Journal, vol. 15, no. 5, 2017.