Please wait a minute...
浙江大学学报(工学版)
服务计算     
云环境亚健康研究
游录金, 卢兴见, 何高奇
1. 同济大学 电子与信息工程学院,上海 200233; 
2. 华东理工大学 信息科学与工程学院,上海 200237;
3. 上海交通大学 智慧城市协同创新中心, 上海 200240
Research on sub-health in cloud environment
YOU Lu-jin, LU Xing-jian, HE Gao-qi
1. College of Electronics and Information Engineering, Tongji University, Shanghai 200233, China;
2. School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China; 
3. Smart City Collaborative Innovation Center, Shanghai Jiao Tong University, Shanghai 200240, China
 全文: PDF(1130 KB)   HTML
摘要:

云环境亚健康状态诊断与分析是云环境健康状况评估领域亟待解决的关键难题,迫切需要一套可度量、可量化的指标和模型来进行云环境亚健康状态的理论分析与系统评估.结合医学领域亚健康的概念及模型,提出云环境亚健康状态的定义及内涵,并从云环境健康标准及测评体系、云环境亚健康状态形式化模型、云环境亚健康状态诊断及分析、云环境亚健康状态治疗等方面总结云环境亚健康研究的知识结构;从云监控、云架构、云平台性能评价与分析、云平台能耗控制、云安全等方面对云环境亚健康相关的研究现状进行总结与分析.

Abstract:

Diagnosis and analysis of sub-health status in cloud environment is a key problem of cloud environment health assessment and analysis. A series of measurable and quantifiable indicators and models are urgently required for the theoretical analysis and system evaluation of sub-health status in cloud environment. The definition and connotation of sub-health status in cloud environment were proposed; the knowledge structure that was summarized, in terms of the standard and evaluation system of cloud health, and the formal model, diagnosis and analysis, and the treatment of sub-health status in cloud environment. The existing work on cloud environment sub-health was also summarized, in terms of cloud monitoring, cloud architecture, cloud platform performance evaluation and analysis, energy control, and cloud security.

出版日期: 2017-06-11
CLC:  TP 393  
基金资助:

国家自然科学青年基金资助项目(61602175);中国博士后科学基金资助项目(2016M591617);华东理工大学基本科研业务费专项基金资助项目(222201514331);上海市软件和集成电路产业发展专项基金资助项目(150809); 浙江省现代服务业电子服务工程技术研究中心开放基金资助项目(2016-ZJESC-KFJJ-003).

通讯作者: 卢兴见,男,讲师. ORCID:0000-0002-5235-7349.     E-mail: luxj@ecust.edu.cn
作者简介: 游录金(1976—),男,博士生,从事云计算和大数据研究. ORCID:0000-0003-3105-7440. E-mail: lujin_you@dnt.com.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
作者相关文章  

引用本文:

游录金, 卢兴见, 何高奇. 云环境亚健康研究[J]. 浙江大学学报(工学版), 10.3785/j.issn.1008-973X.2017.06.016.

YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 10.3785/j.issn.1008-973X.2017.06.016.

参考文献(References):
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1): 71-83.
QIN Deng-guo, ZHANG Min, ZHANG Yan, et al. Cloud computing security research [J]. Journal of Software, 2011, 22 (1): 71-83.
[2] 赵瑞芹,宋振峰.亚健康问题的研究进展[J].国外医学:社会学分册,2002,21(4): 10-13.
ZHAO Rui-qin, SONG Zhen-feng. The research progress of sub health problems [J]. Foreign Medical Sciences: Section of Social Medicine, 2002, 21 (41):10-13.
[3] 倪红梅,方盛泉,何裕民,等.试析亚健康状态与心身病证的相关性[J].上海中医药大学学报,2008,22(1):13-15.
NI Hong-mei, FANG Sheng-quan, HE Yu-min, et al. Correlation analysis of sub-health status and psychosomatic diseases [J]. Journal of Shanghai University of Traditional Chinese Medicine, 2008, 22 (1): 13-15.
[4] 贾平.关注网络的“亚健康”[J].兵团教育学院学报,2004,14(2): 78-79.
JIA Ping. Concern on the sub-health state of networks [J]. Journal of Bingtuan Education Institute, 2004,14 (2): 78-79.
[5] 黄大荣,汪鹏.网络系统“亚健康”状态的性能退化评估模型[J].南京航空航天大学学报,2011,43(7): 60-63.
HUANG Da-rong, WANG Peng. Performance degradation assessment model of "sub health" state of network system [J]. Journal of Nanjing University of Aeronautics and Astronautics, 2011, 43 (7): 60-63.
[6] 王光辉,王琦,薛俊宏,等.亚健康干预的现状与进展[J].世界中西医结合杂志,2010,5(10): 908-913.
WANG Guang-hui, WANG Qi, XUE Jun-hong, et al. Current situation and development of sub health intervention [J]. World Journal of Integrated Traditional and Western Medicine, 2010, 5(10): 908-913.
[7] 胡镜清,江丽杰,彭锦,等.现代医学模式下亚健康概念特征属性的思考及意义[J].中国中医基础医学杂志,2011,17(6): 683-690.
HU Jing-qing, JIANG Li-jie, PENG Jin, et al. Thinking and meaning of the characteristics of subhealth concept in modern medical mode [J]. China Journal of Basic Medicine in Traditional Chinese Medicine, 2011, 17 (6): 683-690.
[8] 黄鹂,原嘉民,欧爱华,等.基于决策树的亚健康状态影响因素模型[J].使用医学杂志,2011,27(1): 121-124.
HUANG Li, YUAN Jia-min, OU Ai-hua, et al. Influence factors model of sub health state based on decision tree [J]. The Journal of Practical Medicine, 2011,27(1): 121-124.
[9] 王利敏,曲彬彬,赵歆,等.基于结构方程模型的亚健康状态中医症候量化分析研究[J].中华中医药杂志,2011, 26(5): 1033-1036.
WANG Li-min, QU Bin-bin, ZHAO Xin, et al. Quantitative analysis and research of TCM symptoms of sub-health status based on the structural equation model [J]. China Journal of Traditional Chinese Medicine and Pharmacy, 2011, 26(5): 1033-1036.
[10] 罗晓芳.基于模糊集与神经网络的亚健康诊断[J].杭州师范学院学报,2004,3(2): 105-109.
LUO Xiao-fang. Diagnosis of the quasi-health state based on the fuzzy sets and neural networks [J]. Journal of Hangzhou Teachers College, 2004, 3(2):105-109.
[11] 林森.复杂系统评价方法研究——以科研系统评价为例[D].山东:青岛大学, 2007.
LIN Sen. Research on the evaluation method of complex systems: taking the evaluation of scientific research system as an example [D]. Shandong: Qingdao University, 2007.
[12] 郭东强, 王志江. 管理信息系统综合评价的数学模型\[J\]. 运筹与管理, 2000,9(3): 74-80.
GUO Dong-qiang,WANG Zhi-jiang. The mathematical model of thecomprehensive evalua tion on MIS. Operations Research and Management Science[J]. 2000,9(3): 74-80.
[13] 闵文杰,陈建明,张仲义.信息系统评价指标体系及方法的研究[J].铁道学报,2000,22(5): 37-41.
MIN Wen-jie, CHEN Jian-ming, ZHANG Zhong-yi. Research on index system and method of information system evaluation [J]. Railway Transaction, 2000,22(5): 37-41.
[14] 汤志伟,符萍.基于小波神经网络的信息系统综合评价模型[J].电子科技大学学报,2005, 34(5): 672-675.
TANG Zhiwei, FU Ping. Integrated evaluation model of information system based on wavelet neural network [J]. Journal of University of Electronic Science and Technology of China, 2005, 34(5): 672-675.
[15] BALSAMO S, MARCO A D, INVERARDI P, et al. Modelbased performance prediction in software development: a survey [J], IEEE Transactions on Software Engineering, 2004, 30(5): 295-310.
[16] LIU X, ZHU X, SINGHAL S, et al. Adaptive entitlement control of resource containers on shared Servers [C] ∥ Proceedings of 9th IFIP/IEEE International Symposium on Integrated Network Management. Nice: IEEE, 2005: 163-176.
[17] XING F, YOU H, LU C D. Statistical performanceanalysis for scientific applications [C] ∥ ACM Conference on Extreme Science and Engineering Discovery Environment. Atlanta: ACM, 2014: 1-8.
[18] SHEN S, VAN BEEK V, IOSUP A. Statistical characterization of business-critical workloads hosted in cloud datacenters [C] ∥ IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Shenzhen: IEEE, 2015: 465-474.
[19] OZISIKYILMAZ B, MEMIK G, CHOUDHARY A. Machine learning models to predict performance of computer system design alternatives [C] ∥ Proceedings of the 37th International Conference on Parallel Processing, Portland: IEEE, 2008: 495-502.
[20] GANAPATHI A, KUNO H, DAYAL U, et al. Predicting multiple metrics for queries: better decisions enabled by machine learning [C] ∥ Proceedings of the 2009 IEEE International Conference on Data Engineering. Shanghai: IEEE, 2009: 592-603.
[21] KWONG R H, YONGE-MALLO D L. Fault diagnosis in discrete-event systems with incomplete models: learnability and diagnosability [J]. IEEE Transactions on Cybernetics, 2015, 45(7): 1236-1249.
[22] 欧阳丹彤,李江娜,耿雪娜.离散事件系统故障的极小观测序列[J].湖南大学学报:自然科学版,2016,43(4): 147-152.
OU YANG Dan-tong, LI Jiang-na, GENG Xue-na. Minimal observation sequence of discrete event system fault [J]. Journal of Hunan University: Natural Science Edition, 2016, 43(4): 147-152.
[23] Google App Engine. Google Inc. [EB/OL]. [2017-01-10]. http:∥code.google.com/appengine/.
[24] Cloudstatus. Hyperic Inc. [EB/OL].[2017-01-10]. http:∥www.cloudstatus.com/.
[25] WARD J S, BARKER A. Observing the clouds: a survey and taxonomy of cloud monitoring [J]. Journal of Cloud Computing, 2014, 3(1): 1-30.
[26] ALHAMAZANI K, RANJAN R, MITRA K, et al. An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J]. Computing, 2013, 97(4): 357-377.
[27] HUANG H, WANG L. P&P: a combined pushpull model for resource monitoring in cloud computing environment [C] ∥ IEEE 3rd International Conference on Cloud Computing. Miami: IEEE, 2010: 260-267.
[28] LI D Z, LIU J H, DONG X, et al. Application-oriented cloud monitoring data distribution mechanism [J]. Journal of Shanghai Jiaotong University, 2015, 20(2): 149-155.
[29] BRUMMETT T, SHEINIDASHTEGOL P, SARKAR D, et al. Performance metrics of local cloud computing architectures [C] ∥ IEEE International Conference on Cyber Security and Cloud Computing. New York: IEEE, 2015: 25-30.
[30] CAO B Q, LI B, XIA Q M. A service-oriented qos-assured and multiagent cloud computing architecture [J]. Cloud Computing, 2009: 644-649.
[31] PAPAZOGLOU M P, VAN D H W. Blueprinting the cloud [J]. IEEE Internet Computing, 2011, 15(6):74-79.
[32] COOPER B F, SILBERSTEIN A, TAM E, et al. Benchmarking cloud serving systems with YCSB [C] ∥ Proceedings of ACM Symposium on Cloud Computing. Indianapolis: ACM, 2010: 143-154.
[33] CHHETRI M B, CHICHIN S, VO Q B, et al. Smart CloudBench: a framework for evaluating cloud infrastructure performance [J]. Information Systems Frontiers, 2016, 18(3): 413-428.
[34] HWANG K, BAI X, SHI Y, et al. Cloud performance modeling with benchmark evaluation of elastic scaling strategies [J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(1): 130-143.
[35] CHEN P, XIA Y, PANG S, et al. A probabilistic model for performance analysis of cloud infrastructures [J]. Concurrency and Computation Practice and Experience, 2015, 27(17): 4784-4796.
[36] HEALTH T, DINIZ B, CARRERA E V, et al. Energy conservation in heterogeneous server clusters [C] ∥ Proceedings of the ACM SIGPLAN Symp osium on Principles and Practice of Parallel Programming. Chicago: ACM, 2005: 186-195.
[37] CHEN G, HE W B, LIU J, et al. Energy-Aware server provisioning and load dispatching for connectionintensive Internet services [C] ∥ Proceedings of the NSDI. San Francisco: ACM, 2008: 337-350.
[38] 基于电压动态调整技术设计的启发式调度算法. [EB/OL]. [2010-3-26]. http:∥www.searchdatacenter.com.cn/showcontent_33068.htm.
[39] GHOR HE,CHETTO M. EDeg-fs: a heuristic for scheduling and dynamic power management in embedded energy harvesting systems with DVFS facilities [C] ∥2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), Dubai: WASET, 2015: 1-6.
[40] PADALA P, ZHU X Y, WANG Z K, et al. Performance evaluation of virtualization technologies for server consolidation[J].Virtualization with VMware Esx Server, 2007(9): 161-196.
[41] SONG Y, ZHANG Y W, SUN Y Z, et al. Utilityanalysis for Internet-oriented server consolidation in VM-based data centers [C]∥ Proceedings of the CLUSTER, New Orleans: IEEE, 2009: 1-10.
[42] 宋杰,李甜甜,阎振兴,等.一种云计算环境下的能效模型和度量方法[J].软件学报,2012, 23(2): 200-214.
SONG Jie, ZHANG Tian-tian, YAN Zhen-xing, et al. A model of energy efficiency and measurement method in cloud computing environment [J]. Journal of Software, 2012, 23(2): 200-214.
[43] OpenSolaris VPC Gateway. Oracle Inc. [EB/OL]. (2009-12-07) [2017-01-10]. http:∥kenai.com/projects/osolvpc/pages/Home.
[44] MEDHIOUB M, HAMDI M, KIM T H. Requirements capture and comparative analysis of cloud security techniques [J]. International Journal of Grid and Distributed Computing, 2015, 8(2): 285-308.
[45] SONI D, PATEL H. Privacy preservation using novel identity management scheme in cloud computing [C] ∥ Fifth International Conference on Communication Systems and Network Technologies. Gwalior: IEEE 2015: 714-719.
[46] MUHAMMAD A, SHAKEEL H. Virtualization security: analysis and open challenges [J]. International Journal of Law and Information Technology, 2015,8(2): 237-246.
[47] RAJ H, NATHUJI R, SINGH A, et al. Resource management for isolation enhanced cloud services [C] ∥ Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago: ACM, 2009: 77-84.
[48] SEN P, SAHA P, KHATUA S. A distributed approach towards trusted cloud computing platform [C] ∥ Applications and Innovations in Mobile Computing. Kolkata: IEEE, 2015: 146-151.

[1] 张伊璇,龚俭. 基于DNS流量的多层多域名检测与测量[J]. 浙江大学学报(工学版), 2020, 54(12): 2423-2429.
[2] 成海秀,李冠霖,张凌. 基于时间槽的可降带宽核心网视频业务动态资源预约算法[J]. 浙江大学学报(工学版), 2020, 54(9): 1746-1752.
[3] 李冬,鲁喻,于俊清. 软件定义网络中源地址验证绑定表安全[J]. 浙江大学学报(工学版), 2020, 54(8): 1543-1549.
[4] 武秋韵,丁伟. 基于动态暗网的互联网扫描行为分析[J]. 浙江大学学报(工学版), 2020, 54(8): 1550-1556.
[5] 齐平,束红. 智慧医疗场景下考虑终端移动性的任务卸载策略[J]. 浙江大学学报(工学版), 2020, 54(6): 1126-1137.
[6] 罗逸涵,程杰仁,唐湘滟,欧明望,王天. 基于自适应阈值的DDoS攻击态势预警模型[J]. 浙江大学学报(工学版), 2020, 54(4): 704-711.
[7] 陈蔚,刘雪娇,夏莹杰. 基于层次分析法的车联网多因素信誉评价模型[J]. 浙江大学学报(工学版), 2020, 54(4): 722-731.
[8] 张欣欣, 徐恪, 钟宜峰, 苏辉. 网络服务提供商合作行为的演化博弈分析[J]. 浙江大学学报(工学版), 2017, 51(6): 1214-1224.
[9] 李建丽, 丁丁, 李涛. 基于二次聚类的多目标混合云任务调度算法[J]. 浙江大学学报(工学版), 2017, 51(6): 1233-1241.
[10] 王钰翔, 李晟洁, 王皓, 马钧轶, 王亚沙, 张大庆. 基于Wi-Fi的非接触式行为识别研究综述[J]. 浙江大学学报(工学版), 2017, 51(4): 648-654.
[11] 钱良芳, 张森林, 刘妹琴. 基于预约的数据队列水下无线传感器网络MAC协议[J]. 浙江大学学报(工学版), 2017, 51(4): 691-696.
[12] 李晓东, 祝跃飞, 刘胜利, 肖睿卿. 基于权限的Android应用程序安全审计方法[J]. 浙江大学学报(工学版), 2017, 51(3): 590-597.
[13] 黄焱, 王鹏, 谢高辉, 安俊秀. 智能电网下数据中心能耗费用优化综述[J]. 浙江大学学报(工学版), 2016, 50(12): 2386-2399.
[14] 余洋,夏春和,原志超,李忠. 计算机网络协同防御系统信任启动模型[J]. 浙江大学学报(工学版), 2016, 50(9): 1684-1694.
[15] 齐平, 李龙澍, 李学俊. 具有失效恢复机制的云资源调度算法[J]. 浙江大学学报(工学版), 2015, 49(12): 2305-2315.