Synthetic Hardware Performance Analysis in Virtualized Cloud Environment for Healthcare Organization

被引:4
作者
Tan, Chee-Heng [1 ]
Teh, Ying-Wah [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
Virtualization; Cloud computing; Security; Resource optimization; Resource consistency; Load testing; Healthcare;
D O I
10.1007/s10916-013-9950-7
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The main obstacles in mass adoption of cloud computing for database operations in healthcare organization are the data security and privacy issues. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to actual data for diagnostic and remediation purposes. The proposed mechanisms utilized the hypothetical data from TPC-H benchmark, to achieve 2 objectives. First, the underlying hardware performance and consistency is monitored via a control system, which is constructed using TPC-H queries. Second, the mechanism to construct stress-testing scenario is envisaged in the host, using a single or combination of TPC-H queries, so that the resource threshold point can be verified, if the virtual machine is still capable of serving critical transactions at this constraining juncture. This threshold point uses server run queue size as input parameter, and it serves 2 purposes: It provides the boundary threshold to the control system, so that periodic learning of the synthetic data sets for performance evaluation does not reach the host's constraint level. Secondly, when the host undergoes hardware change, stress-testing scenarios are simulated in the host by loading up to this resource threshold level, for subsequent response time verification from real and critical transactions.
引用
收藏
页数:13
相关论文
共 35 条
  • [11] Admission control for media on demand services
    Bichler, Martin
    Setzer, Thomas
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2007, 1 (01) : 65 - 73
  • [12] Data Migration from Grid to Cloud Computing
    Chen, Wei
    Yin, Kuo-Cheng
    Yang, Don-Lin
    Hung, Ming-Chuan
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 399 - 406
  • [13] A Scheduling algorithm for Multi-Tenants Instance-Intensive Workflows
    Cui, Lizhen
    Zhang, Tiantian
    Xu, Guangquan
    Yuan, Dong
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 : 99 - 105
  • [14] Donahue S., 2010, Cloudbook Journal, V1
  • [15] Foster I., 2008, GRID COMPUTING ENV W, P1, DOI [10.1109/GCE.2008.4738445, DOI 10.1109/GCE.2008.4738445]
  • [16] Ghoshal Devarshi., 2011, Proceedings of the second international workshop on Data intensive computing in the clouds, DataCloud-SC '11, P71, DOI [10.1145/2087522.2087535, DOI 10.1145/2087522.2087535]
  • [17] Security Issues for Cloud Computing
    Hamlen, Kevin
    Kantarcioglu, Murat
    Khan, Latifur
    Thuraisingham, Bhavani
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 36 - 48
  • [18] Hanmer R., 2010, Software Rejuvenation
  • [19] Khatua S., 2010, VECIMS 2010 - 2010 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems, Proceedings, P82
  • [20] Kumar V., 2012, INT J ADV TECHNOL EN, V2