Computer Science ›› 2015, Vol. 42 ›› Issue (9): 127-133.doi: 10.11896/j.issn.1002-137X.2015.09.024

Previous Articles     Next Articles

Research on QoS Quantitative Evaluation Method of Cloud Service Composition Based on Markov Process

JIAO Yang, CHEN Zhe, LIANG Yuan-ning and LI Dong-xing   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper studied the QoS quantitative evaluation method of cloud service composition.On the basis of the characteristics of combined cloud service environment of virtual dynamic nature and random service,this paper put forward the realization frame of cloud service composition based on BPEL workflow,established the combined cloud ser-vice process net(CCSPNet) based on the theory of stochastic Petri net,evaluated the performance with Markov process,and proposed the six-dimensional QoS evaluation system and the QoS quantitative evaluation method of cloud service composition combined with the CCSPNet module.The application example shows that the new method has better dynamic adaptability and flexibility and can satisfy QoS evaluation requirement of cloud service application environment effectively.

Key words: Cloud computing,Service composition,Markov process,QoS evaluation

[1] Aloes A,et al.Web Services Business process Execution Language,Version2.0,OASIS Standard(April 2007)[S].
[2] 康国胜,刘建勋,唐明董,等.考虑QoS属性相关性的Web服务选择[J].小型微型计算机系统,2014,4(5):786-790 Kang Guo-sheng,Liu Jian-xun,Tang Ming-dong,et al.Consider the QoS Attribute Correlation for Web Service Selection[J].Journal of Chinese Computer Systems,2014,4(5):786-790
[3] Wan Jian-xiong,Xiang Xu-dong,Bai Xiao-ying.PerformabilityAnalysis of Avionics System with Multilayer HM/FM Using Stochastic Petri Nets [J].Chinese Journal of Aeronautics,2013,54(2):363-377
[4] Ana M,Carlos A.JWSPerf:A Performance Benchmarking Utility with Support to Multiple Web Services Implementations[C]∥International Conference on AICT-ICIW,2006:159-165
[5] 郑梁须.基于BPEL文档验证的Web服务组合入侵检测技术研究 [D].南京:南京邮电大学,2013 Zheng Liang-xu.Research on Intrusion Detection Technology for Web Service Composition Based on BPEL[D].Nanjing:Nanjing University of Posts and Telecommunications,2013
[6] Mounir L,Fatiha Z,Ana C.Timed Modeling of Web Services Composition for Automatic Testing[C]∥Third International IEEE Conference on Signal-Image Technologies and Internet-Based System,2007(SIFIS’07).2007:417-426
[7] 王盼盼.基于BPEL工作流的服务组合技术研究[D].沈阳:沈阳理工大学,2011 Wang Pan-pan.Research on BPEL Service Composition Based on Workflow[D].Shenyang:Shenyang Ligong University,2011
[8] László G,Silvano C,Felicita D G,et al.Dependability Evaluation of Web Service-Based Processes[M]∥ Formal Methods and Stochastic Models for Performance Evalution:Third European Performance Engineering Workshop(EPEW 2006).2006:166-180
[9] Apostolos Z,Panos V,Valerie I.Model-Driven Dependability Analysis of WebServices[M]∥On the Move to Meaningful Internet Systems 2004:COOPIS,DOA,and ODBASE:OTM Confe-derated International Conference,COOPIS,DOA,and ODBASE,2004:1608-1625
[10] 门鹏,段振华.广义随机Petri网下的组合Web服务建模与评价[J].西安交通大学学报,2008,42(8):967-971 Men Peng,Duan Zhen-huan.Modeling and Evaluation of Composite Web Services Based on Generalized Stochastic Petri Nets[J].Journal of Xi’an Jiaotong University,2008,2(8):967-971
[11] Lin C.Stochastic Petri Net and System Performance Evaluation[M].Beijing:Tsinghua University Press,2005:293-294

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .