Computer Science ›› 2019, Vol. 46 ›› Issue (9): 321-324.doi: 10.11896/j.issn.1002-137X.2019.09.049

• Interdiscipline & Frontier • Previous Articles     Next Articles

QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model

JIA Zhi-chun1,2, LI Xiang1, YU Zhan-lin1, LU Yuan1, XING Xing1,2   

  1. (College of Information Science and Technology,Bohai University,Jinzhou,Liaoning 121013,China)1;
    (Institute of Automation,Bohai University,Jinzhou,Liaoning 121013,China)2
  • Received:2018-07-25 Online:2019-09-15 Published:2019-09-02

Abstract: With the rapid development of cloud computing technology,QoS prediction of cloud service components has become an important research issue in cloud computing.Accurate prediction of the QoS value is of great difficulty in this research field.QoS is often used to measure the performance of different cloud service components.Based on the QoS values of different candidate components,it is easy to choose the best one.For the same cloud service component,the QoS values provided by different users are not necessarily the same.For different users,personalized component QoS values are needed so that accurate selection can be made.If the user’s QoS cannot be satisfied by a single cloud service component,the component composition should be considered.In this case,its QoS capability should to be predicted to meet the user’s needs.This paper presented a QoS satisfied prediction model of cloud service component.The model uses a second order hidden markov model to construct the QoS satisfaction predictive model.By considering the in- fluence of the previous two states on the current state,the proposed method can effectively improve the prediction accuracy.Finally,in the Matlab simulation experiment environment,the effectiveness of the proposed method is prove by the prototype system and QWS data set with 2507 real web services.

Key words: Cloud service, Second order hidden markov model, Service selection

CLC Number: 

  • TP391
[1]BOKHARI M U,MAKKI Q,TAMANDANI Y K.A Survey on Cloud Computing [J].International Journal on Computer Scie-nce & Engineering,2018,5(6):302-311.
[2]SHARMA P,SOOD S K,KAUR S.Security Issues in CloudComputing [J].International Journal of Advanced Computer Research,2017,2(3):1-11.
[3]ÅŽICLOVAN A,PATRUT B.The Future of Cloud Computing [J].Brand Broad Research in Accounting Negotiation & Distribution,2016,3(3):47-68.
[4]COMUZZI M,JACOBS G,GREFEN P.Understanding SLA Elements in Cloud Computing [J].Ifip Advances in Information & Communication Technology,2017,408:385-392.
[5]SINGH S,CHANA I,SINGH M.The Journey of QoS-AwareAutonomic Cloud Computing [J].IT Professional,2017,19(2):42-49.
[6]MELL P M,GRANCE T.The NIST Definitionof Cloud Computing[C]//National Institute of Standards & Technology.Gai-thersburg,2011.
[7]WANG D,YANG Y,MI Z.A genetic-based approach to web service composition in geo-distributed cloud environment[J].Computers & Electrical Engineering,2015,43(C):129-141.
[8]ZHENG Z,ZHANG Y,LYU M R.CloudRank:A QoS-Driven Component Ranking Framework for Cloud Computing[J].Proceedings of the IEEE Symposium on Reliable Distributed Systems,2010,23(3):184-193.
[9]DING S,WANG Z,WU D,et al.Utilizing customer satisfaction in ranking prediction for personalized cloud service selection[M].Elsevier Science Publishers B.V.,2017.
[10]SUN Q.An improved Particle Swarm Optimization Algorithm for QoS-aware Web Service Selection in Service Oriented Communication[J].International Journal of Computational Intelligence Systems,2010,3(sup1):18-30.
[11]MA H,ZHU H,HU Z,et al.Multi-valued collaborative QoSprediction for cloud service via time series analysis[J].Future Generation Computer Systems,2016,68:275-288.
[12]AHMED W,WU Y,ZHENG W.Response Time based Optimal Web Service Selection[J].IEEE Transactions on Parallel & Distributed Systems,2015,26(2):551-561.
[13]CANTÓNPUERTO D G,MOOMENA F,UCCETINA V.QoS-Based Web Services Selection Using a Hidden Mar-kov Model [J].Journal of Computers,2017,12(1):48-56.
[14]PRASANGA R,WIJESIRIWARDANA C,WEERASURIYAG,et al.States Prediction of Web Services Using Hidden Markov Model [C]//ITRU Research Symposium.Sri Lanka,2015:16-20.
[15]LIU S,LIU Y.Network security risk assessment method based on HMM and attack graph model [C]//IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/distributed Computing.IEEE,2016:517-522.
[16]WEI W,FAN X,SONG H,et al.Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing[J].IEEE Transactions on Ser-vices Computing,2018,PP(99):1-1.
[17]BAUM L E,PETRIE T.Statistical Inference for ProbabilisticFunctions of Finite State Markov Chains[J].Annals of Mathematical Statistics,1966,37(6):1554-1563.
[18]RABINER L R.A tutorial on hidden Markov models and selec-ted applications in speech recognition[J].Proceedings of the IEEE,1989,7(2):257-286.
[19]XU L,FAN W,SUN J,et al.An HMM-based Over-Segmentation Method for Touching Chinese Handwriting Recognition [C]//International Conference on Frontiers in Handwriting Recognition.IEEE,2017:343-348.
[20]GHARACHEH M,DERHAMI V,HASHEMI S,et al.Propo-sing an HMM-based approach to detect metamorphic malware [C]//Fuzzy and Intelligent Systems.IEEE,2016:1-5.
[21]MATUZ B,BLASCO F L,LIVA G.On the Application of the Baum-Welch Algorithm for Modeling the Land Mobile Satellite Channel[C]//2011 IEEE Global Telecommunications Confe-rence.Kathmandu,Nepal,2011,44:1-5.
[22]AL-MASRI E,MAHMOUD Q H.Investigating Web Serviceson the World Wide Web [C]//International Conference on World Wide Web.Beijing,China,2008:795-804.
[1] LIU Ming-cong, WANG Na, ZHOU Ning. Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism [J]. Computer Science, 2019, 46(4): 189-196.
[2] FANG Chen, WANG Jin-dong and YU Zhi-yong. Web Service Selection Method Based on Dynamic QoS [J]. Computer Science, 2017, 44(5): 245-250.
[3] YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9.
[4] YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145.
[5] CHEN Hong-song, WANG Gang and FU Zhong-chuan. Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check [J]. Computer Science, 2016, 43(4): 140-144.
[6] WU Ju-hua, CHENG Xiao-yan, CAO Qiang and MO Zan. Trustworthy Web Servcie Selection Based on Social Network [J]. Computer Science, 2016, 43(1): 141-144.
[7] CHEN Wei-dong, LI Min-qiang and ZHAO Qing-zhan. Research of Web Service Selection Trust Model on P2P Environment [J]. Computer Science, 2015, 42(1): 113-118.
[8] SHEN Zhang-guo,LOU Jun-gang,MA Xiao-long and MA Wang-yong. Resource Allocation and Pricing Mechanism for Multi-type Resources of Cloud Market Based on Mechanism Theory [J]. Computer Science, 2014, 41(6): 59-62,78.
[9] WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing. Research on Service Trust Evaluation Approach under Cloud Computing Environment [J]. Computer Science, 2014, 41(12): 38-42,66.
[10] ZHANG Ya-hong,ZHANG Lin-lin,ZHAO Kai,CHEN Jia-li and FENG Zai-wen. Web Service Selection Method Based on Runtime Verification [J]. Computer Science, 2014, 41(1): 246-249.
[11] LIANG Yuan-ning,CHEN Jian-liang and YE Li. Research on Reliability Optimal Method of Cloud Service [J]. Computer Science, 2013, 40(8): 129-135.
[12] ZHANG Long-chang. Big Group-oriented Fuzzy Web Service Selection [J]. Computer Science, 2013, 40(6): 57-62.
[13] LIU Zhi-zhong,WANG Zhi-jian,XUE Xiao and LU Bao-yun. Research on Cloud Service Composition Based on Culture Social Cognitive Optimization Algorithm [J]. Computer Science, 2013, 40(5): 103-106.
[14] ZHANG Yong-jun,SHI Dian-xi,XIAO Xi,WU Zhen-dong and DING Bo. Research and Implementation of Mobile Cloud Services Access Mechanism Based on Proxy [J]. Computer Science, 2013, 40(5): 58-61.
[15] . ilser-based FRC Evaluation Selection Model for Web Services [J]. Computer Science, 2013, 40(3): 89-94.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] WU Shu, ZHOU An-min and ZUO Zheng. PDiOS:Private API Call Detection in iOS Applications[J]. Computer Science, 2018, 45(4): 163 -168 .
[2] LU Jia-wei, MA Jun, ZHANG Yuan-ming and XIAO Gang. Service Clustering Approach for Global Social Service Network[J]. Computer Science, 2018, 45(3): 204 -212 .
[3] RAN Zheng, LUO Lei, YAN Hua and LI Yun. Study on Automatic Method for AUTOSAR Runnable Entity-task Mapping[J]. Computer Science, 2018, 45(4): 190 -195, 226 .
[4] DAI Wen-jing, YUAN Jia-bin. Survey on Hidden Subgroup Problem[J]. Computer Science, 2018, 45(6): 1 -8 .
[5] ZHU Wen-qiang. Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network[J]. Computer Science, 2018, 45(6): 76 -83 .
[6] YANG Pei-an, WU Yang, SU Li-ya, LIU Bao-xu. Overview of Threat Intelligence Sharing Technologies in Cyberspace[J]. Computer Science, 2018, 45(6): 9 -18,26 .
[7] YU Yong,KANG Qing-yi,CHEN Chang-geng,KAN Shi-lin,LUO Yong-jun. Bisecting K-means Clustering Method Based on Cohesion and Coupling[J]. Computer Science, 2018, 45(6A): 460 -464 .
[8] WU Wei-nan, LIU Jian-ming. Dynamic Retransmission Algorithm inLow-power Wireless Sensor Networks[J]. Computer Science, 2018, 45(6): 96 -99,123 .
[9] CHI Kai-kai, LIN Yi-min, LI Yan-jun, CHENG Zhen. Duty Cycle Scheme Maximizing Throughput in Energy Harvesting Sensor Networks[J]. Computer Science, 2018, 45(6): 100 -104 .
[10] YIN Qiu-shi, CHEN Jian-hua. Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment[J]. Computer Science, 2018, 45(6): 111 -116,150 .