Abstract
In this paper the host system architecture with high availability and high scalability has introduced to an in-cloud Enterprise Resources Planning (in-cloud ERP) deployed in the virtual environment to tackle the crucial problem of unexpected down-time or the failure of system failover that causes data loss and system terminated. Access control authentication has been adopted in the cloud to prevent the service-oriented hosts form external fraud or intrusion. As a result, the experiments have shown that the number of access for in-cloud ERP is 5.2 times as many as in-house ERP. The total cost of in-cloud ERP has decreased significantly to 48.4% of total cost of in-house ERP. In terms of operational speed, the approach proposed in this paper outperforms significantly two well-known benchmark ERP systems, in-house ECC 6.0 and in-cloud ByDesign.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beloglazov, A., Buyya, R.: Energy Efficient Allocation of Virtual Machines in Cloud Data Centers. In: 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577–578 (2010)
Laurikainen, R., Laitinen, J., Lehtovuori, P., Nurminen, J.K.: Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment. In: 2012 International Conference on Cloud and Service Computing, pp. 232–239 (2012)
Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation. In: 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233–240 (2012)
Yang, T.-S., Choi, J., Zheng, X., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Research of Enterprise Resource Planning in a Specific Enterprise. In: 2006 IEEE International Conference on Systems, Man, and Cybernetics, pp. 418–422 (2006)
de Carvalho, R.A., Monnerat, R.M., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Development Support Tools for Enterprise Resource Planning. IT Professional Magazine, 39–45 (2008)
Wu, H.-Q., Ding, Y., Winer, C., Yao, L.: Network Security for Virtual Machine in Cloud Computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 18–21 (2010)
OpenERP, http://v6.openerp.com/
Zhao, J.-G., Liu, J.-C., Fan, J.-J., Di, J.-X.: The Security Research of Network Access Control System. In: 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery. E-Commerce & Its Applications and Embedded Systems, pp. 283–288 (2010)
Metz, C.: AAA protocols: Authentication, Authorization, and Accounting for the Internet. IEEE Internet Computing 3(6), 75–79 (1999)
Zhang, L.-F., Persaud, A.G., Johnson, A., Yong, G.: Detection of Stepping Stone Attack Under Delay and Chaff Perturbations. In: 25th Annual International Performance, Computing, and Communications Conference, pp. 256–266 (2006)
Yang, H.-Y., Xie, L.-X., Xie, F.: A New Approach to Network Anomaly Attack Detection. Fuzzy Systems and Knowledge Discovery 4, 317–321 (2008)
Chang, B.R., Tsai, H.-F., Chen, C.-M.: Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. Journal of Information Hiding and Multimedia Signal Processing 4(3), 192–200 (2013)
Chang, B.A., Tsai, H.-F., Chen, C.-M.: Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing. Mathematical Problems in Engineering 2013, Article ID 947234, 11 pages (2013)
Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy 6(2), 30–37 (2008)
Chang, B.R., Huang, C.-F., Tsai, H.-F., Lin, Z.-Y.: Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification. Journal of Information Hiding and Multimedia Signal Processing 3(2), 176–190 (2012)
Hsiao, H.W., Fan, W.C.: Detecting step-stone with Network Traffic Mining Approach. In: The Fourth International Conference on Innovative Computing, Information and Control, pp. 1176–1179 (2009)
Hsiao, H.W., Lin, C.S., Chang, S.Y.: Constructing an ARP Attack Detection System with SNMP traffic data mining. In: The 11th International Conference on Electronic Commerce, pp. 341–345 (2009)
Link Aggregation Control Protocol, http://www.ieee802.org/3/ad/public/mar99/seaman_1_0399.pdf
Tate, J.: IBM System Storage SAN Volume Controller (IBM Redbooks). Vervante, New York (2006)
Doedt, M., Steffen, B.: Requirement-Driven Evaluation of Remote ERP-System Solutions: A Service-oriented Perspective. In: 34th IEEE Software Engineering Workshop, pp. 57–66 (2011)
Elragal, A., Kommos, M.E.: In-House versus In-Cloud ERP Systems: A Comparative Study. Journal of Enterprise Resource Planning Studies 2012, Article ID 659957, 13 pages (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, B.R., Tsai, HF., Cheng, JC., Tsai, YC. (2014). High Availability and High Scalability to in-Cloud Enterprise Resource Planning System. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume II. Advances in Intelligent Systems and Computing, vol 298. Springer, Cham. https://doi.org/10.1007/978-3-319-07773-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-07773-4_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07772-7
Online ISBN: 978-3-319-07773-4
eBook Packages: EngineeringEngineering (R0)