Skip to main content

High Availability and High Scalability to in-Cloud Enterprise Resource Planning System

  • Conference paper
Intelligent Data analysis and its Applications, Volume II

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 298))

Abstract

In this paper the host system architecture with high availability and high scalability has introduced to an in-cloud Enterprise Resources Planning (in-cloud ERP) deployed in the virtual environment to tackle the crucial problem of unexpected down-time or the failure of system failover that causes data loss and system terminated. Access control authentication has been adopted in the cloud to prevent the service-oriented hosts form external fraud or intrusion. As a result, the experiments have shown that the number of access for in-cloud ERP is 5.2 times as many as in-house ERP. The total cost of in-cloud ERP has decreased significantly to 48.4% of total cost of in-house ERP. In terms of operational speed, the approach proposed in this paper outperforms significantly two well-known benchmark ERP systems, in-house ECC 6.0 and in-cloud ByDesign.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beloglazov, A., Buyya, R.: Energy Efficient Allocation of Virtual Machines in Cloud Data Centers. In: 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577–578 (2010)

    Google Scholar 

  2. Laurikainen, R., Laitinen, J., Lehtovuori, P., Nurminen, J.K.: Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment. In: 2012 International Conference on Cloud and Service Computing, pp. 232–239 (2012)

    Google Scholar 

  3. Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation. In: 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233–240 (2012)

    Google Scholar 

  4. Yang, T.-S., Choi, J., Zheng, X., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Research of Enterprise Resource Planning in a Specific Enterprise. In: 2006 IEEE International Conference on Systems, Man, and Cybernetics, pp. 418–422 (2006)

    Google Scholar 

  5. de Carvalho, R.A., Monnerat, R.M., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Development Support Tools for Enterprise Resource Planning. IT Professional Magazine, 39–45 (2008)

    Google Scholar 

  6. Wu, H.-Q., Ding, Y., Winer, C., Yao, L.: Network Security for Virtual Machine in Cloud Computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 18–21 (2010)

    Google Scholar 

  7. OpenERP, http://v6.openerp.com/

  8. Zhao, J.-G., Liu, J.-C., Fan, J.-J., Di, J.-X.: The Security Research of Network Access Control System. In: 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery. E-Commerce & Its Applications and Embedded Systems, pp. 283–288 (2010)

    Google Scholar 

  9. Metz, C.: AAA protocols: Authentication, Authorization, and Accounting for the Internet. IEEE Internet Computing 3(6), 75–79 (1999)

    Article  Google Scholar 

  10. Zhang, L.-F., Persaud, A.G., Johnson, A., Yong, G.: Detection of Stepping Stone Attack Under Delay and Chaff Perturbations. In: 25th Annual International Performance, Computing, and Communications Conference, pp. 256–266 (2006)

    Google Scholar 

  11. Yang, H.-Y., Xie, L.-X., Xie, F.: A New Approach to Network Anomaly Attack Detection. Fuzzy Systems and Knowledge Discovery 4, 317–321 (2008)

    Google Scholar 

  12. Chang, B.R., Tsai, H.-F., Chen, C.-M.: Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. Journal of Information Hiding and Multimedia Signal Processing 4(3), 192–200 (2013)

    Google Scholar 

  13. Chang, B.A., Tsai, H.-F., Chen, C.-M.: Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing. Mathematical Problems in Engineering 2013, Article ID 947234, 11 pages (2013)

    Google Scholar 

  14. Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy 6(2), 30–37 (2008)

    Article  Google Scholar 

  15. Chang, B.R., Huang, C.-F., Tsai, H.-F., Lin, Z.-Y.: Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification. Journal of Information Hiding and Multimedia Signal Processing 3(2), 176–190 (2012)

    Google Scholar 

  16. Hsiao, H.W., Fan, W.C.: Detecting step-stone with Network Traffic Mining Approach. In: The Fourth International Conference on Innovative Computing, Information and Control, pp. 1176–1179 (2009)

    Google Scholar 

  17. Hsiao, H.W., Lin, C.S., Chang, S.Y.: Constructing an ARP Attack Detection System with SNMP traffic data mining. In: The 11th International Conference on Electronic Commerce, pp. 341–345 (2009)

    Google Scholar 

  18. Link Aggregation Control Protocol, http://www.ieee802.org/3/ad/public/mar99/seaman_1_0399.pdf

  19. Tate, J.: IBM System Storage SAN Volume Controller (IBM Redbooks). Vervante, New York (2006)

    Google Scholar 

  20. Doedt, M., Steffen, B.: Requirement-Driven Evaluation of Remote ERP-System Solutions: A Service-oriented Perspective. In: 34th IEEE Software Engineering Workshop, pp. 57–66 (2011)

    Google Scholar 

  21. Elragal, A., Kommos, M.E.: In-House versus In-Cloud ERP Systems: A Comparative Study. Journal of Enterprise Resource Planning Studies 2012, Article ID 659957, 13 pages (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bao Rong Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Chang, B.R., Tsai, HF., Cheng, JC., Tsai, YC. (2014). High Availability and High Scalability to in-Cloud Enterprise Resource Planning System. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume II. Advances in Intelligent Systems and Computing, vol 298. Springer, Cham. https://doi.org/10.1007/978-3-319-07773-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07773-4_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07772-7

  • Online ISBN: 978-3-319-07773-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics