Skip to main content

Advertisement

Log in

Relative weight comparison between virtual key factors of cloud computing with analytic network process

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Drastical increase of a variety of information devices with networks are based on a rapid development and expansion of network infrastructures and technology. Cloud computing is a main technology which makes the information devices lighter and allows users to access their data and applications through a variety of networks. Under the circumstances that the importance and use of cloud computing system is rapidly increasing the virtualization technology becomes one of the key components consisting the cloud computing. Therefore, a quality of a variety of cloud computing systems is affected by the virtualization quality. Many factors which decide the virtualization quality and characteristics have been studied. However, when we apply the cloud computing system to our organization the priorities of the key factors should be decided and according to the priorities resourves must be alloted. In this paper, we suggested a relative weight evaluation process applying Analytic Network Process to analyze the interrelations between the key factors and calculate the relative weights of the factors. Especially, through the demonstration we showed that the interrelations between the factors affect the relative weights at large. With the proposed method we can find hidden priority and allot our resources and efforts more effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Sean M, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing - the business perspective. Decis Support Syst 51(1):176–189

    Article  Google Scholar 

  2. Hussain R, Oh H (2014) Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks. J Inf Process Syst 10(1):103–118

    Article  Google Scholar 

  3. Li S-H, Yen DC, Huc C-C, Lu W-H, Chiu Y-C (2012) Identifying critical factors for corporate implementing virtualization technology. Comput Hum Behav 28:2244–2257

    Article  Google Scholar 

  4. Weng MM, Shis TK, Hung JC (2013) A personal tutoring mechanism based on the cloud environment. J Converg 4(2):37–44

    Google Scholar 

  5. Xie X, Jiang H, Jin H, Cao W, Yuan P, Yang L (2012) Metis: a profiling toolkit based on the virtualization of hardware performance counters. Hum-centric Comput Inf Sci 2(8):1–15

    Google Scholar 

  6. Global Industry Analysts, Inc. (2010) Virtualization software. In: A global strategic business report. http://www.strategyr.com/Virtualization_Software_Market_Report.asp

  7. DeLone WH, McLean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. J Manag Inf Syst 19(3):9–30

    Google Scholar 

  8. Saaty TL (2001) Decision making with dependence feedback: the analytic network process. RWS Publications, Pittsburgh

    Google Scholar 

  9. Joshi G-JA, HssanTakabi JBD (2010) Security and privacy challenges in cloud computing environments. Secur Priv IEEE 8(6):24–31

    Article  Google Scholar 

  10. Goscinski A, Brock M (2010) Toward dynamic and attribute based publication, discovery and selection for cloud computing. Futur Gener Comput Syst 26(7):947–970

    Article  Google Scholar 

  11. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  12. Ramgovind S, Eloff MM, Smith E (2010) The management of security in cloud computing, Information security for South Africa (ISSA), IEEE, pp 1–7

  13. A Platform Computing Whitepaper (2010) Enterprise Cloud Computing: Transforming IT, Platform Computing, pp 6, viewed 13 March 2010

  14. Dooley B (2010) Architectural Requirements Of The Hybrid Cloud. In: Information Management Online. http://www.information-management.com/news/hybrid-cloudarchitectural-requirements10017152-1.html. viewed 10 February 2010

  15. Global Netoptex Incorporated (2009) Demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com, pp 4–14. viewed 13 December 2009

  16. Lofstrand M (2009) The VeriScale Architecture. In: Elasticity and Efficiency for Private Clouds, Sun Microsystems, Sun Blue Print, Online, Part No 821–0248-11, Revision 1.1, 09/22/09

  17. Gong C, Liu J, Zhang Q, Chen H and Gong Z (2010) The Characteristics of Cloud Computing. In: 39th International Conference on Parallel Processing Workshops, pp 275–279

  18. Popek GJ, Goldberg RP (1974) Formal requirements for virtualizable third generation architectures. Commun ACM 17(7):412–421

    Article  MathSciNet  MATH  Google Scholar 

  19. Fichera R (2002) The future of the data center–Modularity and virtualization. Forrester Research

  20. Singh A (2004) An introduction to virtualization. http://www.kernelthread.com/publications/virtualization

  21. Waters JK (2007) Virtualization definition and solutions. http://www.cio.com/article/40701/Virtualization_Definition_and_Solutions

  22. Tulloch M (2010) Understanding Microsoft virtualization solutions. Microsoft Press, A Division of Microsoft Corporation

  23. Shavit Y, Migliore D (2009) Virtual machine. http://searchservervirtualization.techtarget.com/sDefinition/0,,sid94_gci213305,00.html

  24. Smith JE, Nair R (2005) The architecture of virtual machines. Comput 38(5):32–38

    Article  Google Scholar 

  25. Uhlig R, Neiger G, Rodgers D, Santoni AL, Martins FCM, Anderson AV et al (2005) Intel virtualization technology. Comput 38(5):48–56

    Article  Google Scholar 

  26. Seetharaman S, Murthy K (2006) Test optimization using software virtualization. Softw IEEE 23(5):66–69

    Article  Google Scholar 

  27. Menasce DA, Bennani MN (2006) Autonomic virtualized environments. In: International conference on autonomic and autonomous systems, p 28

  28. Sotomayor B, Keahey K, Foster I (2006) Overhead matters. A model for virtual resource management. In: The 2nd international workshop on virtualization technology in distributed computing, pp 5–12

  29. Jung YW, Kim JM, Bae SJ, Koh KW, Woo YC, Kim SW (2009) Standard-based virtual infrastructure resource management for distributed and heterogeneous servers. In: The 11th international conference on advanced communication technology, pp 2233–2237

  30. Chen Q, Xin R (2005) Optimizing enterprise IT infrastructure through virtual server consolidation. In: Proceedings of the 2005 informing science and IT education joint conference

  31. Oguchi Y, Yamamoto T (2008) Server virtualization technology and its latest trends. Fujitsu Sci Tech J 44(1):46–52

    Google Scholar 

  32. Sehgal NK, Ganguli M (2006) Applications of virtualization for server management and security. In: IEEE international conference on industrial technology, pp 2752–2755

  33. Tsai CF (2007) Comparisons of benchmark of virtualization technologies. Masterthesis. Tamkang University, Taiwan

    Google Scholar 

  34. Symantec (2009) White paper: The green data center–A Symantec green IT guide, Symantec Corporation World Headquarters

  35. Weltzin C, Delgado S (2009) Using virtualization to reduce the cost of test. In: Autotestcon, pp 439–442, IEEE

  36. VMware (2006) White paper: Virtualization overview, VMware, Inc.

  37. Hsieh YF (2008) Virtualization of enterprise testing lab via VMware: a case study ona large software development company. Master thesis. National Taiwan University, Taiwan

    Google Scholar 

  38. Saaty TL (1980) The Analytic hierarchy process. McGraw-Hill, New York

    MATH  Google Scholar 

  39. Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83–98

    MathSciNet  Google Scholar 

  40. Meade LM, Sarkis J (1999) Analyzing organizational project alternatives for agile manufacturing process. Anal Netw Approach Int J Prod Res 37:241–261

    Article  MATH  Google Scholar 

  41. Bard JF, Sousk SF (1990) A tradeoff analysis for rough terrain cargo handlers using the AHP: an example of group decision-making. IEEE Trans Eng Manag 37(2):222–228

    Article  Google Scholar 

  42. Raisinghani MS, Meade L, Schkade LL (2007) Strategic e-Business decision analysis using the analytic network process. IEEE Trans Eng Manag 54(3):673–686

    Article  Google Scholar 

  43. Tang X, Feng J (2006) ANP theory and application expectation. Stat Decis-mak 12(2):138–140

    Google Scholar 

  44. Tzeng GH, Yu R (2006) A soft computing method for multi-criteria decision making with dependence and feedback. Appl Math Comput 180(6):63–75

    MathSciNet  MATH  Google Scholar 

  45. Yuksel I, Dagcarondeviren M (2007) Using the analytic network process (ANP) in a SWOT analysis - a case study for a textile firm. Inf Sci 177:3364–3382

    Article  MATH  Google Scholar 

  46. Chang CW, Wu CR, Lin CT, Lin HL (2007) Evaluating digital video recorder systems using analytic hierarchy and analytic network processes. Inf Sci 177(16):3383–3396

    Article  Google Scholar 

  47. Jung U, Seo DW (2010) An ANP approach for R&D project evaluation based on interdependencies between research objectives and evaluation criteria. Decis Support Syst 49(2):335–342

    Article  Google Scholar 

  48. Aragonés-Beltrán P, Pastor-Ferrando JP, Rodríguez-Pozo F, Chaparro-Gonzalez F (2010) An ANP-based approach for the selection of photovoltaic solar power plant investment projects. Renew Sustain Energy Rev 14(1):249–264

    Article  Google Scholar 

Download references

Acknowledgments

This Research has been performed as a subproject of project Global Science experimental Data hub Center (GSDC) and supported by the Korea Institute of Science and Technology Information (KISTI).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Haeng Jin Jang or Young-Sik Jeong.

Appendix

Appendix

See Tables 9, 10, 11, 12, 13 and 14.

Table 9 Submatrix for information quality considering the interrelations
Table 10 Submatrix for simplified management and maintenance considering the interrelations
Table 11 Submatrix for integration of resources considering the interrelations
Table 12 Submatrix for cost reduction considering the interrelations
Table 13 Submatrix for ease of deployment, test and development considering the interrelations
Table 14 Submatrix for organizational consensus considering the interrelations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, CR., Jeong, HY., Park, J.H. et al. Relative weight comparison between virtual key factors of cloud computing with analytic network process. J Supercomput 72, 1694–1714 (2016). https://doi.org/10.1007/s11227-014-1311-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1311-x

Keywords