Skip to main content
Log in

Using a task dependency job-scheduling method to make energy savings in a cloud computing environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet technology has developed rapidly, especially in the field of cloud computing. With the gradual growth of cloud computing capabilities, power consumption in data centres has become a very important issue. The development of cloud computing has made data centres the cornerstone of today’s global economic development, so data centres have also developed rapidly both in terms of construction scale and growth speed. However, large numbers of data centres consume huge amounts of power while also increasing the economic cost of cloud computing. They have led to soaring carbon dioxide emissions, which will have an unimaginable impact on the global climate. Therefore, the energy-consumption problem has become an important topic in current cloud computing research. How to save energy and reduce power consumption is a key issue, and this paper proposes an energy-saving job-scheduling method, which considers task dependency in a cloud computing environment. The proposed method considers the heterogeneous characteristics of data centres, models energy consumption based on the frequency and kernel number of the virtual machine CPU and provides new solutions to the problem of energy-consumption monitoring of cloud computing data centres. The main task is to divide each job into several tasks and then assign the tasks to virtual machines. Comparison of the simulation results, i.e. total execution time with job cutting and without job cutting, using the virtual machine (VM) (with the number of jobs set to 1000 and 2000), indicated that the total execution time and total energy consumption are better with job cutting than when the job is not cut, and this was not affected by the dependency of tasks. Moreover, job cutting also effectively reduces energy consumption and job discard rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chen X, Zhu F, Chen Z, Min G, Zheng X, Rong C (2020) Resource allocation for cloud-based software services using prediction-enabled feedback control with reinforcement learning. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2020.2992537

    Article  Google Scholar 

  2. Emara T, Huang J (2020) Distributed data strategies to support large-scale data analysis across geo-distributed data centers. IEEE Access 8:178526–178538. https://doi.org/10.1109/ACCESS.2020.3027675

    Article  Google Scholar 

  3. Zhao T, Zhou S, Song L, Jiang Z, Guo X, Niu Z (2020) Energy-optimal and delay-bounded computation offloading in mobile edge computing with heterogeneous clouds. China Commun 17(5):191–210. https://doi.org/10.23919/JCC.2020.05.015

    Article  Google Scholar 

  4. Liu Y, Chen Y, Jiao Y, Ma H, Wu T (2020) A shared satellite ground station using user-oriented virtualization technology. IEEE Access 8:63923–63934. https://doi.org/10.1109/ACCESS.2020.2984485

    Article  Google Scholar 

  5. Chen CM, Chen L, Gan W, Qiu L, Ding W (2021) Discovering high utility-occupancy patterns from uncertain data. Inf Sci 546:1208–1229

    Article  MathSciNet  Google Scholar 

  6. Mathew D, Jose B, Mathew J, Patra P (2020) Enabling hardware performance counters for microkernel-based virtualization on embedded systems. IEEE Access 8:110550–110564. https://doi.org/10.1109/ACCESS.2020.3002106

    Article  Google Scholar 

  7. Zhang W, Jin S (2020) Research and application of data privacy protection technology in cloud computing environment based on attribute encryption. In: 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp 994–996. https://doi.org/10.1109/ICPICS50287.2020.9202055

  8. Wang X, Gao Z (2020) Research and development of data security multidimensional protection system in cloud computing environment. In: 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI), pp 67–70. https://doi.org/10.1109/ICAACI50733.2020.00019

  9. Song H, Huang G, Chauvel F, Xiong Y, Hu Z, Sun Y, Mei H (2011) Supporting runtime software architecture: a bidirectional-transformation-based approach. J Syst Softw 84(5):711–723

    Article  Google Scholar 

  10. Lee K (2020) Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption.” IEEE Trans Cloud Comput 8(4):1299–1300. https://doi.org/10.1109/TCC.2020.2973623.11

    Article  Google Scholar 

  11. Wu C, Toosi A, Buyya R, Ramamohanarao K (2021) Hedonic pricing of cloud computing services. IEEE Trans Cloud Comput 9(1):182–196. https://doi.org/10.1109/TCC.2018.2858266

    Article  Google Scholar 

  12. Yang W, Chen Y, Chen Y, Yeh K (2021) Intelligent agent-based predict system with cloud computing for enterprise service platform in IoT environment. IEEE Access 9:11843–11871. https://doi.org/10.1109/ACCESS.2021.3049256

    Article  Google Scholar 

  13. Huang G, Luo C, Wu K, Ma Y, Zhang Y, Liu X (2019) Software-defined infrastructure for decentralized data lifecycle governance: principled design and open challenges. In: IEEE International Conference on Distributed Computing Systems

  14. Zhang P, Li Y, Lin H, Wang J, Zhang C (2018) A periodic task-oriented scheduling architecture in cloud computing. In: 2018 IEEE International Conference on Parallel and Distributed Processing with Applications, pp 788–794

  15. Li L (2020) Cloud computing data center structure based on internet of things and its scheduling mechanism. In: 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2020, pp 633–636. https://doi.org/10.1109/ICAICA50127.2020.9182508

  16. Sharma K, Aggarwal A, Singhania T, Gupta D, Khanna A (2019) Hiding data in images using cryptography and deep neural network. J Artif Intell Syst 1:143–162

    Article  Google Scholar 

  17. Ronakkumar R, Tushar T, Swachilkumar J (2017) Scheduling of Jobs based on Hungarian method in cloud computing. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT)

  18. Nishanbayev T, Abdullayev M (2020) Evaluating the effectiveness of a software-defined cloud data center with a distributed structure. In: 2020 International Conference on Information Science and Communications Technologies (ICISCT), pp 1–5. https://doi.org/10.1109/ICISCT50599.2020.9351466

  19. Hasan J, Haque T, Hasan S (2019) Cloud-based automated power consumption optimization, power management, and appliance control. In: 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), pp 1–5. https://doi.org/10.1109/ICASERT.2019.8934890

  20. Huang G, Ma Y, Liu X, Luo Y, Lu X, Blake M (2015) Model-based automated navigation and composition of complex service mashups. IEEE Trans Serv Comput 8(3):494–506

    Article  Google Scholar 

  21. Liu X, Huang G, Zhao Q, Mei H, Blake M (2014) iMashup: a mashup-based framework for service composition. Science China Inf Sci 54(1):1–20

    Article  Google Scholar 

  22. Huang G, Liu X, Ma Y, Lu X, Zhang Y, Xiong Y (2019) Programming situational mobile web applications with cloud-mobile convergence: an internetware-oriented approach. IEEE Trans Serv Comput 12(1):6–19

    Article  Google Scholar 

  23. Huang G, Mei H, Yang F (2006) Runtime recovery and manipulation of software architecture of component-based systems. Autom Softw Eng 13(2):257–281

    Article  Google Scholar 

  24. Huang G, Liu T, Mei H, Zheng Z, Liu Z, Fan G (2004) Towards autonomic computing middleware via reflection. In: International Computer Software and Applications Conference

  25. Yang M, Zhang D, Wu B, Zhang Y (2021) Energy consumption modeling for EDM based on material removal rate. IEEE Access 8:173267–173275. https://doi.org/10.1109/ACCESS.2020.3024748

    Article  Google Scholar 

  26. Celdrán A, Clemente F, Saenz J, Torre L, Salzmann C, Gillet D (2020) Self-Organized Laboratories for Smart Campus. IEEE Trans Learn Technol 13(2):404–416. https://doi.org/10.1109/TLT.2019.2940571

    Article  Google Scholar 

  27. Miao J (2019) Application of desktop cloud based on storage active–active technology in broadcasting industry. China Cable TV 405(04):28–31

    Google Scholar 

  28. Caminero A, Ros S, Hernández R, Robles-Gómez A, Tobarra L, Granjo P (2016) VirTUal remoTe labORatories Management System (TUTORES): Using Cloud Computing to Acquire University Practical Skills. IEEE Trans Learn Technol 9(2):133–145. https://doi.org/10.1109/TLT.2015.2470683

    Article  Google Scholar 

  29. Shaikh H, Khan A, Rauf M, Nadeem A, Jilani M, Khan M (2020) IoT based linear models analysis for demand-side management of energy in residential buildings. In: 2020 Global Conference on Wireless and Optical Technologies (GCWOT), pp 1–6. https://doi.org/10.1109/GCWOT49901.2020.9391627

  30. Chen X, Li M, Zhong H, Ma Y, Hsu C (2021) DNNOff: offloading DNN-based intelligent IoT applications in mobile edge computing. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2021.3075464

    Article  Google Scholar 

  31. Chen X, Chen S, Ma Y, Liu B, Zhang Y, Huang G (2019) An adaptive offloading framework for android applications in mobile edge computing. Science China Inf Sci 62(8):82102

    Article  Google Scholar 

  32. Huang G, Xu M, Lin X, Liu Y, Ma Y, Pushp S, Liu X (2017) ShuffleDog: characterizing and adapting user-perceived latency of android apps. IEEE Trans Mob Comput 16(10):2913–2926

    Article  Google Scholar 

  33. Zhang Y, Huang G, Liu X, Zhang W, Mei H, Yang S (2012) Refactoring android Java code for on-demand computation offloading. In: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications

  34. Lin B, Huang Y, Zhang J, Hu J, Chen X, Li J (2020) Cost-driven offloading for DNN-based applications over cloud, edge and end devices. IEEE Trans Ind Inf 16(8):5456–5466

    Article  Google Scholar 

  35. Chen CM, Huang Y, Wang KH, Kumari S, Wu M (2020) A secure authenticated and key exchange scheme for fog computing. Enterp Inf Syst 2020:1–16. https://doi.org/10.1080/17517575.2020.1712746

    Article  Google Scholar 

  36. Chen X, Lin J, Ma Y, Lin B, Wang H, Huang G (2019) Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model. Sci China Inf Sci 62(11):219101

    Article  Google Scholar 

  37. Chen X, Wang H, Ma Y, Zheng X, Guo L (2020) Self-adaptive resource allocation for cloud-based software services based on iterative QoS prediction model. Future Gener Comput Syst 105:287–296

    Article  Google Scholar 

  38. Huang G, Chen X, Zhang Y, Zhang X (2012) Towards architecture-based management of platforms in the cloud. Front Comput Sci 6(4):388–397

    Article  MathSciNet  Google Scholar 

  39. Chen X, Li A, Zeng X, Guo W, Huang G (2015) Runtime model based approach to IoT application development. Front Comput Sci 9(4):540–553

    Article  Google Scholar 

  40. Li Z, Ge J, Hu H, Song W, Hu H, Luo B (2018) Cost and energy aware scheduling algorithm for scientific workflows with deadline constraint in clouds. IEEE Trans Serv Comput 11(4):713–726

    Article  Google Scholar 

  41. Zhao L, Qu S, Zeng J, Zhao Q (2020) Energy-saving and management of telecom operators’ remote computer rooms using IoT technology. IEEE Access 8:166197–166211

    Article  Google Scholar 

  42. Chen W, Mo H, Teng T (2018) Performance improvement of a split air conditioner by using an energy saving device. Energy Build 174:380–387

    Article  Google Scholar 

  43. Lee D, Tsai F (2020) Air conditioning energy saving from cloud-based artificial intelligence: case study of a split-type air conditioner. Energies 13(8):2001

    Article  Google Scholar 

  44. Yadav R, Zhang W, Kaiwartya O, Singh P, Elgendy I, Tian Y (2018) Adaptive energy-aware algorithms for minimizing energy consumption and SLA violation in cloud computing. IEEE Access 6:55923–55936. https://doi.org/10.1109/ACCESS.2018.2872750

    Article  Google Scholar 

  45. Zhao L, Qu S, Zeng J, Zhao Q (2020) Energy-saving and management of telecom operators’ remote computer rooms using IoT technology. IEEE Access 8(2020):166197–166211

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by Dongguan Polytechnic, “Excellent textbooks of Production and operations practice” (Grant No. GC21020404020), “Horizontal Project of Dongguan Polytechnic” (Grant No. 2017H02), “Key projects of teaching reform of Dongguan Polytechnic, China (Grant No. JGZD202040)” “Logistics Management Research and Service Innovation team” (No. CXTD201803).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaozhong Chen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, R., Chen, X. & Yang, C. Using a task dependency job-scheduling method to make energy savings in a cloud computing environment. J Supercomput 78, 4550–4573 (2022). https://doi.org/10.1007/s11227-021-04035-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04035-5

Keywords

Navigation