Skip to main content
Log in

Automatic deployment system of computer program application based on cloud computing

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Cloud computing hides the huge possibility of development. It has developed rapidly in recent years. With the development of domestic cloud computing technology, cloud computing technology has become a technology of widespread concern. This research mainly discusses the design of an automated deployment system for computer program applications based on cloud computing. In order to meet the potential load conditions, computer servers usually reserve enough resources for the maximum load, which will greatly reduce resource utilization. At the same time, the server load will be monitored in real time. According to a specific capacity expansion strategy, the capacity expansion operation will be triggered in time to increase or decrease the number of back-end virtual servers to ensure the service quality of the application and increase the resource utilization rate of the server. The allocation strategy of the deployment system adopts a configurable and customizable method, which greatly improves the flexibility of the system. With the goal of expanding component-based computer program applications, format the deployment problem of component-based computer program applications, optimize deployment efficiency based on dynamic scaling algorithms, and design simulation experiments to verify the feasibility of the algorithm. Compared with previous data centers, the success rate of cloud data centers has exceeded 87%. The research results show that the deployment system can meet the specific application requirements of users, and can be properly installed and deployed in some existing systems, and can obtain better scalability according to the particularity of the cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Abbas H, Maennel O, Assar S (2017) Security and privacy issues in cloud computing. Ann Telecommun 72(5–6):233–235

    Article  Google Scholar 

  • Abdullahi M, Ngadi MA, Abdulhamid SM (2016) Symbiotic organism search optimization based task scheduling in cloud computing environment. Future Gener Comput Syst 56:640–650

    Article  Google Scholar 

  • Ali AB, Ali T, Wafaa AK (2017) Financial incentives for adopting cloud computing in higher educational institutions. Asian Soc Sci 13(4):162–174

    Article  Google Scholar 

  • Anshari M, Alas Y, Guan LS (2016) Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge. Educ Inf Technol 21(6):1663–1677

    Article  Google Scholar 

  • Barsoum AF, Hasan MA (2017) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485–497

    Article  Google Scholar 

  • Cai H, Xu B, Jiang L et al (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Int Things J 4(1):75–87

    Article  Google Scholar 

  • Cao Z, Lin J, Wan C et al (2017) Optimal cloud computing resource allocation for demand side management. IEEE Trans Smart Grid 8(4):1943–1955

    Google Scholar 

  • Cavalcante E, Pereira J, Alves MP et al (2016) On the interplay of internet of things and cloud computing: a systematic mapping study. Comput Commun 89:17–33

    Article  Google Scholar 

  • Chen X, Jiao L, Li W et al (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808

    Article  Google Scholar 

  • Deng R, Lu R, Lai C et al (2017) Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J 3(6):1171–1181

    Google Scholar 

  • Ghobaei-Arani M, Shahidinejad A (2021) An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach. J Supercomput 77:711–750. https://doi.org/10.1007/s11227-020-03296-w

    Article  Google Scholar 

  • Guzek M, Bouvry P, Talbi EG (2016) A survey of evolutionary computation for resource management of processing in Cloud computing. IEEE Comput Intell Mag 10(2):53–67

    Article  Google Scholar 

  • Han Y, Chan J, Alpcan T et al (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108

    Google Scholar 

  • Madni SHH, Abd Latiff MS, Coulibaly Y et al (2016) Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J Netw Comput Appl 68:173–200

    Article  Google Scholar 

  • Masdari M, Valikardan S, Shahi Z et al (2016) Towards workflow scheduling in cloud computing: A comprehensive analysis. J Netw Comput Appl 66:64–82

    Article  Google Scholar 

  • Sabi HM, Uzoka FME, Langmia K et al (2016) Conceptualizing a model for adoption of cloud computing in education. Int J Inf Manage 36(2):183–191

    Article  Google Scholar 

  • Shahidinejad A , Mostafa Ghobaei‐Arani (2020) Joint computation offloading and resource provisioning for edge‐cloud computing environment: a machine learning‐based approach[J]. Software: Practice and Experience. https://link.springer.com/article/10.1007%2Fs11227-020-03296-w

  • Shahidinejad A, Ghobaei-Arani M, Masdari M (2020) Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. Cluster Comput. https://doi.org/10.1007/s10586-020-03107-0

    Article  Google Scholar 

  • Shahidinejad A, Ghobaei-Arani M, Esmaeili L (2020) An elastic controller using Colored Petri Nets in cloud computing environment. Cluster Comput 23:1045–1071. https://doi.org/10.1007/s10586-019-02972-8

    Article  Google Scholar 

  • Shen J et al (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925

    Article  Google Scholar 

  • Shiau WL, Chau PYK (2016) Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach. Inf Manag 53(3):355–365

    Article  Google Scholar 

  • Singh S, Chana I (2016) A survey on resource scheduling in cloud computing: issues and challenges. J Grid Computing 14(2):217–264

    Article  Google Scholar 

  • Somani G, Gaur MS, Sanghi D et al (2016) DDoS attacks in cloud computing: collateral damage to non-targets. Comput Netw 109:157–171

    Article  Google Scholar 

  • Soofi AA, Khan MI (2017) A review on data security in cloud computing. Int J Comput Appl 96(2):95–96

    Google Scholar 

  • Tsai JL, Lo NW (2017) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815

    Article  Google Scholar 

  • Wang C, Ren K, Wang J (2016) Secure Optimization computation outsourcing in cloud computing: a case study of linear programming. Comput IEEE Trans on 65(1):216–229

    Article  MathSciNet  Google Scholar 

  • Wang S, Zhou J et al (2017) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277

    Article  Google Scholar 

  • Wang S, Liang K, Liu JK et al (2017a) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673

    Article  Google Scholar 

  • Xia Z, Wang X, Zhang L et al (2017) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  • Xu B, Xu L, Cai H et al (2017) The design of an m-Health monitoring system based on a cloud computing platform. Enterp Inf Syst 11(1):17–36

    Article  Google Scholar 

  • Yan Q, Yu R, Gong Q et al (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602–622

    Article  Google Scholar 

  • You C, Huang K, Chae H (2016) Energy efficient mobile cloud computing powered by wireless energy transfer. IEEE J Sel Areas Commun 34(5):1757–1771

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by competition projects of excellent open online courses in colleges and universities of Henan Province in 2018 (Project No. 2018JPKC-GZ017). This work was supported by the bidding project in research and practice of education and teaching reform of Henan Polytechnic in 2019 (Project No. 2019JZ012). This work was supported by science and technology innovation team of Henan Polytechnic (No. 2020-KJCXTD-02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Zhai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhai, H., Wang, J. Automatic deployment system of computer program application based on cloud computing. Int J Syst Assur Eng Manag 12, 731–740 (2021). https://doi.org/10.1007/s13198-021-01068-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-021-01068-0

Keywords

Navigation