Abstract
Cloud computing hides the huge possibility of development. It has developed rapidly in recent years. With the development of domestic cloud computing technology, cloud computing technology has become a technology of widespread concern. This research mainly discusses the design of an automated deployment system for computer program applications based on cloud computing. In order to meet the potential load conditions, computer servers usually reserve enough resources for the maximum load, which will greatly reduce resource utilization. At the same time, the server load will be monitored in real time. According to a specific capacity expansion strategy, the capacity expansion operation will be triggered in time to increase or decrease the number of back-end virtual servers to ensure the service quality of the application and increase the resource utilization rate of the server. The allocation strategy of the deployment system adopts a configurable and customizable method, which greatly improves the flexibility of the system. With the goal of expanding component-based computer program applications, format the deployment problem of component-based computer program applications, optimize deployment efficiency based on dynamic scaling algorithms, and design simulation experiments to verify the feasibility of the algorithm. Compared with previous data centers, the success rate of cloud data centers has exceeded 87%. The research results show that the deployment system can meet the specific application requirements of users, and can be properly installed and deployed in some existing systems, and can obtain better scalability according to the particularity of the cloud computing environment.
Similar content being viewed by others
References
Abbas H, Maennel O, Assar S (2017) Security and privacy issues in cloud computing. Ann Telecommun 72(5–6):233–235
Abdullahi M, Ngadi MA, Abdulhamid SM (2016) Symbiotic organism search optimization based task scheduling in cloud computing environment. Future Gener Comput Syst 56:640–650
Ali AB, Ali T, Wafaa AK (2017) Financial incentives for adopting cloud computing in higher educational institutions. Asian Soc Sci 13(4):162–174
Anshari M, Alas Y, Guan LS (2016) Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge. Educ Inf Technol 21(6):1663–1677
Barsoum AF, Hasan MA (2017) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485–497
Cai H, Xu B, Jiang L et al (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Int Things J 4(1):75–87
Cao Z, Lin J, Wan C et al (2017) Optimal cloud computing resource allocation for demand side management. IEEE Trans Smart Grid 8(4):1943–1955
Cavalcante E, Pereira J, Alves MP et al (2016) On the interplay of internet of things and cloud computing: a systematic mapping study. Comput Commun 89:17–33
Chen X, Jiao L, Li W et al (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808
Deng R, Lu R, Lai C et al (2017) Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J 3(6):1171–1181
Ghobaei-Arani M, Shahidinejad A (2021) An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach. J Supercomput 77:711–750. https://doi.org/10.1007/s11227-020-03296-w
Guzek M, Bouvry P, Talbi EG (2016) A survey of evolutionary computation for resource management of processing in Cloud computing. IEEE Comput Intell Mag 10(2):53–67
Han Y, Chan J, Alpcan T et al (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108
Madni SHH, Abd Latiff MS, Coulibaly Y et al (2016) Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J Netw Comput Appl 68:173–200
Masdari M, Valikardan S, Shahi Z et al (2016) Towards workflow scheduling in cloud computing: A comprehensive analysis. J Netw Comput Appl 66:64–82
Sabi HM, Uzoka FME, Langmia K et al (2016) Conceptualizing a model for adoption of cloud computing in education. Int J Inf Manage 36(2):183–191
Shahidinejad A , Mostafa Ghobaei‐Arani (2020) Joint computation offloading and resource provisioning for edge‐cloud computing environment: a machine learning‐based approach[J]. Software: Practice and Experience. https://link.springer.com/article/10.1007%2Fs11227-020-03296-w
Shahidinejad A, Ghobaei-Arani M, Masdari M (2020) Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. Cluster Comput. https://doi.org/10.1007/s10586-020-03107-0
Shahidinejad A, Ghobaei-Arani M, Esmaeili L (2020) An elastic controller using Colored Petri Nets in cloud computing environment. Cluster Comput 23:1045–1071. https://doi.org/10.1007/s10586-019-02972-8
Shen J et al (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925
Shiau WL, Chau PYK (2016) Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach. Inf Manag 53(3):355–365
Singh S, Chana I (2016) A survey on resource scheduling in cloud computing: issues and challenges. J Grid Computing 14(2):217–264
Somani G, Gaur MS, Sanghi D et al (2016) DDoS attacks in cloud computing: collateral damage to non-targets. Comput Netw 109:157–171
Soofi AA, Khan MI (2017) A review on data security in cloud computing. Int J Comput Appl 96(2):95–96
Tsai JL, Lo NW (2017) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815
Wang C, Ren K, Wang J (2016) Secure Optimization computation outsourcing in cloud computing: a case study of linear programming. Comput IEEE Trans on 65(1):216–229
Wang S, Zhou J et al (2017) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277
Wang S, Liang K, Liu JK et al (2017a) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673
Xia Z, Wang X, Zhang L et al (2017) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Xu B, Xu L, Cai H et al (2017) The design of an m-Health monitoring system based on a cloud computing platform. Enterp Inf Syst 11(1):17–36
Yan Q, Yu R, Gong Q et al (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602–622
You C, Huang K, Chae H (2016) Energy efficient mobile cloud computing powered by wireless energy transfer. IEEE J Sel Areas Commun 34(5):1757–1771
Acknowledgements
This work was supported by competition projects of excellent open online courses in colleges and universities of Henan Province in 2018 (Project No. 2018JPKC-GZ017). This work was supported by the bidding project in research and practice of education and teaching reform of Henan Polytechnic in 2019 (Project No. 2019JZ012). This work was supported by science and technology innovation team of Henan Polytechnic (No. 2020-KJCXTD-02).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhai, H., Wang, J. Automatic deployment system of computer program application based on cloud computing. Int J Syst Assur Eng Manag 12, 731–740 (2021). https://doi.org/10.1007/s13198-021-01068-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-021-01068-0