Methodology for evaluation and selection of software and hardware for creation of a cloud environment with a single information space based on fuzzy cluster analysis
Abstract
The study aimed to develop a theoretical methodology for evaluating and selecting software and hardware for creating a cloud environment with a single information space, based on the use of fuzzy cluster analysis. The research issue was the difficulty of choosing the optimal solution in the face of uncertainty, which was typical for the process of cloud infrastructure creation. The methodology included an analysis of existing approaches, the formation of a system of evaluation criteria, theoretical justification and construction of a mathematical model for fuzzy evaluation of alternatives and involved the use of fuzzy cluster analysis to group alternative solutions based on multi-criteria assessments, including parameters such as performance, cost, scalability, reliability and security. Testing was conducted on real data from five leading cloud platform providers. The results demonstrated that the use of fuzzy cluster analysis increased the accuracy of cloud infrastructure options assessment by 23% compared to traditional methods. The application of the methodology on real-life examples demonstrated its effectiveness in the decision-making process when creating cloud environments, which was confirmed by the achieved increase in productivity and reduction in the cost of implementing and maintaining the system. The fuzzy cluster analysis identified three optimal hardware and software configurations that used computing resources 18% more efficiently. The developed algorithm demonstrated the processing capabilities of uncertainty in input data, reducing the impact of the subjectivity of expert opinions by 31%. The conclusions of this study emphasised that the fuzzy cluster analysis method is a substantial technology for evaluating and selecting software and hardware in modern IT projects, ensuring adaptability and accuracy in decision-making and increasing the validity of decision-making in planning corporate cloud environments, reduce the risks of choosing suboptimal configurations, and ensure more efficient use of resources in a single information space.References
Kirpichnikov, Y.A., Kapilevich, V.O., Androschuk, O.V., Petrushen, M.V. 2022. Application of a data-centric approach when building an information infrastructure using cloud technologies for defense needs. Collection of Scientific Works of the Center for Military and Strategic Studies of the National Defense University of Ukraine named after Ivan Chernyakhovsky, 3(76), 68-75. https://doi.org/10.33099/2304-2745/2022-3-76/68-75
Buyya, R., Srirama, S.N. 2019. Fog and edge computing: Principles and paradigms. Hoboken: John Wiley & Sons. http://doi.org/10.1002/9781119525080
Gill, S.S., Tuli, S., Xu, M., Singh, I., Singh, K.V., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S.S., Misra, S., Aslanpour, M.S., Mehta, H., Stankovski, V., Garraghan, P. 2019. Transformative effects of IoT, blockchain, and artificial intelligence on cloud computing: Evolution, vision, trends, and open challenges. Internet of Things, 8, 100118. https://doi.org/10.1016/j.iot.2019.100118
Kirpichnikov, Y.A., Golovchenko, O.V., Androschuk, O.V., Petrushen, M.V., Rozumnyi, O.D. 2023. Assessment model of alternative options for the implementation of information and communication services using cloud technologies for defense needs. Collection of Scientific Works of the Center for Military and Strategic Studies of the National Defense University of Ukraine named after Ivan Chernyakhovsky, 1(77), 79-88. https://doi.org/10.33099/2304-2745/2023-1-77/79-88
Singh, A., Singh, P., Tiwari, A.K. 2021. A comprehensive survey on machine learning. Journal of Management and Service Science, 1(1), 1-17. https://doi.org/10.54060/jmss/001.01.003
Buyya, R., Srirama, S.N., Casale, G., Calheiros, R., Simmhan, Y., Varghese, B., Gelenbe, E., Javadi, B., Vaquero, L.M., Netto, M.A.S., Toosi, A.N., Rodriguez, M.A., Llorente, I.M., De Capitani Di Vimercati, S., Samarati, P., Milojicic, D., Varela, C., Bahsoon, R., Dias De Assuncao, M., Rana, O., Zhou, W., Jin, H., Gentzsch, W., Zomaya, A.Y., Shen, H. 2019. A manifesto for future generation cloud computing: Research directions for the next decade. Association for Computing Machinery: Computing Surveys, 51(5), 105. https://doi.org/10.1145/3241737
Kumar, M., Sharma, S.C., Goel, A., Singh, S.P. 2019. A comprehensive survey for scheduling techniques in cloud computing. Journal of Network and Computer Applications, 143, 1-33. https://doi.org/10.1016/j.jnca.2019.06.006
Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K., Zhang, J. 2019. Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proceedings of the Institute of Electrical and Electronics Engineers, 107(8), 1738-1762. https://doi.org/10.1109/jproc.2019.2918951
Zhu, G., Liu, D., Du, Y., You, C., Zhang, J., Huang, K. 2020. Toward an intelligent edge: Wireless communication meets machine learning. Institute of Electrical and Electronics Engineers: Communications Magazine, 58(1), 19-25. https://doi.org/10.1109/mcom.001.1900103
Zhao, Y., Zhao, J., Jiang, L., Tan, R., Niyato, D., Li, Z., Lyu, L., Liu, Y. 2019. Privacy-preserving blockchain-based federated learning for IoT devices. Institute of Electrical and Electronics Engineers: Internet of Things Journal, 8(3), 1817-1829. http://doi.org/10.1109/JIOT.2020.3017377
Tufail, A., Namoun, A., Alrehaili, A., Ali, A. 2021. A survey on 5G Enabled multi-access edge computing for smart cities: Issues and future prospects. International Journal of Computer Science and Network Security, 21(6), 107-118. http://doi.org/10.22937/IJCSNS.2021.21.6.15
Wang, J., Ling, X., Le, Y., Huang, Y., You, X. 2021. Blockchain-enabled wireless communications: A new paradigm towards 6G. National Science Review, 8(9), nwab069. https://doi.org/10.1093/nsr/nwab069
Gracia, M.B., Malele, V., Ndlovu, S.P., Mathosi, T.E., Maaka, L., Muchenje, T. 2022. 6G security challenges and opportunities. 2022. In: 13th International Conference on Mechanical and Intelligent Manufacturing Technologies (pp. 339-343). Cape Town: Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICMIMT55556.2022.9845296
Mendez, J., Bierzynski, K., Cuéllar, M.P., Morales, D.P. 2022. Edge intelligence: Concepts, architectures, applications, and future directions. Association for Computing Machinery: Transactions on Embedded Computing Systems, 21(5), 48. https://doi.org/10.1145/3486674
Pham, Q.-V., Fang, F., Ha, V.N., Piran, M.J., Le, M., Le, L.B., Hwang, W.-J., Ding, Z. 2020. A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art. Institute of Electrical and Electronics Engineers: Access, 8, 116974-117017. https://doi.org/10.1109/access.2020.3001277
Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., Zomaya, A.Y. 2020. Edge intelligence: The confluence of edge computing and artificial intelligence. Institute of Electrical and Electronics Engineers: Internet of Things Journal, 7(8), 7457-7469. https://doi.org/10.1109/JIOT.2020.2984887
Toosi, A.N., Mahmud, M.R., Chi, Q., Buyya, R. 2019. Management and orchestration of network slices in 5G fog, edge, and clouds. In: R. Buyya, S.N. Srirama (Eds.), Fog and Edge Computing: Principles and Paradigms (pp.79-101). Hoboken: John Wiley & Sons. http://doi.org/10.1002/9781119525080.ch4
Tuli, S., Mahmud, R., Tuli, S., Buyya, R. 2019. FogBus: A blockchain-based lightweight framework for edge and fog computing. Journal of Systems and Software, 154, 22-36. https://doi.org/10.1016/j.jss.2019.04.050
Luong, N.C., Hoang, D.T., Gong, S., Niyato, D., Wang, P., Liang, Y.-C., Kim, D.I. 2019. Applications of deep reinforcement learning in communications and networking: A survey. Institute of Electrical and Electronics Engineers: Communications Surveys & Tutorials, 21(4), 3133-3174. https://doi.org/10.1109/comst.2019.2916583
Park, J., Samarakoon, S., Bennis, M., Debbah, M. 2019. Wireless network intelligence at the edge. Proceedings of the Institute of Electrical and Electronics Engineers, 107(11), 2204-2239. https://doi.org/10.1109/jproc.2019.2941458
Mozaffari, M., Saad, W., Bennis, M., Nam, Y., Debbah, M. 2019. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. Institute of Electrical and Electronics Engineers: Communications Surveys & Tutorials, 21(3), 2334-2360. https://doi.org/10.1109/comst.2019.2902862
Lim, W.Y.B., Luong, N.C., Hoang, D.T., Jiao, Y., Liang, Y.-C., Yang, Q., Niyato, D., Miao, C. 2020. Federated learning in mobile edge networks: A comprehensive survey. Institute of Electrical and Electronics Engineers: Communications Surveys & Tutorials, 22(3), 2031-2063. https://doi.org/10.1109/comst.2020.2986024
Wang, F., Zhang, M., Wang, X., Ma, X., Liu, J. 2020. Deep Learning for edge computing applications: A state-of-the-art survey. Institute of Electrical and Electronics Engineers: Access, 8, 58322-58336. https://doi.org/10.1109/access.2020.2982411
Satyanarayanan, M., Klas, G., Silva, M., Mangiante, S. 2019. The seminal role of edge-native applications. In: International Conference on Edge Computing (pp. 33-40). Milan: Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/EDGE.2019.00022
Lin, Q. 2021. Dynamic resource allocation strategy in mobile edge cloud computing environment. Mobile Information Systems, 2021(1), 8381998. http://doi.org/10.1155/2021/8381998
Singh, J., Singh, P., Gill, S.S. 2021. Fog computing: A taxonomy, systematic review, current trends and research challenges. Journal of Parallel and Distributed Computing, 157, 56-85. https://doi.org/10.1016/j.jpdc.2021.06.005
Letaief, K.B., Shi, Y., Lu, J., Lu, J. 2021. Edge artificial intelligence for 6G: Vision, enabling technologies, and applications. Institute of Electrical and Electronics Engineers: Journal on Selected Areas in Communications, 40(1), 5-36. https://doi.org/10.1109/JSAC.2021.3126076
Saad, W., Bennis, M., Chen, M. 2019. A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. Institute of Electrical and Electronics Engineers: Network, 34(3), 134-142. https://doi.org/10.1109/mnet.001.1900287
Porambage, P., Kumar, T., Liyanage, M., Partala, J., Lovén, L., Ylianttila, M., Seppänen, T. 2019. Sec-EdgeAI: AI for edge security vs security for edge AI. In: Conference: 1st 6G Wireless Summit. Levi: Institute of Electrical and Electronics Engineers. https://www.researchgate.net/publication/330838792_SecEdgeAI_AI_for_Edge_Security_Vs_Security_for_Edge_AI
Liu, Y., Nie, J., Li, X., Ahmed, S.H., Lim, W.Y.B., Miao, C. 2020. Federated learning in the sky: Aerial-ground air quality sensing framework with UAV swarms. Institute of Electrical and Electronics Engineers: Internet of Things Journal, 8(12), 9827-9837. https://doi.org/10.1109/jiot.2020.3021006
DOI:
https://doi.org/10.31449/inf.v49i37.8682Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







