A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers

2020 ◽  
Vol 53 (5) ◽  
pp. 1-41 ◽  
Author(s):  
Weiwei Lin ◽  
Fang Shi ◽  
Wentai Wu ◽  
Keqin Li ◽  
Guangxin Wu ◽  
...  
Author(s):  
Ahan Chatterjee

Cloud computing is the growing field in the industry, and every scale industry needs it now. The high scale usage of cloud has resulted in huge power consumption, and this power consumption has led to increase of carbon footprint affecting our mother nature. Thus, we need to optimize the power usage in the cloud servers. Various models are used to tackle this situation, of which one is a model based on link load. It minimized the bit energy consumption of network usage which includes energy efficiency routing and load balancing. Over this, multi-constraint rerouting is also adapted. Other power models which have been adapted are virtualization framework using multi-tenancy-oriented data center. It works by accommodating heterogeneous networks among virtual machines in virtual private cloud. Another strategy that is adopted is cloud partitioning concept using game theory. Other methods that are adopted are load spreading algorithm by shortest path bridging, load balancing by speed scaling, load balancing using graph constraint, and insert ranking method.


2016 ◽  
Vol 25 (06) ◽  
pp. 1650057
Author(s):  
Je-Hoon Lee

This paper presents two power models for an asynchronous processor, A8051. The first one is a pipeline accurate model which models power consumption at each pipeline stage. The other one is a micro-architectural model which models power consumption at micro-operation level. Then, we demonstrate the feasibility of the proposed approach on an A8051 processor case study. The experimental results based on applying the proposed pipeline-accurate and micro-architectural power models on an A8051 processor demonstrate that the proposed power models have high accuracy with simulation times much faster than the conventional low-level power simulator. It also shows similar results compared to the conventional power model for a synchronous processor. Even though the simulation speeds for the proposed power models are approximately 100–900 times faster than the low-level power simulator, the differences are less than 18% and 15%, respectively. Thus, the proposed power models can give a guide for SoC designers who want to integrate the asynchronous processor for low-power SoC design.


VLSI Design ◽  
2002 ◽  
Vol 14 (2) ◽  
pp. 219-227 ◽  
Author(s):  
May Huang ◽  
Raymond Kwok ◽  
Shu-park Chan

An empirical algorithm applied to logic level power analysis in deep submicron VLSI designs is introduced in the paper. The method explores a static analysis strategy using unit functions to represent signal transitions. It can be extended to the use of a Register Transfer Level (RTL) power analysis after RTL codes are translated to Boolean equations. A new method for representing state-dependent power models is also introduced in the paper to reduce the complexity of power modeling and to improve the performance of power analysis. The modeling method supports not only the empirical power analysis, but also general simulation-based power analysis methods.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1197
Author(s):  
Kitak Lee ◽  
Seung-Ryeol Ohk ◽  
Seong-Geun Lim ◽  
Young-Jin Kim

Modern mobile application processors are required to execute heavier workloads while the battery capacity is rarely increased. This trend leads to the need for a power model that can analyze the power consumed by CPU and GPU at run-time, which are the key components of the application processor in terms of power savings. We propose novel CPU and GPU power models based on the phases using performance monitoring counters for smartphones. Our phase-based power models employ combined per-phase power modeling methods to achieve more accurate power consumption estimations, unlike existing power models. The proposed CPU power model shows estimation errors of 2.51% for ARM Cortex A-53 and 1.97% for Samsung M1 on average, and the proposed GPU power model shows an average error of 8.92% for the Mali-T880. In addition, we integrate proposed CPU and GPU models with the latest display power model into a holistic power model. Our holistic power model can estimate the smartphone′s total power consumption with an error of 6.36% on average while running nine 3D game benchmarks, improving the error rate by about 56% compared with the latest prior model.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Sign in / Sign up

Export Citation Format

Share Document