<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Economic data replication management in the cloud</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Abdenour</forename><surname>Lazeb</surname></persName>
							<email>lazeb.abdenour@edu.univ-oran1.dz</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Oran1</orgName>
								<orgName type="institution" key="instit2">Ahmed Ben Bella</orgName>
								<address>
									<settlement>Algérie</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Riad</forename><surname>Mokadem</surname></persName>
							<email>riad.mokadem@irit.fr</email>
							<affiliation key="aff1">
								<orgName type="department">Institut de Recherche en Informatique de Toulouse (IRIT)</orgName>
								<orgName type="institution">Paul Sabatier University</orgName>
								<address>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ghalem</forename><surname>Belalem</surname></persName>
							<email>ghalem1dz@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution" key="instit1">Université Oran1</orgName>
								<orgName type="institution" key="instit2">Ahmed Ben Bella</orgName>
								<address>
									<settlement>Algérie</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Economic data replication management in the cloud</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">47A0EA1CF91D07C9BC7C7D54543AF1FA</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:19+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Data Management</term>
					<term>Cloud Systems</term>
					<term>SLA</term>
					<term>Provider</term>
					<term>Data Replication</term>
					<term>Cost Model</term>
					<term>Business Model</term>
					<term>Performance</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The applications produce huge volumes of data that are distributed on remote and heterogeneous sites. This generates problems related to access and sharing of such data. As a result, managing data in large-scale environments is a real challenge. In this context, large-scale data management systems often use data replication, a well-known technique that treats generated problems by storing multiple copies of data, called replicas, across multiple nodes. Most of the replication strategies in these environments are difficult to adapt to cloud environments. They aim to achieve the best performance of the system without meeting the important objectives of the cloud provider. Our proposed approach generates the optimal replication strategy. In theory, we show that our algorithm significantly improves provider gain over a wide range of cloud and SLA-conditions without neglecting customer satisfaction.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Cloud Computing could be common term utilized to portray a modern lesson of organizing based computing that takes put over the Web.</p><p>In addition, the stage gives on-demand services, that are continuously on, anytime and any place. Pay for utilizing and as required, elastic(scale up and down in capacity and functionalities). The equipment and software services are accessible to common public, undertakings, organizations and businesses markets But, what commitments does the cloud provider that you have chosen? How long will it take to restart your solution in case of a problem? Can he lose your data? These are classic questions that I am regularly asked when I talk about cloud computing the answer is in the SLA established between a cloud provider and its tenants, i.e., consumers. which includes the service level objectives (SLO) of the tenant, for example, availability and performance, which must be met by the provider.</p><p>For that reason, It is very important to focus on replication strategies for efficient and fast exploitation data in cloud. These strategies address classic problems such as: (i) which data to replicate? (ii) when to replicate these data? (iii) where to replicate these data but also to specific issues of the cloud environment such as (iv) determine the number of necessary replicas such as the objectives of the tenant will be satisfied while ensuring a profit for the cloud provider.</p><p>Some solutions can be brought to this problem: i. The proposal of a cost model allowing replication only if it is necessary. ii. Effective placement of data replicas.</p><p>iii. An elastic management of the number of replicas.</p><p>iv. The proposition of an economic model for the cloud provider such as information replication is advantageous. Usually conditioned by a minimization of the punishments paid by the provider which makes it possible to extend its economic profit.</p><p>To guarantee failure tolerance, a capacity advertising copies data among different copies. These copies store the same set of information, so in case any of copies is lost, information may still be gotten and recouped from the other replicas.</p><p>In this paper, we will propose an algorithm that mixes all these solutions for good replication management.</p><p>This paper is organized as follows: Section 2 tackle Related work, Section 3 explains our approach aspects ; Positioning of our approach is presented in Section 4 And at the last section contains the conclusions and future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>Several types of research have been dedicated to the field of dynamic replication. we find:</p><p>Fei Xie et al. <ref type="bibr" target="#b0">[1]</ref> set three threshold parameters for dataset conditions among datasets, get to frequencies of datasets, and the storage capacity of information centers. Dataset reliance among datasets and get to recurrence for each dataset are calculated as limitations of the dataset. They utilize the limit esteem of capacity space to restrain information replication to maintain a strategic distance from flood issues and guarantee full errand completion in the corresponding area. They moreover classify information sorts into three categories, settled dataset, free-flexible dataset and constrained-flexible dataset, to develop a mapping between datasets and each information center. By receiving their methodology, they endeavor to assist diminish information development and information exchange cost. Their work I find it a little expensive compared to ours and does not treat current state each time.</p><p>Tadeusz et al. <ref type="bibr" target="#b1">[2]</ref> propose a strategy for reproducing NoSQL information. The calculation is called Lorq. The most highlights of Lorq are (a) information replication is realized by implies of reproducing logs putting away upgrade operations, and socalled pulse operation sent by the pioneer; (b) the preparing and replication methodologies ensure that inevitably all operations in each replica are executed within the same arrange and no operation is misplaced. An uncommon consideration is paid to distinctive sorts of consistency, which can be ensured by the framework. they propose a strategy based on data put away by client administrations to ensure diverse consistency levels, in this manner actualizing SLA usefulness But replicated data types specification, verification and optimality <ref type="bibr" target="#b2">[3]</ref> are neglecting.</p><p>Xiuguo et al. <ref type="bibr" target="#b7">[5]</ref> went towards accomplishing the least taken a toll copies dispersion benchmark in a down to earth way, they propose a reproductions arrangements procedure show, counting the way to distinguish the need of making reproduction, and plan an calculation for copies situations that can effectively decrease the whole taking a toll within the cloud and proposing information sets administration fetched models, including capacity fetched and exchange taken a toll; showing a novel worldwide information set copies arrangements methodology from cost-effective see named MCRP, which is an inexact minimum-cost arrangement. They proposed a cost-effective information replication methodology with a thought of get to recurrence and the average response time to decide whether the dataset should be imitated or not in cloud environment.</p><p>Sathiya et al. <ref type="bibr" target="#b8">[6]</ref> examine changes on a consistency convention called LibRe, which acts as an in-between consistency technique between the default inevitable consistency and the solid consistency choices determined from the crossing point property. The initial LibRe convention utilized a registry, which records the list of replica nodes containing the foremost later form of the information things. Consequently, alluding to the registry amid examined time makes a difference to forward the studied demands to a reproduction hub holding the foremost later form of the required information thing. For the other side, protocol would encounter brief inconsistency.</p><p>Tos et al. <ref type="bibr" target="#b11">[8]</ref> propose Execution and Benefit Arranged Information Replication Methodology (PEPR) that guarantees SLA ensures, e.g. accessibility and execution, to the occupant whereas maximizing the financial advantage of the cloud provider. For the degree of execution, they consider reaction time ensure as a fundamental portion of the SLA. In PEPR, when assessing an inquiry, in the event that an assessed reaction time esteem is more prominent than the SLO reaction time limit, this implies that a replication prepare may be activated. At that time, economic benefit, i.e. profitability, of the cloud provider is additionally estimated. Replication choice is made as it were when both the reaction time and financial advantage of the provider are satisfied. The number of copies is powerfully balanced taking after whether the SLA objectives are fulfilled over time. Additionally, the least number of copies are continuously kept to guarantee least availability.Response time estimation for inhabitant inquiries are calculated when the queries are arrive at the cloud. If the estimation show that a alluring execution cannot be fulfilled, information replication is performed, but as it were when it is financially attainable for the provider.</p><p>Yaser et al. <ref type="bibr" target="#b12">[9]</ref> think about is propelled by these pioneer considers as none of them can at the same time reply around arrangements and relocation times of objects. To address these questions, they make the taking after key commitments: To begin with, by misusing energetic programming, they define offline taken a toll optimization issue in which the ideal fetched of capacity, Get, Put, and movement is calculated where the precise future workload is assumed to be known a priori. Moment, they propose two online calculations to discover near-optimal taken a toll.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Proposed Strategy</head><p>We propose a replication strategy which contains dependent and independent modules in the architecture shown in </p><formula xml:id="formula_0">  . .1 .2 .3 .4 . , ,<label>, , , i h i</label></formula><formula xml:id="formula_1">i i i i H G G G G G G  Each Group have Leader . ih L So   . .1 .2 .3 .4 .</formula><p>, , , , </p><formula xml:id="formula_2">i h i i i i i H L L L L L L  Without forgetting that</formula><formula xml:id="formula_3">i h k j i h k i h k i h k i h k M F F F F F  .</formula><p>For example, 5.7.2.3 F means file 3 of node 2 of group 7 of data center 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Description</head><p>our architecture consists of three module described as follows:</p><p>Global System Module: it's a component contains three elements that are used globally throughout the system Min Access Cost: for all transactions, it is necessary that the requests follow the shortest way to arrive at the desired destination (Djikstra algorithm) without neglecting the cost of access for each Node traversed.  Solver: Since our problem is to determine the number of necessary replicas such as the objectives of the tenant will be satisfied while ensuring a profit for the cloud provider we think about this Mathematical statement of the problem:</p><formula xml:id="formula_4">1 1 1 , 1 subject to ,<label>1, , 1, , 1, , 1, , 1,</label></formula><formula xml:id="formula_5">n m ij ij i j m j ij i j n j ij u j i ij Minimize C x v x Cap i n a x Td j m u r x N i n j m               <label>(2)</label></formula><p>Where: Cij : replication cost and allocate Dataset j space in the datacenter i (Fi.h.k.j) // whatever the node or the cluster Xij: number replicas of dataset j in the datacenter i (Fi.h.k.j) Vj: storage space (file size) of Dataset j (Fi.h.k.j) (file size) Capi : Storage capacity Of DCi where 1 1</p><formula xml:id="formula_6">K H i ihk k h Cap S     (3) aj: the Coefficient importance of Dataset j (Fi.h.k.j) 1 1 1 1 j n K H ihkj i k h a P     <label>(4)</label></formula><p>Tdu,j: Threshold SLA fixed by provider and consumer u for the Dataset j (Fi.h.k.j) Such as the resolution is done by the simplex. At the end, we replicate and delete to reach the optimal number of replicas.</p><p>Repair: We want the system to take into consideration consistency and fault tolerance so it is preferable to resolve them by the principle of quorum we start to launch a verification request for all the replicas to obtain the correct value by the majority and we make the update for all the data with errors and false value.</p><p>Springy: An elasticity of the resources it can be an increase or decrease according to the popularity of each data, it means duplicate a data 𝐹 𝑖ℎ𝑘𝑗 if its popularity (frequency of access to this data) is greater than a given threshold Treplication and delete a data 𝐹 𝑖ℎ𝑘𝑗 if its popularity (frequency of access to this data) is lower than a given threshold Terasure.</p><p>The popularity of each file is calculated by the following simple formula:</p><formula xml:id="formula_7">𝑃 𝑖ℎ𝑘𝑗 = 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑒𝑞𝑢𝑒𝑠𝑡 𝑓𝑜𝑟 𝑡ℎ𝑒 𝐹 𝑖ℎ𝑘𝑗 𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑒𝑞𝑢𝑒𝑠𝑡 (5)</formula><p>SLA Violation: SLA Violation Use quality of service, maximum budget for each customer and minimum response time as a constraint in a cost minimization based algorithm. in cases of very strict violation, the Replication mechanism triggers an increase in resources.</p><p>DC Mapping: a module made to orientate the request to the Concerned data center since it contains an information structure about all data centers (fast indexing).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data-Center Module:</head><p>We see that the data centers contains cluster each cluster contains nodes and a leader as well as two module Node mapping and leader election.. Leader Election: Sometimes the completion of a task requires the involvement of multiple instances of the same cloud service. If the service consumer invoking the cloud service instances does not have the necessary logic to coordinate them, runtime exceptions can occur leading to data corruption and failure to complete the task.</p><p>These are the most available nodes in each Group in Data Center by following Algo of selection (sorted list of the availability of the nodes and takes the first one).</p><p>Node Mapping: a module made to orientate the request to the Concerned data center since it contains an information structure about all Node in the Data Center (fast indexing) . It is linked with the Leaders.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Functioning of system</head><p>As we already said before, each module has a mechanism that works in it. In the following section, we will describe them one by one:</p><p>Solver: a sequence of operations to be executed: First, Master Ask for data matrices from Global System Module to solve the problem of constraints. Then, Master sends an execution command according to the result obtained by the solver to Datacenters. Next, Leaders ask for concerned Node and receive Result. Finally, they Execute Commands (Replicate or Delete).</p><p>Response and Repair: For this part, we distinguish three cases: -1st Case: we have: user request node for data and Get response immediately. if the response not founded we switch to the second case -2nd Case: we have: First, user request node for data .then request transferred to one leader of data-center. This last one ask for concerned Node and transfer request to him. Finally, user receive response. If the response not founded locally (in the data center) we switch to the third case -3rd Case we have: First, user request node for data .then request transferred to one leader of data-center. This last one ask for concerned Node and receive "Not founded". So , he Transfer request to Master who also transfer request to leaders (one for each datacenter).then Leader request for the value of the data after applying the majority quorum (we keep the true value and we correct the rest).Then, they send the value to the master who creates a copy at the nearest customer node (bring data closer to the client -best client-reduce response time, cost of access and replicate to increase availability).Finally , Response will be transferred to the user.</p><p>Springy: the procedure starts with : First , Master ask for Popularity Matrix from Global System Module sending to solve algorithm (already mentioned in description section ).</p><p>Next, Master sends an execution command according to the result obtained by the Springy Modules to Datacenters (Leaders).</p><p>Leaders ask for concerned Node and receive Result. Finally, they Execute Commands (Replicate or Delete).</p><p>SLA Violation: the success of operations begins with : 2) User triggers a violation alert. Then, Master send a command to increase resources.So Leaders take the data for replicated in the closest node to the client.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Positioning Of Our Approach</head><p>We will try to position our approach in relation to other articles in the state of the art by taking into consideration several characteristics described as follows: Fig. <ref type="figure">2</ref>  For example, if we compare article of Mohammed Bsoul (2013) <ref type="bibr" target="#b9">[7]</ref> with our article we find that he studied latency, avaibility and popularity but he has neglected the cost and the consistency thus other parameters that one included them in our approach.</p><p>In the other side, we find that Ilir Fetai (2017) <ref type="bibr" target="#b19">[14]</ref> omit Avaibility and placement of replica . These two parameter are important for our studies.</p><p>On the other hand, the approach of Najme MANSOURI (2015) <ref type="bibr" target="#b16">[11]</ref> has been very interesting since she has studied several criteria but she has neglected the popularity of the files which has an impact on the when and how much to replicate and delete.</p><p>Finally, no way to compare with Hussam Abu-Libdeh(2013) <ref type="bibr" target="#b17">[12]</ref> because it focus on two parameters are consistency and tolerance to failure on ten parameters to study in our approach .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion and Perspectives</head><p>In this investigate work; replication of datasets has been presented with existing information arrangement procedure. It is incomprehensible to fulfill all the conditions to put the datasets at fitting position where all assignments can get to the information with the least information exchange cost and fulfillment of SLA goals despite the fact of using the majority of the parameters like cost, latency, response time, popularity with different method like simplex and quorum. In the future, we try to apply this method in a simulation environment as cloudsim to better deflate the results of this proposed approach.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig 1 .Fig. 1 .</head><label>11</label><figDesc>Fig. 1. Architecture of Proposed approach</figDesc><graphic coords="4,124.68,217.20,345.72,237.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>of access Node j.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>:</head><label></label><figDesc>Cost of transfer by the link i. Data Matrices: As his name means, it accommodate three matrices: Matrix of Popularity𝑃 𝑖ℎ𝑘𝑗 , which refers to the access frequency for each replica . Matrix of Capacity-Node Sihk for the storage of Host (Node) . Matrix of Size-Dataset Vj for storage space of Dataset . Matrix of Threshold , u jTd is compromise between quality of service, maximum budget and minimum response time for each customer ( average quality and , 5 uj   a very high budget) all these parameters are established in a contract SLA-Conditions. Master Module: We can call it the brain since it has several components we start with:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,190.95,595.32,460.02" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>Comparison table of different approaches Fig 2 shown Comparison table of different approaches compared to the features and services studied in this experiment and before like Cost, latency, Availability, throughput / bandwidth, Placement, Size,replica, Consistency, Fault tolerance, Popularity, Leader Election.</figDesc><table><row><cell></cell><cell></cell><cell>Cost</cell><cell>latency</cell><cell cols="2">Availability throughput</cell><cell>Placement</cell><cell>Size</cell><cell>Consistency</cell><cell>Fault toler-</cell><cell>Popularity</cell><cell>Leader</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>/ bandwidth</cell><cell></cell><cell>replica</cell><cell></cell><cell>ance</cell><cell></cell><cell>Election</cell></row><row><cell cols="2">Fei-Xie(2017) [1]</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell>Yes</cell></row><row><cell>Hussam</cell><cell>Abu-Lib-</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell></cell></row><row><cell cols="2">deh(2013) [12]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Guy-Laden-(2011)</cell><cell></cell><cell>Yes</cell><cell></cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>[10]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Jayalakshmi-D.S</cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Yes</cell></row><row><cell>2015 [14]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Ismaeel-AlRidhawi</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2015 [13]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Yaser Mansouri 2017</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>[9]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Zhendong</cell><cell>Cheng</cell><cell></cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2012 [4]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Najme</cell><cell>Mansouri</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell>Yes</cell><cell></cell></row><row><cell>2015 [11]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Mohammad Bsoul</cell><cell></cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Yes</cell></row><row><cell>2013 [7]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Ilir-Fetai 2017[15]</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Yes</cell><cell></cell><cell></cell></row><row><cell cols="2">Farouk Bouharaouaa</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell></cell><cell></cell><cell></cell><cell>Yes</cell><cell></cell><cell></cell><cell>Yes</cell></row><row><cell>2017 [16]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Our Approach</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell><cell>Yes</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Towards Cost Reduction in Cloud-Based Workflow Management</title>
		<author>
			<persName><forename type="first">Fei</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">; Jun</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jun</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth International Conference on Advanced Cloud and Big Data</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Evaluation of Novel Approaches to Software Engineering</title>
		<author>
			<persName><forename type="first">T</forename><surname>Pankowski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ENASE</title>
		<imprint>
			<biblScope unit="page" from="62" to="79" />
			<date type="published" when="2015">2015. 2016</date>
		</imprint>
	</monogr>
	<note>Lorq: A System for Replicated NoSQL Data</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Replicated data types: specification, verification, optimality</title>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Burckhardt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Zhendong</forename><surname>Cheng</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Zhongzhi</forename><surname>Luan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">; You</forename><surname>Meng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yijing</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Depei</forename><surname>Qian</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Alain</forename><surname>Roy</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">ERMS : An Elastic Replication Management System for HDFS</title>
		<author>
			<persName><forename type="first">Ning</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><surname>Gang Guan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Cluster Computing Workshops</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="32" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Data Sets Replicas Placements Strategy from Cost-Effective View in the Cloud</title>
		<author>
			<persName><forename type="first">Xiuguo</forename><surname>Wu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Hindawi Publishing Corporation</publisher>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">CaLibRe: A better Consistency-Latency Tradeoff for Quorum based Replication systems</title>
		<author>
			<persName><forename type="first">Prabhu</forename><surname>Sathiya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sylvain</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><surname>Lefebvre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DEXA 2015</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Globe</publisher>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="2" to="14" />
		</imprint>
	</monogr>
	<note>Database and Expert Systems Applications</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Mohammad</forename><surname>Bsoul</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Round-based Data Replication Strategy</title>
		<author>
			<persName><forename type="first">Alaa</forename><forename type="middle">E</forename><surname>Abdallah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Khaled</forename><surname>Almakadmeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Parallel and Distributed Systems</title>
		<imprint>
			<biblScope unit="page" from="2" to="18" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Performance and Profit Oriented Data Replication Strategy for Cloud Systems</title>
		<author>
			<persName><forename type="first">Uras</forename><surname>Tos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><surname>Riad Mokadem ; Abdelkader Hameurlain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tolga</forename><surname>Ayav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sebnem</forename><surname>Bora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Conferences on Ubiquitous Intelligence &amp; Computing</title>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Yaser</forename><surname>Mansouri</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Adel</forename><surname>Nadjaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Toosi</forename></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers</title>
		<author>
			<persName><forename type="first">Rajkumar</forename><surname>Buyya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cloud Computing</title>
		<imprint>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Adaptive and Dynamic Funnel Replication in Clouds</title>
		<author>
			<persName><forename type="first">Guy</forename><surname>Laden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roie</forename><surname>Melamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ymir</forename><surname>Vigfusson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGOPS Operating Systems Review</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="40" to="46" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Adaptive data replication strategy in cloud computing for performance improvement</title>
		<author>
			<persName><forename type="first">N</forename><surname>Mansouri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Frontiers of Computer Science</title>
		<imprint>
			<biblScope unit="page" from="1" to="11" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Elastic Replication for Scalable Consistent Services</title>
		<author>
			<persName><forename type="first">H</forename><surname>Abu-Libdeh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Location-Aware Data Replication in Cloud Computing Systems</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Al</forename><surname>Ridhawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nour</forename><surname>Mostafa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wassim</forename><surname>Masri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eight International Workshop on Selected Topics in Mobile and Wireless Computing</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Dynamic Data Replication Strategy in Cloud Environments</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Jayalakshmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">P</forename><surname>Rashmi Ranjana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Srinivasan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth International Conference on Advances in Computing and Communications</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Ilir</forename><surname>Fetai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Stiemer</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">QuAD: A quorum protocol for adaptive data management in the cloud</title>
		<author>
			<persName><forename type="first">Heiko</forename><surname>Schuldt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="405" to="414" />
		</imprint>
	</monogr>
	<note>Big Data (Big Data)</note>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A quorum-based intelligent replicas management in data grids to improve performances</title>
		<author>
			<persName><forename type="first">Farouk</forename><surname>Bouharaoua</surname></persName>
		</author>
		<author>
			<persName><surname>Belalem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multiagent and Grid Systems</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="143" to="161" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>Ghalem</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
