12
Research Article Assessment of In-Cloud Enterprise Resource Planning System Performed in a Virtual Cluster Bao Rong Chang, 1 Hsiu-Fen Tsai, 2 Chia-Yen Chen, 1 and Yun-Che Tsai 1 1 Department of Computer Science and Information Engineering, National University of Kaohsiung, Kaohsiung 81148, Taiwan 2 Department of Marketing Management, Shu-Te University, Kaohsiung 82445, Taiwan Correspondence should be addressed to Chia-Yen Chen; [email protected] Received 11 June 2014; Accepted 10 August 2014 Academic Editor: Teen-Hang Meen Copyright © 2015 Bao Rong Chang et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. is paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) which has deployed in the virtual machine cluster. e proposed approach can resolve the crucial problems of ERP failure due to unexpected downtime and failover between physical hosts in enterprises, causing operation termination and hence data loss. Besides, the proposed one together with the access control authentication and network security is capable of preventing intrusion hacked and/or malicious attack via internet. Regarding system assessment, cost-performance (C-P) ratio, a remarkable cost effectiveness evaluation, has been applied to several remarkable ERP systems. As a result, C-P ratio evaluated from the experiments shows that the proposed approach outperforms two well-known benchmark ERP systems, namely, in-house ECC 6.0 and in-cloud ByDesign. 1. Introduction e service-oriented packages in enterprises like enterprise resources planning (ERP) system have quite oſten encoun- tered the occurrence of unexpected downtime or power fail- ure that may cause immediately system operation termina- tion and data loss. Technically speaking, to timely transfer everything from a host to another is difficult and to resume the original task in a new host as usual cannot be guaranteed. Furthermore, in the event of task transfer to a new host, one may encounter that data is not able to upload concurrently to a new host from external data source. erefore, in this paper, we introduce a novel approach of high reliability for the task transfer between hosts, that is, a high-performed high-availability in-cloud enterprise resources planning (in- cloud ERP) which has deployed in the virtual machine cluster for tackling the above-mentioned crucial problem. Here, this paper gives a scheme, taking advantage of virtual machine cluster [13] to deal with the failover problem as well. e pro- posed approach has built in-cloud ERP [4, 5] in the virtual environment so that the client is able to use mobile devices wirelessly and easily to access in-cloud services via Wi- Fi/3G, but identity verification must be carried out through access control authentication [6] in the cloud. Besides, an open source ERP, namely, OpenERP [7], has been deployed successfully, as shown in Figure 1, instead of commercial high-price ERP. Additionally, access control authentication [8, 9] as mentioned above has brought into a virtual machine to proceed with identity verification, secured sign-in, and attendance audit, as shown in Figures 2 and 3. us, detecting imminent potential BotNet [10], intrusion hacked, and mali- cious attacks [11] in virtual network can efficiently increase the network security. 2. Authentication and Network Security for Cloud-Based ERP 2.1. In-Cloud ERP and Authentication. Virtual machine clus- tering system in cloud is an integration of virtualization, vir- tual machines, and virtual services so that it can make existing resources be fully applied, such as VMware ESX/ESXi Server [12], Microsoſt Hyper-V R2 [13], or Proxmox Virtual Envi- ronment [14]. is system can let users run many operating systems in a single physical computer simultaneously which largely decreases the expense of purchasing PCs. e most important of all is that it has the following major functions Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2015, Article ID 213461, 11 pages http://dx.doi.org/10.1155/2015/213461

Research Article Assessment of In-Cloud Enterprise ...downloads.hindawi.com/journals/mpe/2015/213461.pdf · Research Article Assessment of In-Cloud Enterprise Resource Planning System

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Research ArticleAssessment of In-Cloud Enterprise Resource Planning SystemPerformed in a Virtual Cluster

Bao Rong Chang1 Hsiu-Fen Tsai2 Chia-Yen Chen1 and Yun-Che Tsai1

1Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 81148 Taiwan2Department of Marketing Management Shu-Te University Kaohsiung 82445 Taiwan

Correspondence should be addressed to Chia-Yen Chen ayennukedutw

Received 11 June 2014 Accepted 10 August 2014

Academic Editor Teen-Hang Meen

Copyright copy 2015 Bao Rong Chang et al This is an open access article distributed under the Creative Commons AttributionLicense which permits unrestricted use distribution and reproduction in any medium provided the original work is properlycited

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) which hasdeployed in the virtual machine cluster The proposed approach can resolve the crucial problems of ERP failure due to unexpecteddowntime and failover between physical hosts in enterprises causing operation termination and hence data loss Besides theproposed one together with the access control authentication and network security is capable of preventing intrusion hackedandor malicious attack via internet Regarding system assessment cost-performance (C-P) ratio a remarkable cost effectivenessevaluation has been applied to several remarkable ERP systems As a result C-P ratio evaluated from the experiments shows thatthe proposed approach outperforms two well-known benchmark ERP systems namely in-house ECC 60 and in-cloud ByDesign

1 Introduction

The service-oriented packages in enterprises like enterpriseresources planning (ERP) system have quite often encoun-tered the occurrence of unexpected downtime or power fail-ure that may cause immediately system operation termina-tion and data loss Technically speaking to timely transfereverything from a host to another is difficult and to resumethe original task in a new host as usual cannot be guaranteedFurthermore in the event of task transfer to a new host onemay encounter that data is not able to upload concurrentlyto a new host from external data source Therefore in thispaper we introduce a novel approach of high reliability forthe task transfer between hosts that is a high-performedhigh-availability in-cloud enterprise resources planning (in-cloud ERP) which has deployed in the virtualmachine clusterfor tackling the above-mentioned crucial problem Here thispaper gives a scheme taking advantage of virtual machinecluster [1ndash3] to deal with the failover problemaswellThepro-posed approach has built in-cloud ERP [4 5] in the virtualenvironment so that the client is able to use mobile deviceswirelessly and easily to access in-cloud services via Wi-Fi3G but identity verification must be carried out through

access control authentication [6] in the cloud Besides anopen source ERP namely OpenERP [7] has been deployedsuccessfully as shown in Figure 1 instead of commercialhigh-price ERP Additionally access control authentication[8 9] as mentioned above has brought into a virtual machineto proceed with identity verification secured sign-in andattendance audit as shown in Figures 2 and 3Thus detectingimminent potential BotNet [10] intrusion hacked and mali-cious attacks [11] in virtual network can efficiently increasethe network security

2 Authentication and Network Security forCloud-Based ERP

21 In-Cloud ERP and Authentication Virtual machine clus-tering system in cloud is an integration of virtualization vir-tualmachines and virtual services so that it canmake existingresources be fully applied such as VMware ESXESXi Server[12] Microsoft Hyper-V R2 [13] or Proxmox Virtual Envi-ronment [14] This system can let users run many operatingsystems in a single physical computer simultaneously whichlargely decreases the expense of purchasing PCs The mostimportant of all is that it has the following major functions

Hindawi Publishing CorporationMathematical Problems in EngineeringVolume 2015 Article ID 213461 11 pageshttpdxdoiorg1011552015213461

2 Mathematical Problems in Engineering

Virtual machineremote desktop

Virtual machineremote desktop

Virtual machinewebsite server

User A User B User C

Controller

Figure 1 In-cloud OpenERP deployment

including virtual machine live migration virtual storage livemigration distributed resource scheduling high availabilityfault tolerance backup and disaster recovery the transferfrom physical machines to virtual machines direct hard-ware accessing and virtual network switching This studyintroduces Proxmox Virtual Environment as the cloud com-puting and service platform with the virtual environmentThe kernel-based virtual machine (KVM) acts as the maincore of virtual machine and it has installed the kernel ofLinux-based operating system OpenERP is adopted in thisstudy as an ERP application which provides many solutionsfor open sources software in the future having it moreexpandable making a great progress on cost deduction Thein-cloud ERP is established as follows (1) Build ProxmoxVE virtual machine cluster and through WebPages managethe virtual machine (2) Create a virtual machine and set upits guest operating system in Proxmox VE virtual machinecluster (3) Set up OpenERP in virtual machine inclusive ofOpenERP AP PostgreSQL database and web interface forend-user (4) Sign in at httplocalhost8096 or httpIP8096with the browser on virtual machine pop up a login pageof OpenERP and then sign in to the administrator to installthe necessary modules as a result of an interface of usermanagement (5) Set up AP Server for biometrics security[15] When users sign in it will collect usersrsquo biometric

features with capturing devices at client side as evidence oflegal or illegal sign-in [16]

22 Network Security for In-Cloud ERP The use of virtualmachines to build firewall and gateway receives multiplebenefits that is easy management high scalability and lowcost For example a virtual machine equipped with pfSense(httpwwwpfsenseorg) or Zentyal (httpwwwzentyalcom) system is all quite easy to manage a network systemas shown in Figure 4 However ERP databases containingsensitive information are not allowed to access data directlyfrom the external network instead to set up an intranet onefor data access According to a variety of different virtualmachine managements there are many different approachesto virtual network layout or configuration For exampleif virtual machine management has its own built-in NATfunction IT manager may install an OpenERP [7] intoa virtual machine with two network interface cards oneconnected to the external network via the bridge mode forinternet whereas the other connected internally via NATmode for intranet Without software firewall for protectionthe network does not come up with a hardware firewallapparently leading to less secure environment in which evencommon network attacks may also cause system crash asshown in Figure 5 In addition to the scenario mentionedabove IT manager does not consider the use of the built-inNAT function in virtualization management and in contrasttakes alternative scheme into account employing pfSense orZentyal to build a software firewall server This way goesthrough port forwarding service to redirect http port packetstoOpenERP External network can not access the interior onewhere port forwarding service is not allowed or set Besidesits protection against the common network attacks can alsoensure that the user interface gains both the security andstability as shown in Figure 6

3 High Availability for In-Cloud ERP

31 Virtual Machine High Availability (1) Consider virtualmachine live migration When an execution error occurs ata node and causes an interruption virtual machines at thatnode can bemigrated themselves to the other nodes in whichthe left tasks of the failure node are also to be continuedherein A prerequisite is to ask for a shared storage as wellas two units or more servers for example a Proxmox VEsystem as shown in Figure 7 (2)Virtual storage livemigrationis as follows The system provides HA in virtual machinesand accordingly HA will also support virtual storage as wellGenerally connecting a shared storage (eg SAN) the systemmay achieve the purpose of reaching a low downtime Whenan execution error occurs at a node and causes an interrup-tion virtual storage at that node can be migrated itself tothe other nodes to resume the left tasks of the failure node(3) Distributed resource scheduling is as follows Virtualmachine management system such as Hyper-V [13] importsnonuniform memory access (NUMA) mechanism for theresources allocation in which computing cores and memoryare divided into nodes and each virtual machine attachesthe corresponding node in accordance with the amount of

Mathematical Problems in Engineering 3

Controller

Virtual machineaccess control AP

Virtual machineaccess control AP

Office Main gate of the company

Devices for collectingface and fingerprint images

Pass your authentication before entering the company

Figure 2 Access control in a firm

the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9

32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10

33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA

4 ERP System Assessment

According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we

4 Mathematical Problems in Engineering

Controller

Virtual machineaccess control AP

Virtual machineremote desktop

Virtual machinewebsite server

Verification Disconnection

User A

User B

User C

PassPass

Fail

Figure 3 Access control authentication in cloud

derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg

Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT

119895represents a

functional mean time for various functions In (2) PMT119896

stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582

1 1205822 120582

119872act as a weighted aver-

age In (3) PI119896means a performance index for a specific

ERP application platform In addition there are two more

performance indexes that are also applicable where PI119896in (4)

represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI

119896in (5) stands for an intervalized

performance index Consider

FMT119895=sum119873

119894=1FAT119894

119873 119895 = 1 2 3 119872 (1)

PMT119896=sum119872

119895=1120582119895FMT119895

sum119872

119895120582119895

119896 = 1 2 3 119871

st119872

sum

119895

120582119895= 1 0 le 120582

119895le 1

(2)

Mathematical Problems in Engineering 5

VM pfSense(firewall and routing)

NIC1 NIC2

External network

VMnode1

VMnode2

VMnode3

VMnode4

Internal network

Figure 4 Application pfSense establishing firewall and gateway incloud

NIC1 NIC2NIC

vBridge

VM (database) VM (OpenERP)

NAT mode Bridge mode

External network

Internal network

Figure 5 A built-in NAT function in virtualization management

NIC NIC

vBridge

VM (database) VM (OpenERP)

Bridge mode

External network

Internal network

VM (pfSense)

NIC1 NIC2

Figure 6 Application pfSense establishing network architecture

Figure 7 HA optional setting of VM in Proxmox VE

CPU

Server 2Server 1

Memory

Figure 8Hardware resources allocation based onNUMA inHyper-V R2

PrimaryVM

Server 1

New

VMServer 2 Server 3

Newsecondary

VMprimary

Figure 9 Fault tolerance mechanism by VMware vSphere

NIC1

NIC2

NIC team

ServerLACP

Edge switch 2

Edge switch 1

Figure 10 Realizing the architecture of network HA

Raid 1

Raid 0 Raid 0

A1 A2

A3 A4

A5 A6

A7 A8

A1 A2

A3 A4

A5 A6

A7 A8

Disk 0 Disk 1 Disk 2 Disk 3

Figure 11 RAID 0+1 system diagram

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

2 Mathematical Problems in Engineering

Virtual machineremote desktop

Virtual machineremote desktop

Virtual machinewebsite server

User A User B User C

Controller

Figure 1 In-cloud OpenERP deployment

including virtual machine live migration virtual storage livemigration distributed resource scheduling high availabilityfault tolerance backup and disaster recovery the transferfrom physical machines to virtual machines direct hard-ware accessing and virtual network switching This studyintroduces Proxmox Virtual Environment as the cloud com-puting and service platform with the virtual environmentThe kernel-based virtual machine (KVM) acts as the maincore of virtual machine and it has installed the kernel ofLinux-based operating system OpenERP is adopted in thisstudy as an ERP application which provides many solutionsfor open sources software in the future having it moreexpandable making a great progress on cost deduction Thein-cloud ERP is established as follows (1) Build ProxmoxVE virtual machine cluster and through WebPages managethe virtual machine (2) Create a virtual machine and set upits guest operating system in Proxmox VE virtual machinecluster (3) Set up OpenERP in virtual machine inclusive ofOpenERP AP PostgreSQL database and web interface forend-user (4) Sign in at httplocalhost8096 or httpIP8096with the browser on virtual machine pop up a login pageof OpenERP and then sign in to the administrator to installthe necessary modules as a result of an interface of usermanagement (5) Set up AP Server for biometrics security[15] When users sign in it will collect usersrsquo biometric

features with capturing devices at client side as evidence oflegal or illegal sign-in [16]

22 Network Security for In-Cloud ERP The use of virtualmachines to build firewall and gateway receives multiplebenefits that is easy management high scalability and lowcost For example a virtual machine equipped with pfSense(httpwwwpfsenseorg) or Zentyal (httpwwwzentyalcom) system is all quite easy to manage a network systemas shown in Figure 4 However ERP databases containingsensitive information are not allowed to access data directlyfrom the external network instead to set up an intranet onefor data access According to a variety of different virtualmachine managements there are many different approachesto virtual network layout or configuration For exampleif virtual machine management has its own built-in NATfunction IT manager may install an OpenERP [7] intoa virtual machine with two network interface cards oneconnected to the external network via the bridge mode forinternet whereas the other connected internally via NATmode for intranet Without software firewall for protectionthe network does not come up with a hardware firewallapparently leading to less secure environment in which evencommon network attacks may also cause system crash asshown in Figure 5 In addition to the scenario mentionedabove IT manager does not consider the use of the built-inNAT function in virtualization management and in contrasttakes alternative scheme into account employing pfSense orZentyal to build a software firewall server This way goesthrough port forwarding service to redirect http port packetstoOpenERP External network can not access the interior onewhere port forwarding service is not allowed or set Besidesits protection against the common network attacks can alsoensure that the user interface gains both the security andstability as shown in Figure 6

3 High Availability for In-Cloud ERP

31 Virtual Machine High Availability (1) Consider virtualmachine live migration When an execution error occurs ata node and causes an interruption virtual machines at thatnode can bemigrated themselves to the other nodes in whichthe left tasks of the failure node are also to be continuedherein A prerequisite is to ask for a shared storage as wellas two units or more servers for example a Proxmox VEsystem as shown in Figure 7 (2)Virtual storage livemigrationis as follows The system provides HA in virtual machinesand accordingly HA will also support virtual storage as wellGenerally connecting a shared storage (eg SAN) the systemmay achieve the purpose of reaching a low downtime Whenan execution error occurs at a node and causes an interrup-tion virtual storage at that node can be migrated itself tothe other nodes to resume the left tasks of the failure node(3) Distributed resource scheduling is as follows Virtualmachine management system such as Hyper-V [13] importsnonuniform memory access (NUMA) mechanism for theresources allocation in which computing cores and memoryare divided into nodes and each virtual machine attachesthe corresponding node in accordance with the amount of

Mathematical Problems in Engineering 3

Controller

Virtual machineaccess control AP

Virtual machineaccess control AP

Office Main gate of the company

Devices for collectingface and fingerprint images

Pass your authentication before entering the company

Figure 2 Access control in a firm

the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9

32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10

33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA

4 ERP System Assessment

According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we

4 Mathematical Problems in Engineering

Controller

Virtual machineaccess control AP

Virtual machineremote desktop

Virtual machinewebsite server

Verification Disconnection

User A

User B

User C

PassPass

Fail

Figure 3 Access control authentication in cloud

derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg

Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT

119895represents a

functional mean time for various functions In (2) PMT119896

stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582

1 1205822 120582

119872act as a weighted aver-

age In (3) PI119896means a performance index for a specific

ERP application platform In addition there are two more

performance indexes that are also applicable where PI119896in (4)

represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI

119896in (5) stands for an intervalized

performance index Consider

FMT119895=sum119873

119894=1FAT119894

119873 119895 = 1 2 3 119872 (1)

PMT119896=sum119872

119895=1120582119895FMT119895

sum119872

119895120582119895

119896 = 1 2 3 119871

st119872

sum

119895

120582119895= 1 0 le 120582

119895le 1

(2)

Mathematical Problems in Engineering 5

VM pfSense(firewall and routing)

NIC1 NIC2

External network

VMnode1

VMnode2

VMnode3

VMnode4

Internal network

Figure 4 Application pfSense establishing firewall and gateway incloud

NIC1 NIC2NIC

vBridge

VM (database) VM (OpenERP)

NAT mode Bridge mode

External network

Internal network

Figure 5 A built-in NAT function in virtualization management

NIC NIC

vBridge

VM (database) VM (OpenERP)

Bridge mode

External network

Internal network

VM (pfSense)

NIC1 NIC2

Figure 6 Application pfSense establishing network architecture

Figure 7 HA optional setting of VM in Proxmox VE

CPU

Server 2Server 1

Memory

Figure 8Hardware resources allocation based onNUMA inHyper-V R2

PrimaryVM

Server 1

New

VMServer 2 Server 3

Newsecondary

VMprimary

Figure 9 Fault tolerance mechanism by VMware vSphere

NIC1

NIC2

NIC team

ServerLACP

Edge switch 2

Edge switch 1

Figure 10 Realizing the architecture of network HA

Raid 1

Raid 0 Raid 0

A1 A2

A3 A4

A5 A6

A7 A8

A1 A2

A3 A4

A5 A6

A7 A8

Disk 0 Disk 1 Disk 2 Disk 3

Figure 11 RAID 0+1 system diagram

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Mathematical Problems in Engineering 3

Controller

Virtual machineaccess control AP

Virtual machineaccess control AP

Office Main gate of the company

Devices for collectingface and fingerprint images

Pass your authentication before entering the company

Figure 2 Access control in a firm

the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9

32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10

33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA

4 ERP System Assessment

According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we

4 Mathematical Problems in Engineering

Controller

Virtual machineaccess control AP

Virtual machineremote desktop

Virtual machinewebsite server

Verification Disconnection

User A

User B

User C

PassPass

Fail

Figure 3 Access control authentication in cloud

derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg

Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT

119895represents a

functional mean time for various functions In (2) PMT119896

stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582

1 1205822 120582

119872act as a weighted aver-

age In (3) PI119896means a performance index for a specific

ERP application platform In addition there are two more

performance indexes that are also applicable where PI119896in (4)

represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI

119896in (5) stands for an intervalized

performance index Consider

FMT119895=sum119873

119894=1FAT119894

119873 119895 = 1 2 3 119872 (1)

PMT119896=sum119872

119895=1120582119895FMT119895

sum119872

119895120582119895

119896 = 1 2 3 119871

st119872

sum

119895

120582119895= 1 0 le 120582

119895le 1

(2)

Mathematical Problems in Engineering 5

VM pfSense(firewall and routing)

NIC1 NIC2

External network

VMnode1

VMnode2

VMnode3

VMnode4

Internal network

Figure 4 Application pfSense establishing firewall and gateway incloud

NIC1 NIC2NIC

vBridge

VM (database) VM (OpenERP)

NAT mode Bridge mode

External network

Internal network

Figure 5 A built-in NAT function in virtualization management

NIC NIC

vBridge

VM (database) VM (OpenERP)

Bridge mode

External network

Internal network

VM (pfSense)

NIC1 NIC2

Figure 6 Application pfSense establishing network architecture

Figure 7 HA optional setting of VM in Proxmox VE

CPU

Server 2Server 1

Memory

Figure 8Hardware resources allocation based onNUMA inHyper-V R2

PrimaryVM

Server 1

New

VMServer 2 Server 3

Newsecondary

VMprimary

Figure 9 Fault tolerance mechanism by VMware vSphere

NIC1

NIC2

NIC team

ServerLACP

Edge switch 2

Edge switch 1

Figure 10 Realizing the architecture of network HA

Raid 1

Raid 0 Raid 0

A1 A2

A3 A4

A5 A6

A7 A8

A1 A2

A3 A4

A5 A6

A7 A8

Disk 0 Disk 1 Disk 2 Disk 3

Figure 11 RAID 0+1 system diagram

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

4 Mathematical Problems in Engineering

Controller

Virtual machineaccess control AP

Virtual machineremote desktop

Virtual machinewebsite server

Verification Disconnection

User A

User B

User C

PassPass

Fail

Figure 3 Access control authentication in cloud

derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg

Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT

119895represents a

functional mean time for various functions In (2) PMT119896

stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582

1 1205822 120582

119872act as a weighted aver-

age In (3) PI119896means a performance index for a specific

ERP application platform In addition there are two more

performance indexes that are also applicable where PI119896in (4)

represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI

119896in (5) stands for an intervalized

performance index Consider

FMT119895=sum119873

119894=1FAT119894

119873 119895 = 1 2 3 119872 (1)

PMT119896=sum119872

119895=1120582119895FMT119895

sum119872

119895120582119895

119896 = 1 2 3 119871

st119872

sum

119895

120582119895= 1 0 le 120582

119895le 1

(2)

Mathematical Problems in Engineering 5

VM pfSense(firewall and routing)

NIC1 NIC2

External network

VMnode1

VMnode2

VMnode3

VMnode4

Internal network

Figure 4 Application pfSense establishing firewall and gateway incloud

NIC1 NIC2NIC

vBridge

VM (database) VM (OpenERP)

NAT mode Bridge mode

External network

Internal network

Figure 5 A built-in NAT function in virtualization management

NIC NIC

vBridge

VM (database) VM (OpenERP)

Bridge mode

External network

Internal network

VM (pfSense)

NIC1 NIC2

Figure 6 Application pfSense establishing network architecture

Figure 7 HA optional setting of VM in Proxmox VE

CPU

Server 2Server 1

Memory

Figure 8Hardware resources allocation based onNUMA inHyper-V R2

PrimaryVM

Server 1

New

VMServer 2 Server 3

Newsecondary

VMprimary

Figure 9 Fault tolerance mechanism by VMware vSphere

NIC1

NIC2

NIC team

ServerLACP

Edge switch 2

Edge switch 1

Figure 10 Realizing the architecture of network HA

Raid 1

Raid 0 Raid 0

A1 A2

A3 A4

A5 A6

A7 A8

A1 A2

A3 A4

A5 A6

A7 A8

Disk 0 Disk 1 Disk 2 Disk 3

Figure 11 RAID 0+1 system diagram

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Mathematical Problems in Engineering 5

VM pfSense(firewall and routing)

NIC1 NIC2

External network

VMnode1

VMnode2

VMnode3

VMnode4

Internal network

Figure 4 Application pfSense establishing firewall and gateway incloud

NIC1 NIC2NIC

vBridge

VM (database) VM (OpenERP)

NAT mode Bridge mode

External network

Internal network

Figure 5 A built-in NAT function in virtualization management

NIC NIC

vBridge

VM (database) VM (OpenERP)

Bridge mode

External network

Internal network

VM (pfSense)

NIC1 NIC2

Figure 6 Application pfSense establishing network architecture

Figure 7 HA optional setting of VM in Proxmox VE

CPU

Server 2Server 1

Memory

Figure 8Hardware resources allocation based onNUMA inHyper-V R2

PrimaryVM

Server 1

New

VMServer 2 Server 3

Newsecondary

VMprimary

Figure 9 Fault tolerance mechanism by VMware vSphere

NIC1

NIC2

NIC team

ServerLACP

Edge switch 2

Edge switch 1

Figure 10 Realizing the architecture of network HA

Raid 1

Raid 0 Raid 0

A1 A2

A3 A4

A5 A6

A7 A8

A1 A2

A3 A4

A5 A6

A7 A8

Disk 0 Disk 1 Disk 2 Disk 3

Figure 11 RAID 0+1 system diagram

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

6 Mathematical Problems in Engineering

Server(master)

Server(slave)

Server(slave)

1st server Nth server2nd server

Edge switch 1 Edge switch 2

Primary storage

Synchronization

Secondary storage

middot middot middot

Figure 12 Implementation of an in-cloud platform with HA

PI119896equiv1

PMT119896

sdot Scale 119896 = 1 2 3 119871 Scale = 104

(3)

PI119896=

PI119896

PI119896MAX

119896 = 1 2 3 119871 (4)

larrrarrPI119896=

100381610038161003816100381610038161003816100381610038161003816

PI119896minus PI119896MIN

PI119896MAXminus PI119896MIN

100381610038161003816100381610038161003816100381610038161003816

119896 = 1 2 3 119871 (5)

The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD

119896to the other ERP application

platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second

term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate

US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following

CostERP119896 = (120572 sdot (VMD

119896

VMDECC60) + 120573 sdot (

PI119896

PIECC60))

sdot costdowntime at ECC60 + costmonthly sdot period

+ costsoftware 119896 = 1 2 3 119871

st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)

The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider

CPratio119896 =PI119896

CostERP119896 119896 = 1 2 3 119871 (7)

5 Experimental Results and Discussion

There are a few experiments and a discussion presented in thefollowing subsessions

51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14

52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Mathematical Problems in Engineering 7

Figure 13 Ping command to check the network quality

(a) Before VMmigration (b) After VMmigration

Figure 14 Failover using a virtual machine migration

(a) List of products (b) Sales order

Figure 15 Sign-in in-cloud OpenERP at smart phone

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

8 Mathematical Problems in Engineering

(a) Capture images (b) Identification

Figure 16 Face recognition and fingerprint identification at smart phone

Figure 17 List of products of in-cloud OpenERP as sign-in at PC

53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20

54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP

Figure 18 Sales order of in-cloud OpenERP as sign-in at PC

increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Mathematical Problems in Engineering 9

Table 1 ERP access frequency and its operational cost

Testing item Case Ain-house ERP

Case Bin-cloud ERP

Ratio of CaseB to Case A

Number of access(timesday) 63 328 5206

Monthly expenditure(US dollarsmonth) 1036 501 0484

Figure 19 Test of SQL Injection attack using jSQL Injection v04

the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3

55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Figure 20 Test of SQL Injection attack using SQL Power Injector12

1000

10000

100000

1000000

Am

ount

of U

SD d

olla

r (log10

)

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

Operational cost

ECC60ByDesignOpenERP

Figure 21 Operational cost varied with the quantity of parameters

6 Conclusion

This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

10 Mathematical Problems in Engineering

Table 2 ERP operational speed (unit minute second)

Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min

Table 3 ERP cost-performance ratio (cost unit US$)

ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02

ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429

0

10

20

30

40

50

60

70

80

90

100

C-P

ratio

Cost-performance ratio

120572=01

120573=09

120572=02

120573=08

120572=03120573=07

120572=04120573=06

120572=05120573=05

120572=06120573=04

120572=07120573=03

120572=08

120573=02

120572=09120573=01

Parameters

ECC60ByDesignOpenERP

Figure 22 C-P ratio varied with the quantity of parameters

our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3

References

[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the

10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010

[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012

[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012

[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006

[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008

[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010

[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014

[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010

[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999

[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Mathematical Problems in Engineering 11

[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008

[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013

[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012

[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012

[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008

[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012

[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009

[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011

[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012

[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014

[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of