Research ArticleAssessment of In-Cloud Enterprise Resource Planning SystemPerformed in a Virtual Cluster
Bao Rong Chang1 Hsiu-Fen Tsai2 Chia-Yen Chen1 and Yun-Che Tsai1
1Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 81148 Taiwan2Department of Marketing Management Shu-Te University Kaohsiung 82445 Taiwan
Correspondence should be addressed to Chia-Yen Chen ayennukedutw
Received 11 June 2014 Accepted 10 August 2014
Academic Editor Teen-Hang Meen
Copyright copy 2015 Bao Rong Chang et al This is an open access article distributed under the Creative Commons AttributionLicense which permits unrestricted use distribution and reproduction in any medium provided the original work is properlycited
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) which hasdeployed in the virtual machine cluster The proposed approach can resolve the crucial problems of ERP failure due to unexpecteddowntime and failover between physical hosts in enterprises causing operation termination and hence data loss Besides theproposed one together with the access control authentication and network security is capable of preventing intrusion hackedandor malicious attack via internet Regarding system assessment cost-performance (C-P) ratio a remarkable cost effectivenessevaluation has been applied to several remarkable ERP systems As a result C-P ratio evaluated from the experiments shows thatthe proposed approach outperforms two well-known benchmark ERP systems namely in-house ECC 60 and in-cloud ByDesign
1 Introduction
The service-oriented packages in enterprises like enterpriseresources planning (ERP) system have quite often encoun-tered the occurrence of unexpected downtime or power fail-ure that may cause immediately system operation termina-tion and data loss Technically speaking to timely transfereverything from a host to another is difficult and to resumethe original task in a new host as usual cannot be guaranteedFurthermore in the event of task transfer to a new host onemay encounter that data is not able to upload concurrentlyto a new host from external data source Therefore in thispaper we introduce a novel approach of high reliability forthe task transfer between hosts that is a high-performedhigh-availability in-cloud enterprise resources planning (in-cloud ERP) which has deployed in the virtualmachine clusterfor tackling the above-mentioned crucial problem Here thispaper gives a scheme taking advantage of virtual machinecluster [1ndash3] to deal with the failover problemaswellThepro-posed approach has built in-cloud ERP [4 5] in the virtualenvironment so that the client is able to use mobile deviceswirelessly and easily to access in-cloud services via Wi-Fi3G but identity verification must be carried out through
access control authentication [6] in the cloud Besides anopen source ERP namely OpenERP [7] has been deployedsuccessfully as shown in Figure 1 instead of commercialhigh-price ERP Additionally access control authentication[8 9] as mentioned above has brought into a virtual machineto proceed with identity verification secured sign-in andattendance audit as shown in Figures 2 and 3Thus detectingimminent potential BotNet [10] intrusion hacked and mali-cious attacks [11] in virtual network can efficiently increasethe network security
2 Authentication and Network Security forCloud-Based ERP
21 In-Cloud ERP and Authentication Virtual machine clus-tering system in cloud is an integration of virtualization vir-tualmachines and virtual services so that it canmake existingresources be fully applied such as VMware ESXESXi Server[12] Microsoft Hyper-V R2 [13] or Proxmox Virtual Envi-ronment [14] This system can let users run many operatingsystems in a single physical computer simultaneously whichlargely decreases the expense of purchasing PCs The mostimportant of all is that it has the following major functions
Hindawi Publishing CorporationMathematical Problems in EngineeringVolume 2015 Article ID 213461 11 pageshttpdxdoiorg1011552015213461
2 Mathematical Problems in Engineering
Virtual machineremote desktop
Virtual machineremote desktop
Virtual machinewebsite server
User A User B User C
Controller
Figure 1 In-cloud OpenERP deployment
including virtual machine live migration virtual storage livemigration distributed resource scheduling high availabilityfault tolerance backup and disaster recovery the transferfrom physical machines to virtual machines direct hard-ware accessing and virtual network switching This studyintroduces Proxmox Virtual Environment as the cloud com-puting and service platform with the virtual environmentThe kernel-based virtual machine (KVM) acts as the maincore of virtual machine and it has installed the kernel ofLinux-based operating system OpenERP is adopted in thisstudy as an ERP application which provides many solutionsfor open sources software in the future having it moreexpandable making a great progress on cost deduction Thein-cloud ERP is established as follows (1) Build ProxmoxVE virtual machine cluster and through WebPages managethe virtual machine (2) Create a virtual machine and set upits guest operating system in Proxmox VE virtual machinecluster (3) Set up OpenERP in virtual machine inclusive ofOpenERP AP PostgreSQL database and web interface forend-user (4) Sign in at httplocalhost8096 or httpIP8096with the browser on virtual machine pop up a login pageof OpenERP and then sign in to the administrator to installthe necessary modules as a result of an interface of usermanagement (5) Set up AP Server for biometrics security[15] When users sign in it will collect usersrsquo biometric
features with capturing devices at client side as evidence oflegal or illegal sign-in [16]
22 Network Security for In-Cloud ERP The use of virtualmachines to build firewall and gateway receives multiplebenefits that is easy management high scalability and lowcost For example a virtual machine equipped with pfSense(httpwwwpfsenseorg) or Zentyal (httpwwwzentyalcom) system is all quite easy to manage a network systemas shown in Figure 4 However ERP databases containingsensitive information are not allowed to access data directlyfrom the external network instead to set up an intranet onefor data access According to a variety of different virtualmachine managements there are many different approachesto virtual network layout or configuration For exampleif virtual machine management has its own built-in NATfunction IT manager may install an OpenERP [7] intoa virtual machine with two network interface cards oneconnected to the external network via the bridge mode forinternet whereas the other connected internally via NATmode for intranet Without software firewall for protectionthe network does not come up with a hardware firewallapparently leading to less secure environment in which evencommon network attacks may also cause system crash asshown in Figure 5 In addition to the scenario mentionedabove IT manager does not consider the use of the built-inNAT function in virtualization management and in contrasttakes alternative scheme into account employing pfSense orZentyal to build a software firewall server This way goesthrough port forwarding service to redirect http port packetstoOpenERP External network can not access the interior onewhere port forwarding service is not allowed or set Besidesits protection against the common network attacks can alsoensure that the user interface gains both the security andstability as shown in Figure 6
3 High Availability for In-Cloud ERP
31 Virtual Machine High Availability (1) Consider virtualmachine live migration When an execution error occurs ata node and causes an interruption virtual machines at thatnode can bemigrated themselves to the other nodes in whichthe left tasks of the failure node are also to be continuedherein A prerequisite is to ask for a shared storage as wellas two units or more servers for example a Proxmox VEsystem as shown in Figure 7 (2)Virtual storage livemigrationis as follows The system provides HA in virtual machinesand accordingly HA will also support virtual storage as wellGenerally connecting a shared storage (eg SAN) the systemmay achieve the purpose of reaching a low downtime Whenan execution error occurs at a node and causes an interrup-tion virtual storage at that node can be migrated itself tothe other nodes to resume the left tasks of the failure node(3) Distributed resource scheduling is as follows Virtualmachine management system such as Hyper-V [13] importsnonuniform memory access (NUMA) mechanism for theresources allocation in which computing cores and memoryare divided into nodes and each virtual machine attachesthe corresponding node in accordance with the amount of
Mathematical Problems in Engineering 3
Controller
Virtual machineaccess control AP
Virtual machineaccess control AP
Office Main gate of the company
Devices for collectingface and fingerprint images
Pass your authentication before entering the company
Figure 2 Access control in a firm
the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9
32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10
33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA
4 ERP System Assessment
According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we
4 Mathematical Problems in Engineering
Controller
Virtual machineaccess control AP
Virtual machineremote desktop
Virtual machinewebsite server
Verification Disconnection
User A
User B
User C
PassPass
Fail
Figure 3 Access control authentication in cloud
derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg
Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT
119895represents a
functional mean time for various functions In (2) PMT119896
stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582
1 1205822 120582
119872act as a weighted aver-
age In (3) PI119896means a performance index for a specific
ERP application platform In addition there are two more
performance indexes that are also applicable where PI119896in (4)
represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI
119896in (5) stands for an intervalized
performance index Consider
FMT119895=sum119873
119894=1FAT119894
119873 119895 = 1 2 3 119872 (1)
PMT119896=sum119872
119895=1120582119895FMT119895
sum119872
119895120582119895
119896 = 1 2 3 119871
st119872
sum
119895
120582119895= 1 0 le 120582
119895le 1
(2)
Mathematical Problems in Engineering 5
VM pfSense(firewall and routing)
NIC1 NIC2
External network
VMnode1
VMnode2
VMnode3
VMnode4
Internal network
Figure 4 Application pfSense establishing firewall and gateway incloud
NIC1 NIC2NIC
vBridge
VM (database) VM (OpenERP)
NAT mode Bridge mode
External network
Internal network
Figure 5 A built-in NAT function in virtualization management
NIC NIC
vBridge
VM (database) VM (OpenERP)
Bridge mode
External network
Internal network
VM (pfSense)
NIC1 NIC2
Figure 6 Application pfSense establishing network architecture
Figure 7 HA optional setting of VM in Proxmox VE
CPU
Server 2Server 1
Memory
Figure 8Hardware resources allocation based onNUMA inHyper-V R2
PrimaryVM
Server 1
New
VMServer 2 Server 3
Newsecondary
VMprimary
Figure 9 Fault tolerance mechanism by VMware vSphere
NIC1
NIC2
NIC team
ServerLACP
Edge switch 2
Edge switch 1
Figure 10 Realizing the architecture of network HA
Raid 1
Raid 0 Raid 0
A1 A2
A3 A4
A5 A6
A7 A8
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1 Disk 2 Disk 3
Figure 11 RAID 0+1 system diagram
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
2 Mathematical Problems in Engineering
Virtual machineremote desktop
Virtual machineremote desktop
Virtual machinewebsite server
User A User B User C
Controller
Figure 1 In-cloud OpenERP deployment
including virtual machine live migration virtual storage livemigration distributed resource scheduling high availabilityfault tolerance backup and disaster recovery the transferfrom physical machines to virtual machines direct hard-ware accessing and virtual network switching This studyintroduces Proxmox Virtual Environment as the cloud com-puting and service platform with the virtual environmentThe kernel-based virtual machine (KVM) acts as the maincore of virtual machine and it has installed the kernel ofLinux-based operating system OpenERP is adopted in thisstudy as an ERP application which provides many solutionsfor open sources software in the future having it moreexpandable making a great progress on cost deduction Thein-cloud ERP is established as follows (1) Build ProxmoxVE virtual machine cluster and through WebPages managethe virtual machine (2) Create a virtual machine and set upits guest operating system in Proxmox VE virtual machinecluster (3) Set up OpenERP in virtual machine inclusive ofOpenERP AP PostgreSQL database and web interface forend-user (4) Sign in at httplocalhost8096 or httpIP8096with the browser on virtual machine pop up a login pageof OpenERP and then sign in to the administrator to installthe necessary modules as a result of an interface of usermanagement (5) Set up AP Server for biometrics security[15] When users sign in it will collect usersrsquo biometric
features with capturing devices at client side as evidence oflegal or illegal sign-in [16]
22 Network Security for In-Cloud ERP The use of virtualmachines to build firewall and gateway receives multiplebenefits that is easy management high scalability and lowcost For example a virtual machine equipped with pfSense(httpwwwpfsenseorg) or Zentyal (httpwwwzentyalcom) system is all quite easy to manage a network systemas shown in Figure 4 However ERP databases containingsensitive information are not allowed to access data directlyfrom the external network instead to set up an intranet onefor data access According to a variety of different virtualmachine managements there are many different approachesto virtual network layout or configuration For exampleif virtual machine management has its own built-in NATfunction IT manager may install an OpenERP [7] intoa virtual machine with two network interface cards oneconnected to the external network via the bridge mode forinternet whereas the other connected internally via NATmode for intranet Without software firewall for protectionthe network does not come up with a hardware firewallapparently leading to less secure environment in which evencommon network attacks may also cause system crash asshown in Figure 5 In addition to the scenario mentionedabove IT manager does not consider the use of the built-inNAT function in virtualization management and in contrasttakes alternative scheme into account employing pfSense orZentyal to build a software firewall server This way goesthrough port forwarding service to redirect http port packetstoOpenERP External network can not access the interior onewhere port forwarding service is not allowed or set Besidesits protection against the common network attacks can alsoensure that the user interface gains both the security andstability as shown in Figure 6
3 High Availability for In-Cloud ERP
31 Virtual Machine High Availability (1) Consider virtualmachine live migration When an execution error occurs ata node and causes an interruption virtual machines at thatnode can bemigrated themselves to the other nodes in whichthe left tasks of the failure node are also to be continuedherein A prerequisite is to ask for a shared storage as wellas two units or more servers for example a Proxmox VEsystem as shown in Figure 7 (2)Virtual storage livemigrationis as follows The system provides HA in virtual machinesand accordingly HA will also support virtual storage as wellGenerally connecting a shared storage (eg SAN) the systemmay achieve the purpose of reaching a low downtime Whenan execution error occurs at a node and causes an interrup-tion virtual storage at that node can be migrated itself tothe other nodes to resume the left tasks of the failure node(3) Distributed resource scheduling is as follows Virtualmachine management system such as Hyper-V [13] importsnonuniform memory access (NUMA) mechanism for theresources allocation in which computing cores and memoryare divided into nodes and each virtual machine attachesthe corresponding node in accordance with the amount of
Mathematical Problems in Engineering 3
Controller
Virtual machineaccess control AP
Virtual machineaccess control AP
Office Main gate of the company
Devices for collectingface and fingerprint images
Pass your authentication before entering the company
Figure 2 Access control in a firm
the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9
32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10
33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA
4 ERP System Assessment
According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we
4 Mathematical Problems in Engineering
Controller
Virtual machineaccess control AP
Virtual machineremote desktop
Virtual machinewebsite server
Verification Disconnection
User A
User B
User C
PassPass
Fail
Figure 3 Access control authentication in cloud
derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg
Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT
119895represents a
functional mean time for various functions In (2) PMT119896
stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582
1 1205822 120582
119872act as a weighted aver-
age In (3) PI119896means a performance index for a specific
ERP application platform In addition there are two more
performance indexes that are also applicable where PI119896in (4)
represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI
119896in (5) stands for an intervalized
performance index Consider
FMT119895=sum119873
119894=1FAT119894
119873 119895 = 1 2 3 119872 (1)
PMT119896=sum119872
119895=1120582119895FMT119895
sum119872
119895120582119895
119896 = 1 2 3 119871
st119872
sum
119895
120582119895= 1 0 le 120582
119895le 1
(2)
Mathematical Problems in Engineering 5
VM pfSense(firewall and routing)
NIC1 NIC2
External network
VMnode1
VMnode2
VMnode3
VMnode4
Internal network
Figure 4 Application pfSense establishing firewall and gateway incloud
NIC1 NIC2NIC
vBridge
VM (database) VM (OpenERP)
NAT mode Bridge mode
External network
Internal network
Figure 5 A built-in NAT function in virtualization management
NIC NIC
vBridge
VM (database) VM (OpenERP)
Bridge mode
External network
Internal network
VM (pfSense)
NIC1 NIC2
Figure 6 Application pfSense establishing network architecture
Figure 7 HA optional setting of VM in Proxmox VE
CPU
Server 2Server 1
Memory
Figure 8Hardware resources allocation based onNUMA inHyper-V R2
PrimaryVM
Server 1
New
VMServer 2 Server 3
Newsecondary
VMprimary
Figure 9 Fault tolerance mechanism by VMware vSphere
NIC1
NIC2
NIC team
ServerLACP
Edge switch 2
Edge switch 1
Figure 10 Realizing the architecture of network HA
Raid 1
Raid 0 Raid 0
A1 A2
A3 A4
A5 A6
A7 A8
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1 Disk 2 Disk 3
Figure 11 RAID 0+1 system diagram
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Mathematical Problems in Engineering 3
Controller
Virtual machineaccess control AP
Virtual machineaccess control AP
Office Main gate of the company
Devices for collectingface and fingerprint images
Pass your authentication before entering the company
Figure 2 Access control in a firm
the allocation of resources That is the resources of a virtualmachine may be allocated from different server hardwareresources as shown in Figure 8 (4) Fault tolerance is as fol-lowsThemain principle of reaching a zero downtime such asVMware vSphere [12] is that when a primary virtual machineis running the system automatically generates a redundantvirtual machine totally equal to the primary one locatedin other servers to synchronize the task Once the systemdetects the primary virtual machine failure the running taskis immediately transferred to the redundant virtual machinethis redundant virtual machine becomes the primary virtualmachine at once and the system will replicate anotherredundant virtual machine once again as shown in Figure 9
32 Network High Availability With link aggregation controlprotocol (LACP) [17] network interface cards can utilizenetwork bounding techniques that will combine multiplenetwork interface cards together and in the meantime setthe parameters of network interface card related to the HAfunction For example Linux systems can use the softwareifenslave to gain fault-tolerant features in the combinednetwork interface cards That is as one of network interfacecards fails work load will automatically switch to anotherone to carry on the successive networking tasks as shown inFigure 10
33 Storage High Availability In general storage device ofiSCSI or NAS is able to provide hard drive array (RAID)function If the system needs to consider both cost andperformance and fault tolerance solution type of RAID0+1 disk array is suggested to organize hard drive arrayas shown in Figure 11 In addition iSCSI or NAS storagedevice also probably risks the failure incident and hencethe storage device needs to consider HA At present thestorage devicemanufacturers have incorporated synchronousbackup mechanism but on the contrary the traditionalstorage devicesmay not have this feature where an additionalserver is required for implementing the synchronizationbetween the primary storage and the secondary one asshown in Figure 12 According to HA of virtual machinenetwork and storage as mentioned above a diagram of in-cloud platform with high availability is illustrated in Figure12 With the minimum facility required for HA structurethe system needs at least two high-performance computingservers two high-speed network switches and two high-reliability storages to establish an in-cloud platformwith HA
4 ERP System Assessment
According to the functional mean time in average functionalaccess time for each ERP application platform on (1) we
4 Mathematical Problems in Engineering
Controller
Virtual machineaccess control AP
Virtual machineremote desktop
Virtual machinewebsite server
Verification Disconnection
User A
User B
User C
PassPass
Fail
Figure 3 Access control authentication in cloud
derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg
Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT
119895represents a
functional mean time for various functions In (2) PMT119896
stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582
1 1205822 120582
119872act as a weighted aver-
age In (3) PI119896means a performance index for a specific
ERP application platform In addition there are two more
performance indexes that are also applicable where PI119896in (4)
represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI
119896in (5) stands for an intervalized
performance index Consider
FMT119895=sum119873
119894=1FAT119894
119873 119895 = 1 2 3 119872 (1)
PMT119896=sum119872
119895=1120582119895FMT119895
sum119872
119895120582119895
119896 = 1 2 3 119871
st119872
sum
119895
120582119895= 1 0 le 120582
119895le 1
(2)
Mathematical Problems in Engineering 5
VM pfSense(firewall and routing)
NIC1 NIC2
External network
VMnode1
VMnode2
VMnode3
VMnode4
Internal network
Figure 4 Application pfSense establishing firewall and gateway incloud
NIC1 NIC2NIC
vBridge
VM (database) VM (OpenERP)
NAT mode Bridge mode
External network
Internal network
Figure 5 A built-in NAT function in virtualization management
NIC NIC
vBridge
VM (database) VM (OpenERP)
Bridge mode
External network
Internal network
VM (pfSense)
NIC1 NIC2
Figure 6 Application pfSense establishing network architecture
Figure 7 HA optional setting of VM in Proxmox VE
CPU
Server 2Server 1
Memory
Figure 8Hardware resources allocation based onNUMA inHyper-V R2
PrimaryVM
Server 1
New
VMServer 2 Server 3
Newsecondary
VMprimary
Figure 9 Fault tolerance mechanism by VMware vSphere
NIC1
NIC2
NIC team
ServerLACP
Edge switch 2
Edge switch 1
Figure 10 Realizing the architecture of network HA
Raid 1
Raid 0 Raid 0
A1 A2
A3 A4
A5 A6
A7 A8
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1 Disk 2 Disk 3
Figure 11 RAID 0+1 system diagram
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
4 Mathematical Problems in Engineering
Controller
Virtual machineaccess control AP
Virtual machineremote desktop
Virtual machinewebsite server
Verification Disconnection
User A
User B
User C
PassPass
Fail
Figure 3 Access control authentication in cloud
derived the respective each platform mean time equation(2) After that a performance index is defined on (3) andsequentially normalized to be a value ranging from 0 to 1on (4) where we refer to this as a normalized performanceindex corresponding to each ERP application platform In (1)FAT119894is a functional access time for a specific function (eg
Create New Customer Master Data Create New MaterialMaster Create Sales Order or Search Function) runningin an ERP application and accordingly FMT
119895represents a
functional mean time for various functions In (2) PMT119896
stands for a platform mean time for a variety of ERPapplications (eg ECC60 [18] ByDesign [19] or OpenERP)and the coefficients 120582
1 1205822 120582
119872act as a weighted aver-
age In (3) PI119896means a performance index for a specific
ERP application platform In addition there are two more
performance indexes that are also applicable where PI119896in (4)
represents a normalized performance index for a specific ERPapplication platform andlarrrarrPI
119896in (5) stands for an intervalized
performance index Consider
FMT119895=sum119873
119894=1FAT119894
119873 119895 = 1 2 3 119872 (1)
PMT119896=sum119872
119895=1120582119895FMT119895
sum119872
119895120582119895
119896 = 1 2 3 119871
st119872
sum
119895
120582119895= 1 0 le 120582
119895le 1
(2)
Mathematical Problems in Engineering 5
VM pfSense(firewall and routing)
NIC1 NIC2
External network
VMnode1
VMnode2
VMnode3
VMnode4
Internal network
Figure 4 Application pfSense establishing firewall and gateway incloud
NIC1 NIC2NIC
vBridge
VM (database) VM (OpenERP)
NAT mode Bridge mode
External network
Internal network
Figure 5 A built-in NAT function in virtualization management
NIC NIC
vBridge
VM (database) VM (OpenERP)
Bridge mode
External network
Internal network
VM (pfSense)
NIC1 NIC2
Figure 6 Application pfSense establishing network architecture
Figure 7 HA optional setting of VM in Proxmox VE
CPU
Server 2Server 1
Memory
Figure 8Hardware resources allocation based onNUMA inHyper-V R2
PrimaryVM
Server 1
New
VMServer 2 Server 3
Newsecondary
VMprimary
Figure 9 Fault tolerance mechanism by VMware vSphere
NIC1
NIC2
NIC team
ServerLACP
Edge switch 2
Edge switch 1
Figure 10 Realizing the architecture of network HA
Raid 1
Raid 0 Raid 0
A1 A2
A3 A4
A5 A6
A7 A8
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1 Disk 2 Disk 3
Figure 11 RAID 0+1 system diagram
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Mathematical Problems in Engineering 5
VM pfSense(firewall and routing)
NIC1 NIC2
External network
VMnode1
VMnode2
VMnode3
VMnode4
Internal network
Figure 4 Application pfSense establishing firewall and gateway incloud
NIC1 NIC2NIC
vBridge
VM (database) VM (OpenERP)
NAT mode Bridge mode
External network
Internal network
Figure 5 A built-in NAT function in virtualization management
NIC NIC
vBridge
VM (database) VM (OpenERP)
Bridge mode
External network
Internal network
VM (pfSense)
NIC1 NIC2
Figure 6 Application pfSense establishing network architecture
Figure 7 HA optional setting of VM in Proxmox VE
CPU
Server 2Server 1
Memory
Figure 8Hardware resources allocation based onNUMA inHyper-V R2
PrimaryVM
Server 1
New
VMServer 2 Server 3
Newsecondary
VMprimary
Figure 9 Fault tolerance mechanism by VMware vSphere
NIC1
NIC2
NIC team
ServerLACP
Edge switch 2
Edge switch 1
Figure 10 Realizing the architecture of network HA
Raid 1
Raid 0 Raid 0
A1 A2
A3 A4
A5 A6
A7 A8
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1 Disk 2 Disk 3
Figure 11 RAID 0+1 system diagram
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
6 Mathematical Problems in Engineering
Server(master)
Server(slave)
Server(slave)
1st server Nth server2nd server
Edge switch 1 Edge switch 2
Primary storage
Synchronization
Secondary storage
middot middot middot
Figure 12 Implementation of an in-cloud platform with HA
PI119896equiv1
PMT119896
sdot Scale 119896 = 1 2 3 119871 Scale = 104
(3)
PI119896=
PI119896
PI119896MAX
119896 = 1 2 3 119871 (4)
larrrarrPI119896=
100381610038161003816100381610038161003816100381610038161003816
PI119896minus PI119896MIN
PI119896MAXminus PI119896MIN
100381610038161003816100381610038161003816100381610038161003816
119896 = 1 2 3 119871 (5)
The ERP cost about capital expenditure operational expen-diture and business agility has broken into 3 items that aresoftware cost monthly cost and downtime cost respectivelyIn particular the downtime cost for each ERP applicationplatform will be proportional to both the ratio of VM density(minor part) and the ratio of ERP performance index (majorpart) Here IT manager proceeds to the trial of ERP systemas planned for a period of two years where we assume anunexpected downtime may occur once per year and thedowntime cost of ECC60 is roughly estimated US$ 1000 ata time Moreover a formula for calculating the ERP systemexpenditure has been derived on (6) where VMDECC60represents a VMdensity of a kind of virtualmachinemanagerapplied to ECC60 and VMD
119896to the other ERP application
platforms PIECC60 stands for ECC60 performance index andPI119896for the other ERP performance indexes For the second
term in (6) costmonthly presents the operational expendituremonth by monthThere is no the cost of software package forOpenERP due to open source software However the cost ofsoftware package for ECC60 in service charge (approximate
US$ 164884 per year) is greater than that of ByDesign(approximate US$ 24733 per year) Consider the following
CostERP119896 = (120572 sdot (VMD
119896
VMDECC60) + 120573 sdot (
PI119896
PIECC60))
sdot costdowntime at ECC60 + costmonthly sdot period
+ costsoftware 119896 = 1 2 3 119871
st 0 le 120572 le 1 0 le 120573 le 1 120572 + 120573 = 1(6)
The assessment for the various ERP software packages isevaluated according to the so-called cost-performance ratioCPratio119896 defined on (7) where PI119896 represents the performanceindex as shown in (3) for the simplification in computationand CostERP119896 stands for the operation cost as shown in (6)Consider
CPratio119896 =PI119896
CostERP119896 119896 = 1 2 3 119871 (7)
5 Experimental Results and Discussion
There are a few experiments and a discussion presented in thefollowing subsessions
51 High-Availability Testing First in order to verify thehigh availability of the network after the network used thefunction of network bonding IT manager removed one ofthe network cables from an edge switch for a few seconds tocheck whether or not the network satisfies fault tolerance atthis situation After a test of ping command for 50 times asa result the connection quality is good because there is nopacket loss during the cable removal achieving the goal ofnetwork high availability as shown in Figure 13 Next in orderto verify whether the servers and storage devices achievehigh availability IT manager shuts down a server on whicha virtual machine was currently running while the server-mounted storage device will correspondingly fail Test resultsshow that failover completed successfully because the virtualmachine correctly transferred (migrated) to another server asshown in Figure 14
52 Access Control Authentication and ERP Testing Userssign in at httpIP8096 with the browser on an Androidsmart phone to sign in in-cloud ERP remotely via 3GWiFi asshown in Figure 15 and next based on biometricmeasures theprocess of access control authentication [20 21] is activated tocapture human face and fingerprint at mobile device deliverthem to back-end server for identification and then returnthe result back to mobile device It takes about 2 secondsfor identity verification as shown in Figure 16 After that webegin to test ERP routines Users sign in at httpIP8096with the browser on a personal computer to sign-in in-cloudERP remotely via 3GWiFi and then go for access controlauthentication at PC After that we begin to test ERP routineson PC as shown in Figures 17 and 18
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Mathematical Problems in Engineering 7
Figure 13 Ping command to check the network quality
(a) Before VMmigration (b) After VMmigration
Figure 14 Failover using a virtual machine migration
(a) List of products (b) Sales order
Figure 15 Sign-in in-cloud OpenERP at smart phone
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
8 Mathematical Problems in Engineering
(a) Capture images (b) Identification
Figure 16 Face recognition and fingerprint identification at smart phone
Figure 17 List of products of in-cloud OpenERP as sign-in at PC
53 Network Security Testing Without checking the instruc-tions in the input field testing tool has been forced to insertillegal SQL statements to access the sensitive informationin database This is a scenario for the simulation of mali-cious attacks into a sensitive database Therefore two SQLInjection checking tools open source software are applicablefor testing SQL Injection where the fist tool is Java-baseddevelopment jSQL Injection 12 and the second one is NET-based development SQL Power Injector With this tool tolaunch a series of automatic attacks into the presentation partof the web interface IT manager is able to check whetheror not outsider can directly access the database content Asa result there is no SQL Injection vulnerability displayed inthe testing tool and none of target database was found in therectangular box as shown in Figures 19 and 20
54 System Assessment According to the experiments ofonline testing in the daily use of ERP in enterprise within aweek it was found that the growth rate of use of in-cloud ERP
Figure 18 Sales order of in-cloud OpenERP as sign-in at PC
increased dramatically approximately 52 times than a stand-alone ERP In terms of the hardware cost in Taiwan it coststhe user $10025 on the hardware equipment for a stand-alone ERP that is in-house ERP in which the additional costwill be paid for air conditioning with monthly fee of $184space rent of $267 and hardware equipment maintenancefee of $167 In regard to the amortization schedule usingmonthly payment for a period of two years it costs $24863for monthly expenditure In other words it costs an averagemonthly usage fee of $1036 In contrast renting an in-cloudERP service in virtual environment only needs about $501monthly payment and it saves 107 times the cost of in-houseERP that is reducing the monthly expenditure a lot Inaddition to the monthly expenditure we have to consider thecost of software package for ERP applications Prices of themusually varywith different levels of functionality for a series ofERP products or various brands in the market In particularthe high-level and complicated version of ERP commerceproduct for example Sap or Oracle is more expensive than
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Mathematical Problems in Engineering 9
Table 1 ERP access frequency and its operational cost
Testing item Case Ain-house ERP
Case Bin-cloud ERP
Ratio of CaseB to Case A
Number of access(timesday) 63 328 5206
Monthly expenditure(US dollarsmonth) 1036 501 0484
Figure 19 Test of SQL Injection attack using jSQL Injection v04
the standard one As shown in Table 1 the comparison of thenumber of access in ERP system and themonthly expenditurefor ERP the proposed in-cloud ERP is exclusively superior tothe in-house ERP Two well-known benchmark ERP systemsECC 60 [18] and ByDesign [19] are used to compete with theproposed one According to ERP functional performancethat is the operational speed of various ERP functions theproposed approach defeats the others as listed in Table 2Finally given three typical instances the cost-performanceratio for ERP system assessment has been evaluated andclearly the proposed one beats the others as listed in Table 3
55 Discussion It has been noted that the performanceindexes for three models have been listed in Table 3 andthey are invariant and are not varied with the parametersnamely 120572 and 120573 In Figure 21 the operational cost for ourproposed approach has varied with quantity of parametersand goes down dramatically when the value of parameter 120572 isbigger than that of parameter120573 Accordingly C-P ratio for theproposed approach definitely goes up at that situation As aconsequence according to C-P ratio our proposed approachoutperforms the others even in all different cases where C-P ratio varied with the quantity of parameters as shown inFigure 22 Compared with the proposed one namely in-cloud OpenERP the C-P ratio of another in-cloud ERPsystem that is in-cloud ByDesign has slightly increased alittle bit as it varied with parameters This has verified thatour proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Figure 20 Test of SQL Injection attack using SQL Power Injector12
1000
10000
100000
1000000
Am
ount
of U
SD d
olla
r (log10
)
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
Operational cost
ECC60ByDesignOpenERP
Figure 21 Operational cost varied with the quantity of parameters
6 Conclusion
This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP) deployedin the virtual machine cluster together with access controlauthentication and network security The proposed one canresolve the problem of unexpected system failure to causeoperation terminated and data loss as well as intrusionhacked andor malicious attack via internet In additionaccording to the cost-performance (C-P) ratio the systemassessment shows that the proposed approach in this paperoutperforms two well-known benchmark ERP systems in-house ECC 60 and in-cloud ByDesign This has verified that
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
10 Mathematical Problems in Engineering
Table 2 ERP operational speed (unit minute second)
Function ECC 60 (in-house ERP) ByDesign (in-cloud ERP) OpenERP (in-cloud ERP)Create New Customer Master Data 717min 467min 3minCreate New Material Master 1267min 10min 85minCreate Sales Order 533min 2min 15minSearch Function 217min 5 sec 2 secAverage 683min 419min 326min
Table 3 ERP cost-performance ratio (cost unit US$)
ERP Performance index Operation cost C-P ratio Operation cost C-P ratio Operation cost C-P ratio120572 = 02 120573 = 08 120572 = 05 120573 = 05 120572 = 08 120573 = 02
ECC 60 (in-house ERP) 146341 334254 044 334254 044 334254 044ByDesign (in-cloud ERP) 238806 53679 445 53300 448 52921 451OpenERP (in-cloud ERP) 306905 4958 6190 4300 7138 3641 8429
0
10
20
30
40
50
60
70
80
90
100
C-P
ratio
Cost-performance ratio
120572=01
120573=09
120572=02
120573=08
120572=03120573=07
120572=04120573=06
120572=05120573=05
120572=06120573=04
120572=07120573=03
120572=08
120573=02
120572=09120573=01
Parameters
ECC60ByDesignOpenERP
Figure 22 C-P ratio varied with the quantity of parameters
our proposed approach has been realized successfully andperformed significantly for an in-cloud ERP system
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
Acknowledgment
This work is supported by the National Science CouncilTaiwan under Grant no NSC 100-2221-E-390-011-MY3
References
[1] A Beloglazov and R Buyya ldquoEnergy efficient allocation ofvirtual machines in cloud data centersrdquo in Proceedings of the
10th IEEEACM International Symposium on Cluster Cloud andGrid Computing (CCGrid rsquo10) pp 577ndash578 May 2010
[2] R Laurikainen J Laitinen P Lehtovuori and J K NurminenldquoImproving the efficiency of deploying virtual machines in acloud environmentrdquo in Proceedings of the International Confer-ence on Cloud Computing and Service Computing (CSC rsquo12) pp232ndash239 November 2012
[3] S Sotiriadis N Bessis F Xhafa and N AntonopoulosldquoCloud virtual machine scheduling modelling the cloud virtualmachine instantiationrdquo in Proceedings of the 6th InternationalConference on Complex Intelligent and Software Intensive Sys-tems (CISIS rsquo12) pp 233ndash240 July 2012
[4] Y-S Tianshe J Choi Z Xi Y-H Sun C-S Ouyang and Y-XHuang ldquoResearch of enterprise resource planning in a specificenterpriserdquo in Proceedings of the IEEE International Conferenceon SystemsMan andCybernetics (SMC rsquo06) pp 418ndash422 TaipeiTaiwan October 2006
[5] R A de Carvalho and R M Monnerat ldquoDevelopment supporttools for enterprise resource planningrdquo IT Professional vol 10no 5 pp 39ndash45 2008
[6] H Wu Y Ding L Yao and C Winer ldquoNetwork security forvirtual machine in cloud computingrdquo in Proceedings of the 5thInternational Conference on Computer Sciences andConvergenceInformation Technology (ICCIT rsquo10) pp 18ndash21 December 2010
[7] B R Chang H-F Tsai and C-M Chen ldquoHigh-performedvirtualization services for in-cloud enterprise resource planningsystemrdquo Journal of Information Hiding and Multimedia SignalProcessing vol 5 no 4 pp 614ndash624 2014
[8] J-G Zhao J-C Liu J-J Fan and J-X Di ldquoThe securityresearch of network access control systemrdquo in Proceedings ofthe 1st ACIS International Symposium on Cryptography andNetwork Security Data Mining and Knowledge Discovery E-Commerce amp Its Applications and Embedded Systems (CDEErsquo10) pp 283ndash288 Qinhuangdao China October 2010
[9] C Metz ldquoAAA protocols authentication authorization andaccounting for the internetrdquo IEEE Internet Computing vol 3no 6 pp 75ndash79 1999
[10] L Zhang A G Persaud A Johnson and Y Guan ldquoDetectionof stepping stone attack under delay and chaff perturbationsrdquo inProceedings of the 25th IEEE International Performance Com-puting and Communications Conference (IPCCC rsquo06) pp 247ndash256 April 2006
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Mathematical Problems in Engineering 11
[11] H-Y Yang L-X Xie and F Xie ldquoA new approach to networkanomaly attack detectionrdquo Fuzzy Systems and Knowledge Dis-covery vol 4 pp 317ndash321 2008
[12] B R Chang H-F Tsai and C-M Chen ldquoEvaluation of virtualmachine performance and virtualized consolidation ratio incloud computing systemrdquo Journal of Information Hiding andMultimedia Signal Processing vol 4 no 3 pp 192ndash200 2013
[13] B R Chang H-F Tsai C-M Chen Z-Y Lin and C-F HuangldquoAssessment of hypervisor and shared storage for cloud comput-ing serverrdquo in Proceedings of the 3rd International Conference onInnovations in Bio-Inspired Computing and Applications (IBICArsquo12) pp 67ndash72 September 2012
[14] K E Stewart J W Humphries and T R Andel ldquoAn auto-mated virtualization performance analysis platformrdquo Journal ofDefenseModeling and Simulation vol 9 no 3 pp 257ndash265 2012
[15] J L Wayman ldquoBiometrics in identity management systemsrdquoIEEE Security amp Privacy vol 6 no 2 pp 30ndash37 2008
[16] B R Chang C-F Huang H-F Tsai and Z-Y Lin ldquoRapidaccess control on ubuntu cloud computing with facial recogni-tion and fingerprint identificationrdquo Journal of Information Hid-ing and Multimedia Signal Processing vol 3 no 2 pp 176ndash1902012
[17] H Imaizumi T Nagata G Kunito K Yamazaki and HMorikawa ldquoPower saving mechanism based on simple movingaverage for 8023ad link aggregationrdquo in Proceedings of the IEEEGlobecomWorkshops pp 1ndash6 December 2009
[18] M Doedt and B Steffen ldquoRequirement-driven evaluation ofremote ERP-system solutions a service-oriented perspectiverdquoin Proceedings of the 34th IEEE Software Engineering Workshop(SEW rsquo11) pp 57ndash66 June 2011
[19] A Elragal and M E Kommos ldquoIn-house versus in-cloud ERPsystems a comparative studyrdquo Journal of Enterprise ResourcePlanning Studies vol 2012 Article ID 659957 13 pages 2012
[20] C-C Chang Y-C Huang andH-C Tsai ldquoDesign and analysisof chameleon hashing based handover authentication schemefor wireless networksrdquo Journal of Information Hiding andMulti-media Signal Processing vol 5 no 1 pp 107ndash116 2014
[21] T-H Liu QWang and H-F Zhu ldquoAMulti-function PasswordMutual Authentication Key Agreement Scheme with privacypreservingrdquo Journal of Information Hiding and Multimedia Sig-nal Processing vol 5 no 2 pp 163ndash174 2014
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of
Submit your manuscripts athttpwwwhindawicom
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical Problems in Engineering
Hindawi Publishing Corporationhttpwwwhindawicom
Differential EquationsInternational Journal of
Volume 2014
Applied MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Mathematical PhysicsAdvances in
Complex AnalysisJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
OptimizationJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Operations ResearchAdvances in
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Function Spaces
Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of Mathematics and Mathematical Sciences
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Algebra
Discrete Dynamics in Nature and Society
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Decision SciencesAdvances in
Discrete MathematicsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom
Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Stochastic AnalysisInternational Journal of