ﻻ يوجد ملخص باللغة العربية
A fundamental goal in the design of IaaS service is to enable both user-friendly and cost-effective service access, while attaining high resource efficiency for revenue maximization. QoS differentiation is an important lens to achieve this design goal. In this paper, we propose the first analytical QoS-differentiated resource management and pricing architecture in the cloud computing context; here, a cloud service provider (CSP) offers a portfolio of SLAs. In order to maximize the CSPs revenue, we address two technical questions: (1) how to set the SLA prices so as to direct users to the SLAs best fitting their needs, and, (2) determining how many servers should be assigned to each SLA, and which users and how many of their jobs are admitted to be served. We propose optimal schemes to jointly determine SLA-based prices and perform capacity planning in polynomial time. Our pricing model retains high usability at the customers end. Compared with standard usage-based pricing schemes, numerical results show that the proposed scheme can improve the revenue by up to a five-fold increase.
The current Cloud infrastructure services (IaaS) market employs a resource-based selling model: customers rent nodes from the provider and pay per-node per-unit-time. This selling model places the burden upon customers to predict their job resource r
Service Level Agreements (SLA) are commonly used to specify the quality attributes between cloud service providers and the customers. A violation of SLAs can result in high penalties. To allow the analysis of SLA compliance before the services are de
Can cloud computing infrastructures provide HPC-competitive performance for scientific applications broadly? Despite prolific related literature, this question remains open. Answers are crucial for designing future systems and democratizing high-perf
Scientific computing sometimes involves computation on sensitive data. Depending on the data and the execution environment, the HPC (high-performance computing) user or data provider may require confidentiality and/or integrity guarantees. To study t
Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a