QoS- and Security-Aware Composition of Cloud Collaborations
Key: WLS14-1
Author: Olga Wenge, Ulrich Lampe, Ralf Steinmetz
Date: April 2014
Kind: In proceedings
Publisher: SCITEPRESS – Science and Technology Publications
Book title: Proceedings of the International Conference on Cloud Computing and Services Science (CLOSER 2014)
Keywords: Cloud brokerage, cloud composition, cloud federation, cloud security, cloud privacy, cloud compliance management, quality of services
Abstract: While cloud computing promises virtually unlimited resource supplies, smaller providers may not be able to offer sufficient physical IT capacity to serve large customers. A solution is cloud collaborations, in which multiple providers unite forces in order to conjointly offer capacities in the market. Unfortunately, both the QoS and security properties of such collaborations will be determined by the “weakest link in the chain”, hence resulting in a trade-off between the cumulative capacity and the non-functional characteristics of a cloud collaboration. In this position paper, we examine how cloud collaborations can be optimally composed in a QoS- and security-aware fashion within a market scenario involving multiple cloud providers and users. We propose a Mixed Integer Programming-based exact optimization approach named CCCP-EXA.KOM. Based on a quantitative evaluation, we find that the practical applicability of CCCP-EXA.KOM is limited to small-scale problem instances and conclude that the development of tailored heuristic approaches is required.
View Full paper (PDF) | Download Full paper (PDF)

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, not withstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.