SlideShare une entreprise Scribd logo
1  sur  2
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: 9894917187, 875487 1111/2222/3333/8754872111 / 3111 / 4111 / 5111 / 6111 / 8111
Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com

A MECHANISM DESIGN APPROACH TO RESOURCE PROCUREMENT
IN CLOUD COMPUTING

ABSTRACT:
We present a cloud resource procurement approach which not only automates the selection of an
appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are
suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (CDSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). C-DSIC is
dominant strategy incentive compatible, based on the VCG mechanism, and is a low-bid Vickrey
auction. C-BIC is Bayesian incentive compatible, which achieves budget balance. C-BIC does
not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the
lowest cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least
virtual cost is declared the winner. C-OPT overcome the limitations of both C-DSIC and C-BIC.
C-OPT is not only Bayesian incentive compatible, but also individually rational. Our
experiments indicate that the resource procurement cost decreases with increase in number of
cloud vendors irrespective of the mechanisms. We also propose a procurement module for a
cloud broker which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement
in a cloud computing context. A cloud broker with such a procurement module enables users
to automate the choice of a cloud vendor among many with diverse offerings, and is also an
essential first step toward implementing
dynamic pricing in the cloud.

Contenu connexe

En vedette

2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
Club Cloud des Partenaires
 
PPD Certificate - Shanmugasundaram Subramanian
PPD Certificate - Shanmugasundaram SubramanianPPD Certificate - Shanmugasundaram Subramanian
PPD Certificate - Shanmugasundaram Subramanian
Shanmugasundaram.S ,PPD IV
 

En vedette (12)

Copernicus G cloud framework intro for sme's 2013 v2
Copernicus G cloud framework intro for sme's 2013 v2Copernicus G cloud framework intro for sme's 2013 v2
Copernicus G cloud framework intro for sme's 2013 v2
 
2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
2012.05.11 - Cloud Business Development - RV des Experts - Expertise A2Partne...
 
Cloud computing contract checklist modified -- Procurement
Cloud computing contract checklist modified -- ProcurementCloud computing contract checklist modified -- Procurement
Cloud computing contract checklist modified -- Procurement
 
10 Things To Know Before You Buy The Cloud - Open Spectrum Inc - Sean Patrick...
10 Things To Know Before You Buy The Cloud - Open Spectrum Inc - Sean Patrick...10 Things To Know Before You Buy The Cloud - Open Spectrum Inc - Sean Patrick...
10 Things To Know Before You Buy The Cloud - Open Spectrum Inc - Sean Patrick...
 
PPD Certificate - Shanmugasundaram Subramanian
PPD Certificate - Shanmugasundaram SubramanianPPD Certificate - Shanmugasundaram Subramanian
PPD Certificate - Shanmugasundaram Subramanian
 
There Is No Cloud - Open Spectrum Inc - Sean Patrick Tario
There Is No Cloud - Open Spectrum Inc - Sean Patrick TarioThere Is No Cloud - Open Spectrum Inc - Sean Patrick Tario
There Is No Cloud - Open Spectrum Inc - Sean Patrick Tario
 
Stakeholder Mapping & Digital Channels
Stakeholder Mapping & Digital ChannelsStakeholder Mapping & Digital Channels
Stakeholder Mapping & Digital Channels
 
Hacking Acquisition with OpenLearningPaths!
Hacking Acquisition with OpenLearningPaths!Hacking Acquisition with OpenLearningPaths!
Hacking Acquisition with OpenLearningPaths!
 
Cloud Workflows for Procurement
Cloud Workflows for ProcurementCloud Workflows for Procurement
Cloud Workflows for Procurement
 
Procurement Exchange - Cloud procurement
Procurement Exchange - Cloud procurement Procurement Exchange - Cloud procurement
Procurement Exchange - Cloud procurement
 
Cloudzone-"What is cloud?" - Procurement Managers
Cloudzone-"What is cloud?" - Procurement ManagersCloudzone-"What is cloud?" - Procurement Managers
Cloudzone-"What is cloud?" - Procurement Managers
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a Service
 

Plus de ecwayprojects

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecwayprojects
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
ecwayprojects
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
ecwayprojects
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processor
ecwayprojects
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...
ecwayprojects
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
ecwayprojects
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
ecwayprojects
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
ecwayprojects
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
ecwayprojects
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
ecwayprojects
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
ecwayprojects
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
ecwayprojects
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
ecwayprojects
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
ecwayprojects
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
ecwayprojects
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
ecwayprojects
 

Plus de ecwayprojects (20)

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processor
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 

A mechanism design approach to resource procurement in cloud computing

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: 9894917187, 875487 1111/2222/3333/8754872111 / 3111 / 4111 / 5111 / 6111 / 8111 Visit: www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com A MECHANISM DESIGN APPROACH TO RESOURCE PROCUREMENT IN CLOUD COMPUTING ABSTRACT: We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (CDSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner. C-OPT overcome the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement in a cloud computing context. A cloud broker with such a procurement module enables users
  • 2. to automate the choice of a cloud vendor among many with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud.