Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing

被引:2
|
作者
Lu, Di [1 ]
Ma, Jianfeng [1 ]
Sun, Cong [1 ]
Ma, Xindi [1 ]
Xi, Ning [1 ]
机构
[1] Xidian Univ, Sch Comp Sci, Xian 710071, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
credit; resource allocation; security; fairness; cloud computing; NETWORKS;
D O I
10.1007/s11432-015-5492-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing systems include different types of participants with varied requirements for resources and multiple tasks; these varying requirements must be considered in the design of fairness-aware resource allocation schemes for better resources sharing. However, some participants may be malicious with a goal to damage the resource allocation fairness and increase their own utility. Hence, the resource scheduling policy must guarantee allocation fairness among the participants; further, it must ensure that fairness is not affected by the malicious usage of resources, that could cause resource exhaustion and lead to denial of service. In order to address this challenge, we propose a credit-based mechanism for resource allocation that will avoid the malicious usage of resources and, simultaneously, guarantee allocation fairness. In our scheme, a credit factor is introduced for each participant in order to evaluate the history of resource utilization and determine future resource allocation. Our model encourages a participant to release the occupied resources in timely manner after the completion of a task and imposes a punishment for malicious occupation of resources. We prove the fairness of our model and provide linear and variable gradient approaches to determine the credit factor for different scenarios. We simulate our model and perform experiments on a real cloud computing platform. The results prove the rationality, effectiveness and correctness of our approaches.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Stochastic Game Approach for Long-term Fairness-aware Radio Resource Allocation
    Yuan, Shuai
    Li, Lei
    Chigan, Chunxiao
    Zhu, Huafei
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [32] Fairness-aware Resource Allocation in Relay-enhanced TD-LTE-A Systems
    Wu, Xuanli
    Pei, Yujie
    Labeau, Fabrice
    Zhao, Wanjun
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [33] Fairness-aware resource allocation for the SISO downlink over frequency-selective channels
    Papoutsis, Vasileios D.
    Fraimis, Ioannis G.
    Kotsopoulos, Stavros A.
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [34] Security-Aware Max-Min Resource Allocation in Multiuser OFDMA Downlink
    Karachontzitis, Sotiris
    Timotheou, Stelios
    Krikidis, Ioannis
    Berberidis, Kostas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 529 - 542
  • [35] Fairness-Aware Energy-Efficient Resource Allocation for Uplink OFDMA Networks with Statistical QoS Requirements
    Li, Guowei
    Yang, Jian
    Liu, Xuefang
    Yang, Qinghai
    Xin, Yongshe
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 58 - 62
  • [36] Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network
    Xu, Lei
    Nallanathan, Arumugam
    Pan, Xiaofei
    Yang, Jian
    Liao, Wenhe
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) : 366 - 376
  • [37] Enhanced security-aware technique and ontology data access control in cloud computing
    Kiran, Gangasandra Mahadevaiah
    Nalini, Narasimhaiah
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [38] Energy Aware Computing Resource Allocation Using PSO in Cloud
    Chaudhrani, Vanita
    Acharya, Pranjalee
    Chudasama, Vipul
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 511 - 519
  • [39] An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing
    Zade, B. Mohammad Hasani
    Javidi, M. M.
    Mansouri, N.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (06) : 2929 - 2984
  • [40] An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing
    B. Mohammad Hasani Zade
    M. M. Javidi
    N. Mansouri
    Peer-to-Peer Networking and Applications, 2023, 16 : 2929 - 2984