The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Secure Resource Optimization in Distributed Service Computing
Abstract
This chapter considers a set of computer resources used by a service provider to host enterprise applications for customer services subject to a service level agreement (SLA). The SLA defines three QoS metrics, namely, trustworthiness, percentile response time and availability. We first give an overview of current approaches, solutions and challenges in the security-aware resource optimization problem. Then, we present a framework for solving the problem. We further propose an approach for resource optimization in such an environment that minimizes the total cost of computer resources used by a service provider for such an application while satisfying all these three QoS metrics in a security-aware resource optimization problem that typically arises in distributed service computing. We formulate the security-aware resource optimization problem as an optimization problem under the SLA constraints, and solve it using an efficient numerical procedure. Finally, we conclude our discussion and provide the research directions for future study.
Related Content
Raquel Sánchez Ruiz, Isabel López Cirugeda.
© 2024.
22 pages.
|
Rocío Luque-González, Inmaculada Marín-López, Mercedes Gómez-López.
© 2024.
22 pages.
|
Bima Sapkota, Xuwei Luo, Muna Sapkota, Murat Akarsu, Emmanuel Deogratias, Daphne Fauber, Rose Mbewe, Fidelis Mumba, Ram Krishna Panthi, Jill Newton, JoAnn Phillion.
© 2024.
34 pages.
|
Karen Collett, Alina Slapac, Sarah A. Coppersmith, Jingxin Cheng.
© 2024.
29 pages.
|
Maria Ines Marino, Stephanie Tadal, Nurhayat Bilge.
© 2024.
25 pages.
|
Jaqueline Naidoo, Noah Borrero.
© 2024.
19 pages.
|
Crystal Machado, Tami Seifert.
© 2024.
20 pages.
|
|
|