Affiliation:
1. Multimedia Communication Lab (KOM), Technische Universität Darmstadt, Darmstadt, Germany
Abstract
While cloud markets promise virtually unlimited resource supplies, standardized commodities and proper services, some providers may not be able to offer effectual physical capacity to serve large customers. A solution is cloud collaborations, in which multiple providers unite forces in order to conjointly offer capacities in the cloud markets. Supposably, both the Quality of Service and security properties of such collaborations will be determined by “the weakest link in the chain”, therefore resulting in a trade-off between the monetary aggregates, cumulative capacity and the non-functional attributes of a cloud collaboration. Based on previous research, this paper examines efficient composition of cloud collaborations from the broker's perspective, considering Quality of Service and information security requirements of multiple cloud providers and users and presents an exact approach CCCP-EXA.KOM for building cloud collaborations. Furthermore, it proposes a Mixed Integer Programming-based heuristic optimization approach CCCP-PRIOSORT.KOM and provides its quantitative evaluation in comparison with prior optimal approach.
Reference51 articles.
1. Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development.;T.Ackermann;33rd International Conference on Information Systems,2012
2. Akay, Y., Li, H., & Xu, S. H. (2007).Greedy Algorithm for the General MultidimensionalKnapsack Problem.In Annals of Operations Research.
3. An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights
4. Security SLAs for Federated Cloud Services.;K.Bernsmed;International Conference on Availability, Reliability and Security,2011
5. Intercloud Security Considerations.;D.Bernstein;IEEE International Conference on Cloud Computing Technology and Services,2012
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing the security of data in cloud computing environments using Remote Data Auditing;2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA);2021-11-24
2. Secure Programming with SAS: Mitigating Risks and Protecting Data Integrity;Engineering International;2018-12-31