SlideShare a Scribd company logo
1 of 11
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED
QUALITY OF SERVICE IN CLOUD COMPUTING
Abstract—As an effective and efficient way to provide computing resources and
services to customers on demand, cloud computing has become more and more
popular. From cloud service providers’ perspective, profit is one of the most
important considerations, and it is mainly determined by the configuration of a
cloud service platform under given market demand. However, a single long-term
renting scheme is usually adopted to configure a cloud platform, which cannot
guarantee the service quality but leads to serious resource waste. In this paper, a
double resource renting scheme is designed firstly in which short-term renting and
long-term renting are combined aiming at the existing issues. This double renting
scheme can effectively guarantee the quality of service of all requests and reduce
the resource waste greatly. Secondly, a service system is considered as an
M/M/m+D queuing model and the performance indicators that affect the profit of
our double renting scheme are analyzed, e.g., the average charge, the ratio of
requests that need temporary servers, and so forth. Thirdly, a profit maximization
problem is formulated for the double renting scheme and the optimized
configuration of a cloud platform is obtained by solving the profit maximization
problem. Finally, a series of calculations are conducted to compare the profit of our
proposed scheme with that of the single renting scheme. The results show that our
scheme can not only guarantee the service quality of all requests, but also obtain
more profit than the latter.
EXISTING SYSTEM:
In this section, we review recent works relevant to the profit of cloud service
providers. Profit of service providers is related with many factors such as the price,
the market demand, the system configuration, the customer satisfaction and so
forth. Service providers naturally wish to set a higher price to get a higher profit
margin; but doing so would decrease the customer satisfaction, which leads to a
risk of discouraging demand in the future. Hence, selecting a reasonable pricing
strategy is important for service providers. The pricing strategies are divided into
two categories, i.e., static pricing and dynamic pricing. Static pricing means that
the price of a service request is fixed and known in advance, and it does not change
with the conditions. With dynamic pricing a service provider delays the pricing
decision until after the customer demand is revealed, so that the service provider
can adjust prices accordingly. Static pricing is the dominant strategy which is
widely used in real world and in research. Ghamkhari et al. adopted a flat-rate
pricing strategy and set a fixed price for all requests, but Odlyzko argued that the
predominant flat-rate pricing encourages waste and is incompatible with service
differentiation. Another kind of static pricing strategies are usage-based pricing.
For example, the price of a service request is proportional to the service time and
task execution requirement (measured by the number of instructions to be
executed), respectively. Usage-based pricing reveals that one can use resources
more efficiently.
PROPOSED SYSTEM:
In this paper, we propose a novel renting scheme for service providers, which not
only can satisfy quality-of-service requirements, but also can obtain more profit.
Our contributions in this paper can be summarized as follows.
_ A novel double renting scheme is proposed for service providers. It combines
long-term renting with short-term renting, which can not only satisfy quality-of-
service requirements under the varying system workload, but also reduce the
resource waste greatly.
_ A multiserver system adopted in our paper is modeled as an M/M/m+D queuing
model and the performance indicators are analyzed such as the average service
charge, the ratio of requests that need shortterm servers, and so forth.
_ The optimal configuration problem of service providers for profit maximization
is formulated and two kinds of optimal solutions, i.e., the ideal solutions and the
actual solutions, are obtained respectively.
_ A series of comparisons are given to verify the performance of our scheme. The
results show that the proposed Double-Quality-Guaranteed (DQG) renting scheme
can achieve more profit than the compared Single-Quality-Unguaranteed (SQU)
renting scheme in the premise of guaranteeing the service quality completely. In
this paper, to overcome the shortcomings mentioned above, a double renting
scheme is designed to configure a cloud service platform, which can guarantee the
service quality of all requests and reduce the resource waste greatly. Moreover, a
profit maximization problem is formulated and solved to get the optimal
multiserver configuration which can product more profit than the optimal
configuration.
Module 1
A Cloud SystemModel
The cloud structure consists of three typical parties, i.e., infrastructure providers,
service providers and customers. This three-tier structure is used commonly in
existing literatures. In the three-tier structure, an infrastructure provider the basic
hardware and software facilities. A service provider rents resources from
infrastructure providers and prepares a set of services in the form of virtual
machine (VM). Infrastructure providers provide two kinds of resource renting
schemes, e.g., long-term renting and short-term renting. In general, the rental price
of long-term renting is much cheaper than that of short-term renting. A customer
submits a service request to a service provider which delivers services on demand.
The customer receives the desired result from the service provider with certain
service-level agreement, and pays for the service based on the amount of the
service and the service quality. Service providers pay infrastructure providers for
renting their physical resources, and charge customers for processing their service
requests, which generates cost and revenue, respectively. The profit is generated
from the gap between the revenue and the cost.
Module 2
A Multiserver Model
In this paper, we consider the cloud service platform as a multiserver system with a
service request queue. The schematic diagram of cloud computing. In an actual
cloud computing platform such as Amazon EC2, IBM blue cloud, and private
clouds, there are many work nodes managed by the cloud managers such as
Eucalyptus, OpenNebula, and Nimbus. The clouds provide resources for jobs in
the form of virtual machine (VM). In addition, the users submit their jobs to the
cloud in which a job queuing system such as SGE, PBS, or Condor is used. All
jobs are scheduled by the job scheduler and assigned to different VMs in a
centralized way. Hence, we can consider it as a service request queue. For
example, Condor is a specialized workload management system for
computeintensive jobs and it provides a job queueing mechanism, scheduling
policy, priority scheme, resource monitoring, and resource management. Users
submit their jobs to Condor, and Condor places them into a queue, chooses when
and where to run them based upon a polic. Hence, it is reasonable to abstract a
cloud service platform as a multiserver model with a service request queue, and the
model is widely adopted in existing literature. In the three-tier structure, a cloud
service provider serves customers’ service requests by using a multiserver system
which is rented from an infrastructure provider. Assume that the multiserver
system consists of m long-term rented identical servers, and it can be scaled up by
temporarily renting short-term servers from infrastructure providers. The servers
in the system have identical execution speed s (Unit: billion instructions per
second). In this paper, a multiserver system excluding the short-term servers is
modeled as an M/M/m queuing system as follows (see Fig. 3). There is a Poisson
stream of service requests with arrival rate λ, i.e., the interarrival times are
independent and identically distributed (i.i.d.) exponential random variables with
mean 1/λ. A multiserver system maintains a queue with infinite capacity. When the
incoming service requests cannot be processed immediately after they arrive, they
are firstly placed in the queue until they can be handled by any available server.
The first-come-first-served (FCFS) queuing discipline is adopted. The task
execution requirements (measured by the number of instructions) are independent
and identically distributed exponential random variables r with mean r (Unit:
billion instructions). Therefore, the execution times of tasks on the multiserver
system are also i.i.d. exponential random variables x = r/s with mean x = r/s (Unit
second). The average service rate of each server is calculated as μ = 1/x = s/r, and
the system utilization is defined as ρ = λ/mμ = λ/m _ r/s. Because the fixed
computing capacity of the service system is limited, some requests would wait for
a long time before they are served. According to the queuing theory, we have the
following theorem about the waiting time in an M/M/m queuing system.
Module 3
The ProposedScheme
In this section, we first propose the Double-Quality- Guaranteed (DQG) resource
renting scheme which combines long-term renting with short-term renting. The
main computing capacity is provided by the long-term rented servers due to their
low price. The short-term rented servers provide the extra capacity in peak period.
The proposed DQG scheme adopts the traditional FCFS queueing discipline. For
each service request entering the system, the system records its waiting time. The
requests are assigned and executed on the long-term rented servers in the order of
arrival times. Once the waiting time of a request reaches D, a temporary server is
rented from infrastructure providers to process the request. We consider the novel
service model as an M/M/m+D queuing model. The M/M/m+D model is a special
M/M/m queuing model with impatient customers. In an M/M/m+D model, the
requests are impatient and they have a maximal tolerable waiting time. If the
waiting time exceeds the tolerable waiting time, they lose patience and leave the
system. In our scheme, the impatient requests do not leave the system but are
assigned to temporary rented servers. Since the requests with waiting time D are all
assigned to temporary servers, it is apparent that all service requests can guarantee
their deadline and are charged based on the workload according to the SLA.
Hence, the revenue of the service provider increases. However, the cost increases
as well due to the temporarily rented servers. Moreover, the amount of cost spent
in renting temporary servers is determined by the computing capacity of the long-
term rented multiserver system. Since the revenue has been maximized using our
scheme, minimizing the cost is the key issue for profit maximization. Next, the
tradeoff between the longterm rental cost and the short-term rental cost is
considered, and an optimal problem is formulated in the following to get the
optimal long-term configuration such that the profit is maximized.
CONCLUSIONS
In order to guarantee the quality of service requests and maximize the profit of
service providers, this paper has proposed a novel Double-Quality-Guaranteed
(DQG) renting scheme for service providers. This scheme combines short-term
renting with long-term renting, which can reduce the resource waste greatly and
adapt to the dynamical demand of computing capacity. An M/M/m+D queueing
model is build for our multiserver system with varying system size. And then, an
optimal configuration problem of profit maximization is formulated in which many
factors are taken into considerations, such as the market demand, the workload of
requests, the server-level agreement, the rental cost of servers, the cost of energy
consumption, and so forth. The optimal solutions are solved for two different
situations, which are the ideal optimal solutions and the actual optimal solutions. In
addition, a series of calculations are conducted to compare the profit obtained by
the DQG renting scheme with the Single-Quality-Unguaranteed (SQU) renting
scheme. The results show that our scheme outperforms the SQU scheme in terms
of both of service quality and profit. In this paper, we only consider the profit
maximization problem in a homogeneous cloud environment, because the analysis
of a heterogenous environment is much more complicated than that of a
homogenous environment. However, we will extend our study to a heterogenous
environment in the future.
REFERENCES
[1] K. Hwang, J. Dongarra, and G. C. Fox, Distributed and Cloud Computing.
Elsevier/Morgan Kaufmann, 2012.
[2] J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, “Optimal multiserver
configuration for profit maximization in cloud computing,” IEEE Trans. Parallel
Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, 2013.
[3] A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A.
Rabkin, and I. Stoica, “Above the clouds: A berkeley view of cloud computing,”
Dept. Electrical Eng. and Comput. Sciences, vol. 28, 2009.
[4] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud
computing and emerging it platforms: Vision, hype, and reality for delivering
computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599–
616, 2009.
[5] P. Mell and T. Grance, “The NIST definition of cloud computing. national
institute of standards and technology,” Information Technology Laboratory, vol.
15, p. 2009, 2009.
[6] J. Chen, C. Wang, B. B. Zhou, L. Sun, Y. C. Lee, and A. Y. Zomaya,
“Tradeoffs between profit and customer satisfaction for service provisioning in the
cloud,” in Proc.20th Int’l Symp. High Performance Distributed Computing. ACM,
2011, pp. 229–238.
[7] J. Mei, K. Li, J. Hu, S. Yin, and E. H.-M. Sha, “Energyaware preemptive
scheduling algorithm for sporadic tasks
on dvs platform,” MICROPROCESS MICROSY., vol. 37, no. 1, pp. 99–112, 2013.
[8] P. de Langen and B. Juurlink, “Leakage-aware multiprocessor scheduling,” J.
Signal Process. Sys., vol. 57, no. 1, pp. 73–88, 2009.
[9] G. P. Cachon and P. Feldman, “Dynamic versus static pricing in the presence
of strategic consumers,” Tech. Rep., 2010.
[10] Y. C. Lee, C. Wang, A. Y. Zomaya, and B. B. Zhou, “Profitdriven scheduling
for cloud services with data access awareness,” J. Parallel Distr. Com., vol. 72, no.
4, pp. 591– 602, 2012.

More Related Content

What's hot

ICC paper
ICC paperICC paper
ICC paperQi Chen
 
Pricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyPricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyEditor IJCATR
 
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in CloudLinked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloudpaperpublications3
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIJTET Journal
 
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...IRJET Journal
 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeVLSICS Design
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...ijgca
 
Server Consolidation through Virtual Machine Task Migration to achieve Green ...
Server Consolidation through Virtual Machine Task Migration to achieve Green ...Server Consolidation through Virtual Machine Task Migration to achieve Green ...
Server Consolidation through Virtual Machine Task Migration to achieve Green ...IJCSIS Research Publications
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyINFOGAIN PUBLICATION
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...ijdpsjournal
 
Sla based optimization of power and migration cost in cloud computing
Sla based optimization of power and migration cost in cloud computingSla based optimization of power and migration cost in cloud computing
Sla based optimization of power and migration cost in cloud computingNikhil Venugopal
 
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNELOPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNELijwmn
 

What's hot (15)

ICC paper
ICC paperICC paper
ICC paper
 
Pricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyPricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a Survey
 
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in CloudLinked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud Environment
 
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...
 
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeQoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
QoS Based Capacity Enhancement for WCDMA Network with Coding Scheme
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDMOD...
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Server Consolidation through Virtual Machine Task Migration to achieve Green ...
Server Consolidation through Virtual Machine Task Migration to achieve Green ...Server Consolidation through Virtual Machine Task Migration to achieve Green ...
Server Consolidation through Virtual Machine Task Migration to achieve Green ...
 
[IJET-V2I2P11] Authors:Pradeep Landge, Ashish Naware , Pooja Mete, Saif Maniy...
[IJET-V2I2P11] Authors:Pradeep Landge, Ashish Naware , Pooja Mete, Saif Maniy...[IJET-V2I2P11] Authors:Pradeep Landge, Ashish Naware , Pooja Mete, Saif Maniy...
[IJET-V2I2P11] Authors:Pradeep Landge, Ashish Naware , Pooja Mete, Saif Maniy...
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based Survey
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...
 
Sla based optimization of power and migration cost in cloud computing
Sla based optimization of power and migration cost in cloud computingSla based optimization of power and migration cost in cloud computing
Sla based optimization of power and migration cost in cloud computing
 
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNELOPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
 

Viewers also liked

Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2IAEME Publication
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
Healthcare Exchange Interoperability
Healthcare Exchange InteroperabilityHealthcare Exchange Interoperability
Healthcare Exchange InteroperabilityTomislav Milinović
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detectionjonecx
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...ieeepondy
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismseSAT Journals
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsNexgen Technology
 
Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)Edifecs Inc
 
HL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandHL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandNawanan Theera-Ampornpunt
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsEUBrasilCloudFORUM .
 
Tutorial 4 (duplicate detection)
Tutorial 4 (duplicate detection)Tutorial 4 (duplicate detection)
Tutorial 4 (duplicate detection)Kira
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detectionieeepondy
 
HL7 Clinical Document Architecture: Overview and Applications
HL7 Clinical Document Architecture: Overview and ApplicationsHL7 Clinical Document Architecture: Overview and Applications
HL7 Clinical Document Architecture: Overview and ApplicationsNawanan Theera-Ampornpunt
 
Fundamentals of HL7 CDA & Implementing HL7 CDA
Fundamentals of HL7 CDA & Implementing HL7 CDAFundamentals of HL7 CDA & Implementing HL7 CDA
Fundamentals of HL7 CDA & Implementing HL7 CDAHL7 New Zealand
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining ConceptsDung Nguyen
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Viewers also liked (19)

Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Healthcare Exchange Interoperability
Healthcare Exchange InteroperabilityHealthcare Exchange Interoperability
Healthcare Exchange Interoperability
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detection
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)
 
HL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandHL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in Thailand
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
 
SecureCloud Project
SecureCloud ProjectSecureCloud Project
SecureCloud Project
 
Tutorial 4 (duplicate detection)
Tutorial 4 (duplicate detection)Tutorial 4 (duplicate detection)
Tutorial 4 (duplicate detection)
 
Datamining
DataminingDatamining
Datamining
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
 
HL7 Clinical Document Architecture: Overview and Applications
HL7 Clinical Document Architecture: Overview and ApplicationsHL7 Clinical Document Architecture: Overview and Applications
HL7 Clinical Document Architecture: Overview and Applications
 
Fundamentals of HL7 CDA & Implementing HL7 CDA
Fundamentals of HL7 CDA & Implementing HL7 CDAFundamentals of HL7 CDA & Implementing HL7 CDA
Fundamentals of HL7 CDA & Implementing HL7 CDA
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining Concepts
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Data mining
Data miningData mining
Data mining
 

Similar to A profit maximization scheme with guaranteed

A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...Shakas Technologies
 
A Profit Maximization Scheme with Guaranteed1 (1)
A Profit Maximization Scheme with Guaranteed1 (1)A Profit Maximization Scheme with Guaranteed1 (1)
A Profit Maximization Scheme with Guaranteed1 (1)nelampati ramanjaneyulu
 
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...1crore projects
 
Optimal multiserver configuration for profit
Optimal multiserver configuration for profitOptimal multiserver configuration for profit
Optimal multiserver configuration for profitIMPULSE_TECHNOLOGY
 
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...I3E Technologies
 
A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...Shakas Technologies
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingINFOGAIN PUBLICATION
 
Cloud workflow scheduling with deadlines and time slot availability
Cloud workflow scheduling with deadlines and time slot availabilityCloud workflow scheduling with deadlines and time slot availability
Cloud workflow scheduling with deadlines and time slot availabilityKamal Spring
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Journals
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
 
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudTracy Drey
 
A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...IJECEIAES
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
Optimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingOptimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingJPINFOTECH JAYAPRAKASH
 
Introduction Pervasive computing demands the all-encompassing exploi.pdf
Introduction Pervasive computing demands the all-encompassing exploi.pdfIntroduction Pervasive computing demands the all-encompassing exploi.pdf
Introduction Pervasive computing demands the all-encompassing exploi.pdffantasiatheoutofthef
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service brokerIJECEIAES
 

Similar to A profit maximization scheme with guaranteed (20)

A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
 
A Profit Maximization Scheme with Guaranteed1 (1)
A Profit Maximization Scheme with Guaranteed1 (1)A Profit Maximization Scheme with Guaranteed1 (1)
A Profit Maximization Scheme with Guaranteed1 (1)
 
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...
IEEE 2015-2016 A Profit Maximization Scheme with Guaranteed Quality of Servic...
 
Optimal multiserver configuration for profit
Optimal multiserver configuration for profitOptimal multiserver configuration for profit
Optimal multiserver configuration for profit
 
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMP...
 
A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud Computing
 
Cloud workflow scheduling with deadlines and time slot availability
Cloud workflow scheduling with deadlines and time slot availabilityCloud workflow scheduling with deadlines and time slot availability
Cloud workflow scheduling with deadlines and time slot availability
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
20150113
2015011320150113
20150113
 
CPET- Project Report
CPET- Project ReportCPET- Project Report
CPET- Project Report
 
A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In Cloud
 
A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...
 
14
1414
14
 
14
1414
14
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Optimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingOptimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computing
 
Introduction Pervasive computing demands the all-encompassing exploi.pdf
Introduction Pervasive computing demands the all-encompassing exploi.pdfIntroduction Pervasive computing demands the all-encompassing exploi.pdf
Introduction Pervasive computing demands the all-encompassing exploi.pdf
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service broker
 

More from nexgentech15

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in anexgentech15
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolutionnexgentech15
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadednexgentech15
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsnexgentech15
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudnexgentech15
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possessionnexgentech15
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers acrossnexgentech15
 
New algorithms for secure outsourcing of
New algorithms for secure outsourcing ofNew algorithms for secure outsourcing of
New algorithms for secure outsourcing ofnexgentech15
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourcednexgentech15
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege andnexgentech15
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environmentnexgentech15
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system nexgentech15
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limitednexgentech15
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsnexgentech15
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumnexgentech15
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminativenexgentech15
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelnexgentech15
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharingnexgentech15
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainnexgentech15
 

More from nexgentech15 (20)

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in a
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolution
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
New algorithms for secure outsourcing of
New algorithms for secure outsourcing ofNew algorithms for secure outsourcing of
New algorithms for secure outsourcing of
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limited
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

A profit maximization scheme with guaranteed

  • 1. A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING Abstract—As an effective and efficient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers’ perspective, profit is one of the most important considerations, and it is mainly determined by the configuration of a cloud service platform under given market demand. However, a single long-term renting scheme is usually adopted to configure a cloud platform, which cannot guarantee the service quality but leads to serious resource waste. In this paper, a double resource renting scheme is designed firstly in which short-term renting and long-term renting are combined aiming at the existing issues. This double renting scheme can effectively guarantee the quality of service of all requests and reduce the resource waste greatly. Secondly, a service system is considered as an M/M/m+D queuing model and the performance indicators that affect the profit of our double renting scheme are analyzed, e.g., the average charge, the ratio of requests that need temporary servers, and so forth. Thirdly, a profit maximization problem is formulated for the double renting scheme and the optimized configuration of a cloud platform is obtained by solving the profit maximization problem. Finally, a series of calculations are conducted to compare the profit of our
  • 2. proposed scheme with that of the single renting scheme. The results show that our scheme can not only guarantee the service quality of all requests, but also obtain more profit than the latter. EXISTING SYSTEM: In this section, we review recent works relevant to the profit of cloud service providers. Profit of service providers is related with many factors such as the price, the market demand, the system configuration, the customer satisfaction and so forth. Service providers naturally wish to set a higher price to get a higher profit margin; but doing so would decrease the customer satisfaction, which leads to a risk of discouraging demand in the future. Hence, selecting a reasonable pricing strategy is important for service providers. The pricing strategies are divided into two categories, i.e., static pricing and dynamic pricing. Static pricing means that the price of a service request is fixed and known in advance, and it does not change with the conditions. With dynamic pricing a service provider delays the pricing decision until after the customer demand is revealed, so that the service provider can adjust prices accordingly. Static pricing is the dominant strategy which is widely used in real world and in research. Ghamkhari et al. adopted a flat-rate pricing strategy and set a fixed price for all requests, but Odlyzko argued that the
  • 3. predominant flat-rate pricing encourages waste and is incompatible with service differentiation. Another kind of static pricing strategies are usage-based pricing. For example, the price of a service request is proportional to the service time and task execution requirement (measured by the number of instructions to be executed), respectively. Usage-based pricing reveals that one can use resources more efficiently. PROPOSED SYSTEM: In this paper, we propose a novel renting scheme for service providers, which not only can satisfy quality-of-service requirements, but also can obtain more profit. Our contributions in this paper can be summarized as follows. _ A novel double renting scheme is proposed for service providers. It combines long-term renting with short-term renting, which can not only satisfy quality-of- service requirements under the varying system workload, but also reduce the resource waste greatly. _ A multiserver system adopted in our paper is modeled as an M/M/m+D queuing model and the performance indicators are analyzed such as the average service charge, the ratio of requests that need shortterm servers, and so forth.
  • 4. _ The optimal configuration problem of service providers for profit maximization is formulated and two kinds of optimal solutions, i.e., the ideal solutions and the actual solutions, are obtained respectively. _ A series of comparisons are given to verify the performance of our scheme. The results show that the proposed Double-Quality-Guaranteed (DQG) renting scheme can achieve more profit than the compared Single-Quality-Unguaranteed (SQU) renting scheme in the premise of guaranteeing the service quality completely. In this paper, to overcome the shortcomings mentioned above, a double renting scheme is designed to configure a cloud service platform, which can guarantee the service quality of all requests and reduce the resource waste greatly. Moreover, a profit maximization problem is formulated and solved to get the optimal multiserver configuration which can product more profit than the optimal configuration. Module 1 A Cloud SystemModel The cloud structure consists of three typical parties, i.e., infrastructure providers, service providers and customers. This three-tier structure is used commonly in existing literatures. In the three-tier structure, an infrastructure provider the basic
  • 5. hardware and software facilities. A service provider rents resources from infrastructure providers and prepares a set of services in the form of virtual machine (VM). Infrastructure providers provide two kinds of resource renting schemes, e.g., long-term renting and short-term renting. In general, the rental price of long-term renting is much cheaper than that of short-term renting. A customer submits a service request to a service provider which delivers services on demand. The customer receives the desired result from the service provider with certain service-level agreement, and pays for the service based on the amount of the service and the service quality. Service providers pay infrastructure providers for renting their physical resources, and charge customers for processing their service requests, which generates cost and revenue, respectively. The profit is generated from the gap between the revenue and the cost. Module 2 A Multiserver Model In this paper, we consider the cloud service platform as a multiserver system with a service request queue. The schematic diagram of cloud computing. In an actual cloud computing platform such as Amazon EC2, IBM blue cloud, and private clouds, there are many work nodes managed by the cloud managers such as
  • 6. Eucalyptus, OpenNebula, and Nimbus. The clouds provide resources for jobs in the form of virtual machine (VM). In addition, the users submit their jobs to the cloud in which a job queuing system such as SGE, PBS, or Condor is used. All jobs are scheduled by the job scheduler and assigned to different VMs in a centralized way. Hence, we can consider it as a service request queue. For example, Condor is a specialized workload management system for computeintensive jobs and it provides a job queueing mechanism, scheduling policy, priority scheme, resource monitoring, and resource management. Users submit their jobs to Condor, and Condor places them into a queue, chooses when and where to run them based upon a polic. Hence, it is reasonable to abstract a cloud service platform as a multiserver model with a service request queue, and the model is widely adopted in existing literature. In the three-tier structure, a cloud service provider serves customers’ service requests by using a multiserver system which is rented from an infrastructure provider. Assume that the multiserver system consists of m long-term rented identical servers, and it can be scaled up by temporarily renting short-term servers from infrastructure providers. The servers in the system have identical execution speed s (Unit: billion instructions per second). In this paper, a multiserver system excluding the short-term servers is modeled as an M/M/m queuing system as follows (see Fig. 3). There is a Poisson stream of service requests with arrival rate λ, i.e., the interarrival times are
  • 7. independent and identically distributed (i.i.d.) exponential random variables with mean 1/λ. A multiserver system maintains a queue with infinite capacity. When the incoming service requests cannot be processed immediately after they arrive, they are firstly placed in the queue until they can be handled by any available server. The first-come-first-served (FCFS) queuing discipline is adopted. The task execution requirements (measured by the number of instructions) are independent and identically distributed exponential random variables r with mean r (Unit: billion instructions). Therefore, the execution times of tasks on the multiserver system are also i.i.d. exponential random variables x = r/s with mean x = r/s (Unit second). The average service rate of each server is calculated as μ = 1/x = s/r, and the system utilization is defined as ρ = λ/mμ = λ/m _ r/s. Because the fixed computing capacity of the service system is limited, some requests would wait for a long time before they are served. According to the queuing theory, we have the following theorem about the waiting time in an M/M/m queuing system. Module 3 The ProposedScheme In this section, we first propose the Double-Quality- Guaranteed (DQG) resource renting scheme which combines long-term renting with short-term renting. The
  • 8. main computing capacity is provided by the long-term rented servers due to their low price. The short-term rented servers provide the extra capacity in peak period. The proposed DQG scheme adopts the traditional FCFS queueing discipline. For each service request entering the system, the system records its waiting time. The requests are assigned and executed on the long-term rented servers in the order of arrival times. Once the waiting time of a request reaches D, a temporary server is rented from infrastructure providers to process the request. We consider the novel service model as an M/M/m+D queuing model. The M/M/m+D model is a special M/M/m queuing model with impatient customers. In an M/M/m+D model, the requests are impatient and they have a maximal tolerable waiting time. If the waiting time exceeds the tolerable waiting time, they lose patience and leave the system. In our scheme, the impatient requests do not leave the system but are assigned to temporary rented servers. Since the requests with waiting time D are all assigned to temporary servers, it is apparent that all service requests can guarantee their deadline and are charged based on the workload according to the SLA. Hence, the revenue of the service provider increases. However, the cost increases as well due to the temporarily rented servers. Moreover, the amount of cost spent in renting temporary servers is determined by the computing capacity of the long- term rented multiserver system. Since the revenue has been maximized using our scheme, minimizing the cost is the key issue for profit maximization. Next, the
  • 9. tradeoff between the longterm rental cost and the short-term rental cost is considered, and an optimal problem is formulated in the following to get the optimal long-term configuration such that the profit is maximized. CONCLUSIONS In order to guarantee the quality of service requests and maximize the profit of service providers, this paper has proposed a novel Double-Quality-Guaranteed (DQG) renting scheme for service providers. This scheme combines short-term renting with long-term renting, which can reduce the resource waste greatly and adapt to the dynamical demand of computing capacity. An M/M/m+D queueing model is build for our multiserver system with varying system size. And then, an optimal configuration problem of profit maximization is formulated in which many factors are taken into considerations, such as the market demand, the workload of requests, the server-level agreement, the rental cost of servers, the cost of energy consumption, and so forth. The optimal solutions are solved for two different situations, which are the ideal optimal solutions and the actual optimal solutions. In addition, a series of calculations are conducted to compare the profit obtained by the DQG renting scheme with the Single-Quality-Unguaranteed (SQU) renting scheme. The results show that our scheme outperforms the SQU scheme in terms
  • 10. of both of service quality and profit. In this paper, we only consider the profit maximization problem in a homogeneous cloud environment, because the analysis of a heterogenous environment is much more complicated than that of a homogenous environment. However, we will extend our study to a heterogenous environment in the future. REFERENCES [1] K. Hwang, J. Dongarra, and G. C. Fox, Distributed and Cloud Computing. Elsevier/Morgan Kaufmann, 2012. [2] J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, “Optimal multiserver configuration for profit maximization in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, 2013. [3] A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A berkeley view of cloud computing,” Dept. Electrical Eng. and Comput. Sciences, vol. 28, 2009. [4] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering
  • 11. computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599– 616, 2009. [5] P. Mell and T. Grance, “The NIST definition of cloud computing. national institute of standards and technology,” Information Technology Laboratory, vol. 15, p. 2009, 2009. [6] J. Chen, C. Wang, B. B. Zhou, L. Sun, Y. C. Lee, and A. Y. Zomaya, “Tradeoffs between profit and customer satisfaction for service provisioning in the cloud,” in Proc.20th Int’l Symp. High Performance Distributed Computing. ACM, 2011, pp. 229–238. [7] J. Mei, K. Li, J. Hu, S. Yin, and E. H.-M. Sha, “Energyaware preemptive scheduling algorithm for sporadic tasks on dvs platform,” MICROPROCESS MICROSY., vol. 37, no. 1, pp. 99–112, 2013. [8] P. de Langen and B. Juurlink, “Leakage-aware multiprocessor scheduling,” J. Signal Process. Sys., vol. 57, no. 1, pp. 73–88, 2009. [9] G. P. Cachon and P. Feldman, “Dynamic versus static pricing in the presence of strategic consumers,” Tech. Rep., 2010. [10] Y. C. Lee, C. Wang, A. Y. Zomaya, and B. B. Zhou, “Profitdriven scheduling for cloud services with data access awareness,” J. Parallel Distr. Com., vol. 72, no. 4, pp. 591– 602, 2012.