期刊文献+

云环境中基于混合博弈的虚拟资源定价模型 被引量:9

Hybrid game based virtual resource pricing model in cloud environment
在线阅读 下载PDF
导出
摘要 为解决现有定价机制在效率和公平性方面的问题,提出一种基于混合博弈策略的云资源定价和交易模型,用于解决现有定价机制在效率和公平性方面的不足。该模型将虚拟资源的配置和供给转化为一个两阶段博弈过程:第一阶段通过采用合作博弈策略优化云资源提供者的收益;第二阶段采用对抗博弈策略平衡用户费用和资源提供者的收益。通过理论分析给出了博弈模型的有效性证明和求解方法,实验结果显示,混合博弈模型能够有效提高批量资源的协商效率,降低复杂价格协商过程导致的任务执行延迟;在面对集中度较高的任务负载时,基于混合博弈模型的资源选择和匹配策略显示出了较好的负载感知能力和公平性,从而有效地提高了任务在资源费用和实时性保证两个方面的服务质量满意度。 To solve me pricing model based on hybrid game strategy was proposed. In this model, the configuration and provision of virtual resource were transformed into a twophrase gaming procedure. In first stage, the cloud resource benefits was opti mized by using cooperative gaming strategy; in second stage, the user costs and cloud resource benefits were bal anced by using noncooperative gaming strategy. Through the theoretical analysis, the validity and solution of the proposed model were presented, and the experimental results indicated that the hybrid gaming model could signifi cantly improve the price negotiation efficiency and reduce the application execution latency caused by conventional price negotiation mechanisms. For the task load with high concentration ratio, the resource selection and the matc hing strategy of the proposed model showed better load sensing ability and fairness, which could improve the Quality of Service (QoS) satisfaction of tasks in resource cost and deadline guarantee.
作者 肖鹏 胡志刚
出处 《计算机集成制造系统》 EI CSCD 北大核心 2014年第1期198-206,共9页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(60970038 61272148) 湖南省科技计划资助项目(2012GK3075) 湖南省教育厅科学研究基金资助项目(13B015)~~
关键词 云计算 虚拟资源 定价机制 博弈论 服务质量 cloud computing virtual resource ricing mechanism game theory quality of service
  • 相关文献

参考文献27

  • 1VILLEGAS D,BOBROFF N,RODERO I. Cloud federation in a layered service model[J].{H}Journal of Computer and System Sciences,2012,(5):1330-1344.
  • 2罗军舟,金嘉晖,宋爱波,东方.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. 被引量:846
  • 3KIRSCHNICK J,CALERO J M,GOLDSACK P. Towards an architecture for deploying elastic services in the cloud[J].Software:Practice & Experience,2012,(4):395-408.
  • 4MONTERO R S,VOZMEDIANO R M,LLORENTE I M. An elasticity model for high throughput computing clusters[J].{H}JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING,2011,(6):750-757.
  • 5冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1088
  • 6JUVE G,RYNGE M,DEELMAN E. Comparing futuregrid,amazon ec2,and open science grid for scientific workflows[J].{H}Computing in Science & Engineering,2013,(4):20-29.
  • 7NURMI D,WOLSKI R,GRZEGORCZYK C. The eucalyptus open-source cloud-computing system[A].Washington,D.C.,USA:IEEE Press,2009.124-137.
  • 8HUU T T,KOSLOVSKI G,ANHALT F. Joint elastic cloud and virtual network framework for application performance-cost optimization[J].Journal of Grid Computing,2011,(1):27-47.
  • 9WU L,GARG S K,BUYYA R. SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments[A].Washington,D.C.,USA:IEEE Press,2011.195-204.
  • 10MIHAILESCU M,TEO Y M. Dynamic resource pricing on federated clouds[A].Washington,D.C.,USA:IEEE Press,2010.513-517.

二级参考文献108

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:368
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1877

同被引文献67

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部