A Fuzzy Approach to Cloud Admission Control for Safe Overbooking
- 1.3k Downloads
Cloud computing enables elasticity - rapid provisioning and deprovisioning of computational resources. Elasticity allows cloud users to quickly adapt resource allocation to meet changes in their workloads. For cloud providers, elasticity complicates capacity management as the amount of resources that can be requested by users is unknown and can vary significantly over time. Overbooking techniques allow providers to increase utilization of their data centers. For safe overbooking, cloud providers need admission control mechanisms to handle the tradeoff between increased utilization (and revenue), and risk of exhausting resources, potentially resulting in penalty fees and/or lost customers. We propose a flexible approach (implemented with fuzzy logic programming) to admission control and the associated risk estimation. Our measures exploit different fuzzy logic operators in order to model optimistic, realistic, and pessimistic behaviour under uncertainty. The application has been coded with the MALP language by using the FLOPER system developed in our research group. An experimental evaluation confirm that our fuzzy admission control approach can significantly increase resource utilization while minimizing the risk of exceeding the total available capacity.
KeywordsCloud Computing Admission Control Fuzzy Logic Programming Resource Utilization Risk Assessment
Unable to display preview. Download preview PDF.
- 3.Almendros-Jiménez, J.M., Luna, A., Moreno, G., Vázquez, C.: Analyzing fuzzy logic computations with fuzzy xpath. In: Fredlund, A. (ed.) Proc. of XIII Spanish Conference on Programming and Languages, PROLE 2013, Madrid, Spain, September 18-20, p. 15. ECEASST (to appear, 2013)Google Scholar
- 6.Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/ (visited July 30, 2013)
- 9.Breitgand, D., Dubitzky, Z., Epstein, A., Glikson, A., Shapira, I.: SLA-aware resource over-commit in an IaaS cloud. In: Proc. of the 8th Intl. Conference on Network and Service Management (CNSM), pp. 73–81 (2012)Google Scholar
- 10.FLOPER - A Fuzzy LOgic Programming Environment for Research, http://dectau.uclm.es/floper/ (Visited June 7, 2013)
- 11.Julián, P., Moreno, G., Penabad, J.: Operational/Interpretive Unfolding of Multi-adjoint Logic Programs. Journal of Universal Computer Science 12(11), 1679–1699 (2006)Google Scholar
- 12.Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Trends in logic, Studia logica library. Springer (2000)Google Scholar
- 20.Schweizer, B., Sklar, A.: Probabilistic Metric Spaces. Courier Dover Publ. (1983)Google Scholar
- 21.The NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (visited July 30, 2013)
- 22.Tomás, L., Tordsson, J.: Improving Cloud Infrastructure Utilization through Overbooking. In: Proc. of the ACM Cloud and Autonomic Computing Conference, CAC (to appear, 2013)Google Scholar
- 24.Zaharia, M., Hindman, B., et al.: The datacenter needs an operating system. In: Proc. of the 3rd USENIX Conference on Hot Topics in Cloud Computing, p. 17 (2011)Google Scholar