Generating representative Web workloads for network and server performance evaluation
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
CCGRID '01 Proceedings of the 1st International Symposium on Cluster Computing and the Grid
The utility business model and the future of computing services
IBM Systems Journal
Managing Cancellations and No-Shows of Reservations with Overbooking to Increase Resource Revenue
CCGRID '08 Proceedings of the 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Economically enhanced resource management for internet service utilities
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Resource-level QoS metric for CPU-based guarantees in cloud providers
GECON'10 Proceedings of the 7th international conference on Economics of grids, clouds, systems, and services
NCA '10 Proceedings of the 2010 Ninth IEEE International Symposium on Network Computing and Applications
Client Classification Policies for SLA Enforcement in Shared Cloud Datacenters
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Cheat-Proof trust model for cloud computing markets
GECON'12 Proceedings of the 9th international conference on Economics of Grids, Clouds, Systems, and Services
Hi-index | 0.00 |
In Utility Computing business model, the owners of the computing resources negotiate with their potential clients to sell computing power. The terms of the Quality of Service (QoS) to be provided as well as the economic conditions are established in a Service-Level Agreement (SLA). There are situations in which providers must differentiate the SLAs in function of the type of Client that is willing to access the resources or the agreed QoS e.g. when the hardware resources are shared between users of the company that own the resources and external users. This paper proposes to consider the information of potential users when the SLA is under negotiation to allow providers to prioritize users (e.g. internal users over external users, or preferential users over common users). Two policies for negotiation are introduced: price discrimination and client-aware overselling of resources. The validity of the policies is demonstrated through exhaustive experiments.