2014 IEEE 3rd Symposium on Network Cloud Computing and Applications (Ncca 2014) 2014
DOI: 10.1109/ncca.2014.15
|View full text |Cite
|
Sign up to set email alerts
|

Bidding Strategies in QoS-Aware Cloud Systems Based on N-Armed Bandit Problems

Abstract: Abstract-In this paper we consider a set of Software as a Service (SaaS) providers, that offer a set of Web services using the Cloud facilities provided by an Infrastructure as a Service (IaaS) provider. We assume that the IaaS provider offers a pay only what you use scheme similar to the Amazon EC2 service, comprising flat, on demand, and spot virtual machine instances. We propose a two-stage provisioning scheme. In the first stage, the SaaS providers determine the number of required flat and on demand instan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 22 publications
(33 reference statements)
0
8
0
Order By: Relevance
“…In the first stage, the VM requirements are calculated for each SaaS provider by means of standard optimization techniques, whereas the second stage, modeled as a Stackelberg game, determines the spot price that maximizes the IaaS revenue. The same problem is considered in [2], but the second stage is modeled as an N -armed bandit problem in which every player has to choose among N options taking into account past feedback.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first stage, the VM requirements are calculated for each SaaS provider by means of standard optimization techniques, whereas the second stage, modeled as a Stackelberg game, determines the spot price that maximizes the IaaS revenue. The same problem is considered in [2], but the second stage is modeled as an N -armed bandit problem in which every player has to choose among N options taking into account past feedback.…”
Section: Related Workmentioning
confidence: 99%
“…Constraint (2) ensures that the response time is less or equal to the threshold R k established in the SLA contract, while (3) guarantees that resources are not saturated. Constraint (4) is introduced for fault tolerance reasons and guarantees that the on spot instances are at most a fraction η j < 1 of the total capacity allocated for WS application k at IaaS i.…”
Section: Game Formulation From the Saas Sidementioning
confidence: 99%
“…Furthermore, untruthful bidding and mutual cooperation can cause a cyclical effect and eventually make a market-driven strategy turn to be unprofitable for Cloud providers [KS13,AVCP14]. In fact, the de facto spot pricing in the current Cloud market has been considered to be too primitive to guarantee truthful bidding and fair resource allocation [WRM12].…”
Section: Limitations For Cloud Providersmentioning
confidence: 99%
“…-Lyapunov optimization algorithm -Hamilton-Jacobi condition based approach -Mixed-integer nonlinear programming -N-armed bandit -greedy approach [DCL13]). When it comes to solving the revenue maximization problem, Wang et al [WQH + 13] adopted a Lyapunov optimization algorithm with the basic idea of minimizing a bound on the drift-plus-penalty term; Xu and Li [XL13] proposed an optimal solution based on a demand model, the Hamilton-Jacobi conditions, and a standard numerical approach; and Kantere et al [KDF + 11] employed mixed-integer nonlinear programming to optimize the service pricing; and in one of the experimental scenarios, the provider was assumed to set spot prices using an N-armed bandit -greedy approach that repeatedly select the greedy pricing action among a set of N actions [AVCP14].…”
Section: Black-box Theoriesmentioning
confidence: 99%
“…Relative researches could be divided to two sorts: one-to-one static Web Service negotiation [2][3][4][5][6][7][8][9] and complex negotiation [10][11][12][13][14][15][16][17]. However, all of these studies considered one-to-one static negotiation process while the SLA automatic generation algorithm is not achieved.…”
Section: Introductionmentioning
confidence: 99%