Prioritizing service requests on cloud with multi-tenancy

Wei Tek Tsai, Qihong Shao, Jay Elston

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Cloud computing often uses a multi-tenant architecture where tenants share application and system software. Request prioritization presents a challenge in this architecture. Tenant may have individual (local) prioritization requirements, and these requirements can be different for different tenants. The shared application must use a global priority scheme for requests from all the tenants. This paper proposes an effective model to prioritize service requests from multiple tenants while preserving local priorities from individual tenant requests. This paper proposes the Crystalline Mapping (CM) algorithm which maps local priorities from individual tenants to global priorities. The algorithm also maximizes revenues within the local-to-global priority mapping constraints. The performance of the model is evaluated by the total business value, the QoS measurement, and a fairness measure. The model has been evaluated using simulation based on real-world data, and the results are consistent with the mathematical model.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE International Conference on E-Business Engineering, ICEBE 2010
Pages117-124
Number of pages8
DOIs
StatePublished - 2010
EventIEEE International Conference on E-Business Engineering, ICEBE 2010 - Shanghai, China
Duration: Nov 10 2010Nov 12 2010

Publication series

NameProceedings - IEEE International Conference on E-Business Engineering, ICEBE 2010

Other

OtherIEEE International Conference on E-Business Engineering, ICEBE 2010
Country/TerritoryChina
CityShanghai
Period11/10/1011/12/10

Keywords

  • Cloud computing
  • Multi-tenancy
  • Prioritization

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Prioritizing service requests on cloud with multi-tenancy'. Together they form a unique fingerprint.

Cite this