International Journal of Intelligent Systems and Applications(IJISA)

ISSN: 2074-904X (Print), ISSN: 2074-9058 (Online)

Published By: MECS Press

IJISA Vol.8, No.10, Oct. 2016

A Risk-Aware Application Scheduling Model in Cloud Computing Scenarios

Full Text (PDF, 676KB), PP.11-20

Views:300   Downloads:1


Ala Arman

Index Terms

Application scheduling;cloud computing;expected monetary value;risk analysis


Cloud users usually have different preferences over their applications that outsource to the cloud, based on the financial profit of each application's execution. Moreover, various types of virtual machines are offered by a cloud service provider with distinct characteristics, such as rental prices, availability levels, each with a dif-ferent probability of occurrence and a penalty, which is paid to the user in case the virtual machine is not availa-ble. Therefore, the problem of application scheduling in cloud computing environments, considering the risk of financial loss of application-to-VM assignment becomes a challenging issue. In this paper, we propose a risk-aware scheduling model, using risk analysis to allocate the applications to the virtual machines, so that, the ex-pected total pay-off of an application is maximized, by taking into account of the priority of applications. A run-ning example is used through the paper to better illustrate the model and its application to improve the efficiency of resource assignment in cloud computing scenarios.

Cite This Paper

Ala Arman,"A Risk-Aware Application Scheduling Model in Cloud Computing Scenarios", International Journal of Intelligent Systems and Applications(IJISA), Vol.8, No.10, pp.11-20, 2016. DOI: 10.5815/ijisa.2016.10.02


[1]M. Y. Saeed and M. N. A. Khan, “Data Protection Techniques for Building Trust in Cloud Computing,” Int. J. Mod. Educ. Comput. Sci., vol. 7, no. 8, p. 38, 2015, "doi:10.5815/ijmecs.2015.08.05".

[2]A. Arman, A. Al-Shishtawy, and V. Vlassov, “Elasticity Controller for Cloud-Based Key-Value Stores.,” Parallel Distrib. Syst. Int. Conf., pp. 268–275, 2012, "doi:10.1109/ICPADS.2012.45".

[3]A. Zia and M. N. A. Khan, “A Scheme to Reduce Response Time in Cloud Computing Environment,” Int. J. Mod. Educ. Comput. Sci., vol. 5, no. 6, p. 56, 2013, "doi:10.5815/ijmecs.2013.06".

[4]S. Rajan and A. Jairath, “Cloud computing: The Fifth Generation of Computing,” in Communication Systems and Network Technologies (CSNT), 2011 International Conference on, 2011, pp. 665–667, "doi: 10.1109/CSNT.2011.143".

[5]P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” 2011, "doi: 10.6028/NIST.SP.800-145".

[6]S. Lee and K.-K. Seo, “A Hybrid Multi-criteria Decision-making Model for a Cloud Service Selection Problem Using BSC, Fuzzy Delphi Method and Fuzzy AHP,” Wirel. Pers. Commun., vol. 86, no. 1, pp. 57–75, 2016, "doi: 10.1007/s11277-015-2976-z".

[7]“Amazon Elastic Compute Cloud (Amazon EC2).” [Online]. Available: [Accessed: 11-Feb-2016].

[8]“Amazon EC2 Service Level Agreement.” [Online]. Available: [Accessed: 11-Feb-2016]. 

[9]D. M. Levine, M. L. Berenson, D. Stephan, and others, Statistics for managers using Microsoft Excel, vol. 660. Prentice Hall Upper Saddle River, NJ, 1999.

[10]X. Tang, K. Li, M. Qiu, and E. H.-M. Sha, “A Hierarchical Reliability-Driven Scheduling Algorithm in Grid Systems,” J. Parallel Distrib. Comput., vol. 72, no. 4, pp. 525–535, 2012, "doi: 10.1016/j.jpdc.2011.12.004".

[11]H. N. Van, F. D. Tran, and J.-M. Menaud, “Performance and Power Management for Cloud Infrastructures,” in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 2010, pp. 329–336, "doi: 10.1109/CLOUD.2010.25".

[12]S. Zhang, B. Wang, B. Zhao, and J. Tao, “An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center,” in 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, pp. 1471–1477, "doi: 10.1109/TrustCom.2013.178".

[13]M. Sun, T. Zang, X. Xu, and R. Wang, “Consumer-Centered Cloud Services Selection Using AHP,” in 2013 International Conference on Service Sciences (ICSS), 2013, pp. 1–6, "doi: 10.1109/ICSS.2013.26 ".

[14]V. C. Emeakaroha, I. Brandic, M. Maurer, and I. Breskovic, “SLA-Aware Application Deployment and Resource Allocation in Clouds,” in Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual, 2011, pp. 298–303, "doi: 10.1109/COMPSACW.2011.97".

[15]K. Black, Business statistics: for contemporary decision making. John Wiley & Sons, 2011.

[16]S. K. Garg, S. K. Gopalaiyengar, and R. Buyya, “SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud Datacenter,” in Algorithms and Architectures for Parallel Processing, Springer, 2011, pp. 371–384, "doi: 10.1007/978-3-642-24650-0_32". 

[17]C. S. Pawar and R. B. Wagh, “Priority based dynamic resource allocation in Cloud computing with modified waiting queue,” in Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on, 2013, pp. 311–316, "doi: 10.1109/ISSP.2013.6526925 ". 

[18]D. C. Devi and V. R. Uthariaraj, “Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks,” Sci. World J., vol. 2016, 2016, "doi: 10.1155/2016/3896065". 

[19]R. Buyya, S. Pandey, and C. Vecchiola, “Cloudbus Toolkit for Market-oriented Cloud Computing,” in Cloud Computing, Springer, 2009, pp. 24–44, "doi: 10.1007/978-3-642-10665-1_4".

[20]L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao, and C. Fu, “Cloud computing: A Perspective Study,” New Gener. Comput., vol. 28, no. 2, pp. 137–146, 2010, "doi: 10.1007/s00354-008-0081-5". 

[21]“VMware Infrastructure as a Service.” [Online]. Available: [Accessed: 25-May-2016].

[22]“Google App Engine Documentation.” [Online]. Available: [Accessed: 25-May-2016].

[23]“Amazon SimpleDB.” [Online]. Available: [Accessed: 25-May-2016].

[24]“” [Online]. Available: [Accessed: 25-May-2016].

[25]“Rackspace.” [Online]. Available: [Accessed: 25-May-2016].

[26]P. Patel, A. H. Ranabahu, and A. P. Sheth, “Service level agreement in cloud computing,” 2009.

[27]Y. Wang, S. Chen, and M. Pedram, “Service Level Agreement-Based Joint Application Environment Assignment and Resource Allocation in Cloud Computing Systems,” in Green Technologies Conference, 2013 IEEE, 2013, pp. 167–174, "doi: 10.1109/GreenTech.2013.33". 

[28]K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, “Security SLAs for Federated Cloud Services,” in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, 2011, pp. 202–209, "doi: 10.1109/ARES.2011.34". 

[29]A. V. Dastjerdi, S. G. H. Tabatabaei, and R. Buyya, “A dependency-aware Ontology-based Approach for Deploying Service Level Agreement Monitoring Services in Cloud,” Softw. Pract. Exp., vol. 42, no. 4, pp. 501–518, 2012, "doi: 10.1002/spe.1104". 

[30]P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the Art of Virtualization,” ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164–177, 2003, "doi: 10.1145/945445.945462 ". 

[31]R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Futur. Gener. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009, 2009, "doi: 10.1016/j.future.2008.12.001".

[32]R. Jain and S. Paul, “Network Virtualization and Software Defined Networking for Cloud Computing: a Survey,” IEEE Commun. Mag., vol. 51, no. 11, pp. 24–31, 2013, "doi:10.1109/MCOM.2013.6658648".

[33]M. Shiraz, S. Abolfazli, Z. Sanaei, and A. Gani, “A Study on Virtual Machine Deployment for Application Outsourcing in Mobile Cloud Computing,” J. Supercomput., vol. 63, no. 3, pp. 946–964, 2013, "doi: 10.1007/s11227-012-0846-y".

[34]F. Zhang, J. Cao, K. Hwang, and C. Wu, “Ordinal Optimized Scheduling of Scientific Workflows in Elastic Compute Clouds,” in Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, 2011, pp. 9–17.

[35]F. Lao, X. Zhang, and Z. Guo, “Parallelizing Video Transcoding Using Map-reduce-Based Cloud Computing,” in Circuits and Systems (ISCAS), 2012 IEEE International Symposium on, 2012, pp. 2905–2908, "doi: 10.1109/ISCAS.2012.6271923".

[36]T. Xie, X. Qin, and A. Sung, “SAREC: A Security-Aware Scheduling Strategy for Real-time Applications on Clusters,” in Parallel Processing, 2005. ICPP 2005. International Conference on, 2005, pp. 5–12, "doi: 10.1109/ICPP.2005.68". 

[37]M. A. Arfeen, K. Pawlikowski, and A. Willig, “A Framework for Resource Allocation Strategies in Cloud Computing Environment,” in Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual, 2011, pp. 261–266, "doi: 10.1109/COMPSACW.2011.52".

[38]F. López, M. A. Amutio, J. Candau, and J. A. Mañas, “Methodology for Information Systems Risk Analysis and Management,” Minist. Public Adm., 2005.

[39]T. Aven, “Risk analysis. Assessing uncertaintie   beyond expected values and probabilities, 2008.” Wiley, Chichester, UKT, "doi: 10.1002/9780470694435".

[40]M. J. Thaheem, A. De Marco, and K. Barlish, “A Review of Quantitative Analysis Techniques for Construction Project Risk Management,” in Proceedings of the Creative Construct Conference, 2012, pp. 656–667.

[41]K. Gokulnath and R. Uthariaraj, “Game Theory Based Trust Model for Cloud Environment,” Sci. World J., vol. 2015, 2015, "doi: 10.1155/2015/709827".