Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Privacy-Aware Scheduling for Inter-Organization...

Privacy-Aware Scheduling for Inter-Organizational Processes

Presentation of my research paper "Privacy-Aware Scheduling for Inter-Organizational Processes" at the ZEUS workshop 2015 in Jena, Germany.

Christoph Hochreiner

February 20, 2015
Tweet

More Decks by Christoph Hochreiner

Other Decks in Research

Transcript

  1. Agenda ‣ Motivation ‣ Privacy-aware scheduling ‣ Outlook 2 Motivate

    the need of a privacy-aware scheduling and present the approach.
  2. BUSINESS PROCESS 4 Company 1 Company 2 Company 3 Service

    1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  3. Company 3 Company 2 Company 1 INITIAL SETUP 5 Service

    1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  4. Company 3 Company 2 Community Cloud DESIRED SETUP 6 Service

    1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  5. FOUNDATION 8 ‣ Resource allocation and scheduling approach ‣ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  6. RESOURCE ALLOCATION AND SCHEDULING 9 Service Instance Placement Problem [hoe2014]


    ‣ System model - Business processes - Computational resources ‣ Optimization model - Resource allocation - Scheduling of process steps - Service deployment constraints
  7. SIPP ‣ Overall leasing cost ‣ Penalty cost for delayed

    process executions ‣ Idle resources ‣ Ordered execution of process steps 10 min X v2V cv · (v,t) + X p2P X ip 2Ip c p ip · e p ip + X v2V X kv 2Kv ( ! C f · f C kv + ! R f · f R kv ) X p2P X ip 2Ip X jip 2J⇤ ip 1 DLip ⌧t x(jip ,kv,t)
  8. FOUNDATION 11 ✓ Resource allocation and scheduling approach ‣ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  9. SLA DEFINITION 12 Requirements ‣ Simple representation of constraints ‣

    Model deployment constraints Relevant approaches ‣ Blacklisting
 Optimistic approach ‣ Whitelisting
 Defensive approach
  10. BLACKLISTING 13 Community Cloud Private Cloud 1 Private Cloud 2

    Private Cloud 3 SLAP = 8 > < > : Community Cloud (Service 3, Service 5) Private Cloud 1 (Service 5) Private Cloud 2 (Service 3) SLAP = 8 > > > < > > > : Community Cloud (Service 3, Service 5) Private Cloud 1 (Service 5) Private Cloud 2 (Service 3) Private Cloud 3 (Service 3, Service 5)
  11. WHITELISTING 14 Community Cloud Private Cloud 1 Private Cloud 2

    Private Cloud 3 SLAP = 8 > < > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) SLAP = 8 > > > < > > > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) Private Cloud 3 ()
  12. SLA DEFINITION 15 Blacklisting + Concise definition - Requires updates

    for new clouds Whitelisting + Requires no updates for new clouds - More detailed than blacklisting
  13. FOUNDATION 16 ✓ Resource allocation and scheduling approach ✓ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  14. PRIVACY EXTENSIONS 17 ‣ Extend the definition of available VMs

    V = [ loc 2 Loc V loc K = [ loc 2 Loc K loc x(j ip ,k vloc ,t) = ( 0 , if ji p / 2 SLAP loc , loc 2 Loc {0 , 1} , else ‣ Extend the definition of currently leased VMs ‣ Restrict the deployment based on the SLA
  15. FOUNDATION 18 ✓ Resource allocation and scheduling approach ✓ Appropriate

    SLA definition ✓ Privacy aware deployment constraints Privacy-aware scheduling for Inter-Organizational Processes is possible
  16. CONCLUSION 20 ‣ Evaluated different SLA approaches ‣ Formulated an

    approach for privacy aware 
 business process executions … but - up to now … ‣ Only a theoretical concept ‣ Needs extensive evaluation
  17. OUTLOOK ‣Evaluate approach against other privacy 
 preserving approaches -

    Classic deployment on dedicated clouds - Other privacy ensuring methods like homomorphic encryption [gen2009] ‣Investigate data transfer aspects among clouds ‣Investigate different deployment strategies - Pricing models - Cloud/VM granularity ‣Investigate global datastores, i.e. databases 22