1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
‣ System model - Business processes - Computational resources ‣ Optimization model - Resource allocation - Scheduling of process steps - Service deployment constraints
process executions ‣ Idle resources ‣ Ordered execution of process steps 10 min X v2V cv · (v,t) + X p2P X ip 2Ip c p ip · e p ip + X v2V X kv 2Kv ( ! C f · f C kv + ! R f · f R kv ) X p2P X ip 2Ip X jip 2J⇤ ip 1 DLip ⌧t x(jip ,kv,t)
Private Cloud 3 SLAP = 8 > < > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) SLAP = 8 > > > < > > > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) Private Cloud 3 ()
V = [ loc 2 Loc V loc K = [ loc 2 Loc K loc x(j ip ,k vloc ,t) = ( 0 , if ji p / 2 SLAP loc , loc 2 Loc {0 , 1} , else ‣ Extend the definition of currently leased VMs ‣ Restrict the deployment based on the SLA
Classic deployment on dedicated clouds - Other privacy ensuring methods like homomorphic encryption [gen2009] ‣Investigate data transfer aspects among clouds ‣Investigate different deployment strategies - Pricing models - Cloud/VM granularity ‣Investigate global datastores, i.e. databases 22