Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Privacy-Aware Scheduling for Inter-Organization...

Privacy-Aware Scheduling for Inter-Organizational Processes

Presentation of my research paper "Privacy-Aware Scheduling for Inter-Organizational Processes" at the ZEUS workshop 2015 in Jena, Germany.

Avatar for Christoph Hochreiner

Christoph Hochreiner

February 20, 2015
Tweet

More Decks by Christoph Hochreiner

Other Decks in Research

Transcript

  1. Agenda ‣ Motivation ‣ Privacy-aware scheduling ‣ Outlook 2 Motivate

    the need of a privacy-aware scheduling and present the approach.
  2. BUSINESS PROCESS 4 Company 1 Company 2 Company 3 Service

    1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  3. Company 3 Company 2 Company 1 INITIAL SETUP 5 Service

    1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  4. Company 3 Company 2 Community Cloud DESIRED SETUP 6 Service

    1 Service 2 Service 3 Service 4 Service 5 Service 6 Company 1 Company 2 Company 3 Service 1 Service 2 Service 4 Service 3 Service 5 privacy sensitive Service 6
  5. FOUNDATION 8 ‣ Resource allocation and scheduling approach ‣ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  6. RESOURCE ALLOCATION AND SCHEDULING 9 Service Instance Placement Problem [hoe2014]


    ‣ System model - Business processes - Computational resources ‣ Optimization model - Resource allocation - Scheduling of process steps - Service deployment constraints
  7. SIPP ‣ Overall leasing cost ‣ Penalty cost for delayed

    process executions ‣ Idle resources ‣ Ordered execution of process steps 10 min X v2V cv · (v,t) + X p2P X ip 2Ip c p ip · e p ip + X v2V X kv 2Kv ( ! C f · f C kv + ! R f · f R kv ) X p2P X ip 2Ip X jip 2J⇤ ip 1 DLip ⌧t x(jip ,kv,t)
  8. FOUNDATION 11 ✓ Resource allocation and scheduling approach ‣ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  9. SLA DEFINITION 12 Requirements ‣ Simple representation of constraints ‣

    Model deployment constraints Relevant approaches ‣ Blacklisting
 Optimistic approach ‣ Whitelisting
 Defensive approach
  10. BLACKLISTING 13 Community Cloud Private Cloud 1 Private Cloud 2

    Private Cloud 3 SLAP = 8 > < > : Community Cloud (Service 3, Service 5) Private Cloud 1 (Service 5) Private Cloud 2 (Service 3) SLAP = 8 > > > < > > > : Community Cloud (Service 3, Service 5) Private Cloud 1 (Service 5) Private Cloud 2 (Service 3) Private Cloud 3 (Service 3, Service 5)
  11. WHITELISTING 14 Community Cloud Private Cloud 1 Private Cloud 2

    Private Cloud 3 SLAP = 8 > < > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) SLAP = 8 > > > < > > > : Community Cloud (Service 1, Service 2, Service 4) Private Cloud 1 (Service 1, Service 2, Service 4, Service 3) Private Cloud 2 (Service 1, Service 2, Service 4, Service 5) Private Cloud 3 ()
  12. SLA DEFINITION 15 Blacklisting + Concise definition - Requires updates

    for new clouds Whitelisting + Requires no updates for new clouds - More detailed than blacklisting
  13. FOUNDATION 16 ✓ Resource allocation and scheduling approach ✓ Appropriate

    SLA definition ‣ Privacy aware deployment constraints
  14. PRIVACY EXTENSIONS 17 ‣ Extend the definition of available VMs

    V = [ loc 2 Loc V loc K = [ loc 2 Loc K loc x(j ip ,k vloc ,t) = ( 0 , if ji p / 2 SLAP loc , loc 2 Loc {0 , 1} , else ‣ Extend the definition of currently leased VMs ‣ Restrict the deployment based on the SLA
  15. FOUNDATION 18 ✓ Resource allocation and scheduling approach ✓ Appropriate

    SLA definition ✓ Privacy aware deployment constraints Privacy-aware scheduling for Inter-Organizational Processes is possible
  16. CONCLUSION 20 ‣ Evaluated different SLA approaches ‣ Formulated an

    approach for privacy aware 
 business process executions … but - up to now … ‣ Only a theoretical concept ‣ Needs extensive evaluation
  17. OUTLOOK ‣Evaluate approach against other privacy 
 preserving approaches -

    Classic deployment on dedicated clouds - Other privacy ensuring methods like homomorphic encryption [gen2009] ‣Investigate data transfer aspects among clouds ‣Investigate different deployment strategies - Pricing models - Cloud/VM granularity ‣Investigate global datastores, i.e. databases 22