Title: An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures

Authors: Maha Jebalia; Asma Ben Letaïfa; Mohamed Hamdi; Sami Tabbane

Addresses: MEDIATRON Research Unit, Higher School of Communications of Tunis, Sup'Com, City of Communication Technologies 2083 – ARIANA, Rte de Raoued Km 3,5, 2083, Ariana, Tunisia ' MEDIATRON Research Unit, Higher School of Communications of Tunis, Sup'Com, City of Communication Technologies 2083 – ARIANA, Rte de Raoued Km 3,5, 2083, Ariana, Tunisia ' MEDIATRON Research Unit, Higher School of Communications of Tunis, Sup'Com, City of Communication Technologies 2083 – ARIANA, Rte de Raoued Km 3,5, 2083, Ariana, Tunisia ' MEDIATRON Research Unit, Higher School of Communications of Tunis, Sup'Com, City of Communication Technologies 2083 – ARIANA, Rte de Raoued Km 3,5, 2083, Ariana, Tunisia

Abstract: In this paper, we will deal with resource allocation problem in cloud computing environments where users compete to have enough resources to run their applications and store their data. First, we will present an overview of the resource allocation models adopted in literature and focus essentially on game theoretic approaches. To this purpose, a set of criteria will be defined so as to assess the performance of the proposed game models with respect to cloud computing needs in terms of QoS and security. At the end of this paper, we will formalise and discuss an optimisation model for resource allocation based on a cooperative game approach where cloud providers may form a pool of resources in order to maximise their profit. We will especially focus on providing a model that compensates losses generated by the adoption of security mechanisms and maximises the overall payoff.

Keywords: cloud computing; game theory; resource allocation; resource pooling; coalitional games; security requirements; QoS; quality of service; optimisation models; modelling; loss compensation; overall payoff.

DOI: 10.1504/IJCC.2015.067708

International Journal of Cloud Computing, 2015 Vol.4 No.1, pp.63 - 77

Received: 03 Sep 2013
Accepted: 29 Dec 2013

Published online: 18 Mar 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article