Skip to main content

A Transactional Approach to Enforce Resource Availabilities: Application to the Cloud

  • Conference paper
  • First Online:
Research Challenges in Information Science (RCIS 2021)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 415))

Included in the following conference series:

Abstract

This paper looks into the availability of resources, exemplified with the cloud, in an open and dynamic environment like the Internet. A growing number of users consume resources to complete their operations requiring a better way to manage these resources in order to avoid conflicts, for example. Resource availability is defined using a set of consumption properties (limited, limited-but-renewable, and non-shareable) and is enforced at run-time using a set of transactional properties (pivot, retriable, and compensatable). In this paper, a CloudSim-based system simulates how mixing consumption and transactional properties allows to capture users’ needs and requirements in terms of what cloud resources they need, for how long, and to what extent they tolerate the unavailability of these resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Conditions vary according to the resource’s type and consumption property. They could be availability for limited resources and access rights for non-shareable resources.

  2. 2.

    Consumption cycle/Consumption sub-cycle is similar to Process/Thread.

  3. 3.

    Our approach does not depend on any specific resource description-model.

  4. 4.

    www.shopify.com/encyclopedia/resource-management.

References

  1. Agarwal, A., Prasad, A., Rustogi, R., Mishra, S.: Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach. J. Inf. Secur. Appl. 56 (2021)

    Google Scholar 

  2. Bellaaj, F., Brabra, H., Sellami, M., Gaaloul, W., Bhiri, S.: A transactional approach for reliable elastic cloud resources. In: Proceedings of SCC 2019, Milan, Italy (2019)

    Google Scholar 

  3. Cades, D., Werner, N., Trafton, J., Boehm-Davis, D., Monk, C.: Dealing with interruptions can be complex, but does interruption complexity matter: a mental resources approach to quantifying disruptions. In: Proceedings of the Human Factors and Ergonomics Society, 1 (2008)

    Google Scholar 

  4. Calheiros, R., Ranjan, R., Beloglazov, A., De Rose, C., Buyya, R.: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Pract. Exper. 41(1) (2011)

    Google Scholar 

  5. Clarke, E., Emerson, E.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: 25 Years of Model Checking - History, Achievements, Perspectives, vol. 5000 (2008)

    Google Scholar 

  6. Fernández, E., Bogado, V., Salomone, E., Chiotti, O.: Framework for modelling and simulating the supply process monitoring to detect and predict disruptive events. Comput. Ind. 80 (2016)

    Google Scholar 

  7. Frank, L., Ulslev Pedersen, R.: Integrated distributed/mobile logistics management. Trans. LDKS 5 (2012)

    Google Scholar 

  8. Graiet, M., Mammar, A., Boubaker, S., Gaaloul, W.: Towards correct cloud resource allocation in business processes. IEEE Trans. Serv. Comput. 10(1) (2017)

    Google Scholar 

  9. Kallel, S., et al.: Restriction-based fragmentation of business processes over the cloud. Concurr. Comput. Pract. Exper. Wiley, (2019, forthcoming)

    Google Scholar 

  10. Little, M.: Transactions and web services. CACM 46(10) (2003)

    Google Scholar 

  11. Ma, J., Cao, J., Zhang, Y.: Efficiently supporting secure and reliable collaboration in scientific workflows. JCSS 76(6) (2010)

    Google Scholar 

  12. Maamar, Z., Faci, N., Sakr, S., Boukhebouze, M., Barnawi, A.: Network-based social coordination of business processes. IS, 58 (2016)

    Google Scholar 

  13. Maamar, Z., Narendra, N., Benslimane, D., Sattanathan, S.: Policies for context-driven transactional web services. In: Proceedings of CAiSE 2007, Trondheim, Norway (2007)

    Google Scholar 

  14. Maamar, Z., Sellami, M., Narendra, N., Guidara, I., Ugljanin, E., Banihashemi, B.: Towards an approach for validating the Internet-of-Transactional-Things. In: Proceedings of AINA 2020, Caserta, Italy (online) (2020)

    Google Scholar 

  15. Motahari-Nezhad, H., Stephenson, B., Singha, S.: Outsourcing business to cloud computing services: opportunities and challenges. IT Professional 11(2) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatma Masmoudi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maamar, Z., Sellami, M., Masmoudi, F. (2021). A Transactional Approach to Enforce Resource Availabilities: Application to the Cloud. In: Cherfi, S., Perini, A., Nurcan, S. (eds) Research Challenges in Information Science. RCIS 2021. Lecture Notes in Business Information Processing, vol 415. Springer, Cham. https://doi.org/10.1007/978-3-030-75018-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75018-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75017-6

  • Online ISBN: 978-3-030-75018-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics