Reference Hub1
A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources

A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources

Karim Zarour, Djamel Benmerzoug
Copyright: © 2022 |Volume: 12 |Issue: 1 |Pages: 19
ISSN: 1947-3052|EISSN: 1947-3060|EISBN13: 9781683181651|DOI: 10.4018/IJSSOE.300783
Cite Article Cite Article

MLA

Zarour, Karim, and Djamel Benmerzoug. "A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources." IJSSOE vol.12, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSSOE.300783

APA

Zarour, K. & Benmerzoug, D. (2022). A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 12(1), 1-19. http://doi.org/10.4018/IJSSOE.300783

Chicago

Zarour, Karim, and Djamel Benmerzoug. "A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources," International Journal of Systems and Service-Oriented Engineering (IJSSOE) 12, no.1: 1-19. http://doi.org/10.4018/IJSSOE.300783

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The adoption of the Business Process outsourcing strategy has been accentuated with the advent of Cloud computing that brings a new model for consuming and paying resources. Nevertheless, companies hesitate between a high distribution allowing to combine several Cloud offers adapted for process fragments and guarantee a good level of obfuscation or a weak distribution to minimize the data transfer which is charged by most suppliers and which may slow down the execution of processes. Hence, this paper proposes a novel selection method based on a heuristic algorithm that aims to find the right balance by optimizing the cost and performance while ensuring the protection of outsourced processes. To this end, several criteria are considered such as data transfer, task separation constraints and tolerated delay margins. The results obtained through a case study and comparisons with other selection methods show that the configurations selected by the algorithm meet companies’ requirements and are at the same time inexpensive, efficient and secure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.