Algorithmic Aspects of Resource Management in the Cloud

  • Sebastian Kniesburges
  • Christine Markarian
  • Friedhelm Meyer auf der Heide
  • Christian Scheideler
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8576)


In this survey article, we discuss two algorithmic research areas that emerge from problems that arise when resources are offered in the cloud. The first area, online leasing, captures problems arising from the fact that resources in the cloud are not bought, but leased by cloud vendors. The second area, Distributed Storage Systems, deals with problems arising from so-called cloud federations, i.e., when several cloud providers are needed to fulfill a given task.


Cloud Computing Data Item Cloud Service Overlay Network Cloud Provider 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Amazon Elastic Compute Cloud,
  2. 2.
    Salesforces Cloud Computing Architecture,
  3. 3.
    Google App Engine,
  4. 4.
  5. 5.
    Apache Cassandra,
  6. 6.
    Amazon Web Services,
  7. 7.
    Assuncao, M.D., Costanzo, A., Buyya, R.: Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clusters. In: Proceedings of the 18th International Symposium on High Performance Distributed Computing (HPDC) (2009)Google Scholar
  8. 8.
    Malik, S., Huet, F.: Virtual Cloud: Rent Out the Rented Resources. In: Proceedings of the 6th IEEE International Conference for Internet Technology and Secured Transactions (ICITST), pp. 536–541 (2011)Google Scholar
  9. 9.
    Ben-Yehuda, O., Ben-Yehuda, M., Schuster, A., Tsafrir, D.: Deconstructing Amazon EC2 Spot Instance Pricing. In: Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (Cloud-Com) (2011)Google Scholar
  10. 10.
    Ben-Yehuda, O., Ben-Yehuda, M., Schuster, A., Tsafrir, D.: The Resource-as-a-Service (RaaS) Cloud. In: Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud) (2012)Google Scholar
  11. 11.
    Buyya, R., Ranjan, R., Calheiros, R.N.: InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010, Part I. LNCS, vol. 6081, pp. 13–31. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  12. 12.
    Assuno, M., Buyya, R., Venugopal, S.: InterGrid: A Case for Internetworking Islands of Grids. Journal of Concurrency and Computation: Practice and Experience Archive 20(8) (2008)Google Scholar
  13. 13.
    Assuncao, M., Buyya, R.: Performance Analysis of Allocation Policies for Inter-Grid Resource Provisioning. Information and Software Technology 51(1), 42–55 (2009)CrossRefGoogle Scholar
  14. 14.
    Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., Morrow, M.: Blueprint for the Inter-cloud Protocols and Formats for Cloud Computing Interoperability. In: Proceedings of the 4th International Conference on Internet and Web Applications and Services (2009)Google Scholar
  15. 15.
    Campbell, R., Gupta, I., Heath, M., Ko, S., Kozuch, M., Kunze, M., Kwan, T., Lai, K., Lee, H., Lyons, M., Milojicic, D., O’Hallaron, D., Soh, Y.: Open CirrusTM Cloud Computing Testbed: Federated Data Centers for Open Source Systems and Services Research. In: Proceedings of the Conference on Hot Topics in Cloud Computing, HotCloud (2009)Google Scholar
  16. 16.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: How to Enhance Cloud Architectures to Enable Cross-Federation. In: Proceedings of the IEEE 3rd International Conference on Cloud Computing, CLOUD (2010)Google Scholar
  17. 17.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication. In: Proceedings of the 2nd International Conference on Advances in Future Internet (2010)Google Scholar
  18. 18.
    Keahey, K., Tsugawa, M., Matsunaga, A., Fortes, J.: Sky Computing. Proceedings of the IEEE Journal of Internet Computing 13(5), 43–51 (2009)CrossRefGoogle Scholar
  19. 19.
    Vinothina, V., Sridaran, R., Ganapathi, P.: A Survey on Resource Allocation Strategies in Cloud Computing. International Journal of Advanced Computer Science and Applications 3(6), 97–104 (2012)CrossRefGoogle Scholar
  20. 20.
    Anthony, B.M., Gupta, A.: Infrastructure leasing problems. In: Fischetti, M., Williamson, D.P. (eds.) IPCO 2007. LNCS, vol. 4513, pp. 424–438. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  21. 21.
    Meyerson, A.: The parking permit problem. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 274–284 (2005)Google Scholar
  22. 22.
    Nagarajan, C., Williamson, D.P.: Offline and online facility leasing. In: Lodi, A., Panconesi, A., Rinaldi, G. (eds.) IPCO 2008. LNCS, vol. 5035, pp. 303–315. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  23. 23.
    Abshoff, S., Markarian, C., Meyer auf der Heide, F.: Online Algorithms for Set Cover Leasing Problems (in preparation)Google Scholar
  24. 24.
    Kling, P., Meyer auf der Heide, F., Pietrzyk, P.: An algorithm for online facility leasing. In: Even, G., Halldórsson, M.M. (eds.) SIROCCO 2012. LNCS, vol. 7355, pp. 61–72. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  25. 25.
    Fotakis, D.: A primal-dual algorithm for online non-uniform facility location. Journal of Discrete Algorithms 5, 141–148 (2007)CrossRefzbMATHMathSciNetGoogle Scholar
  26. 26.
    Alon, N., Awerbuch, B., Azar, Y., Buchbinder, N., Naor, J.: The online set cover problem. In: Proceedings of the 35th Annual ACM Symposium on the Theory of Computation (STOC), pp. 100–105 (2003)Google Scholar
  27. 27.
    Meyerson, A.: Online Facility Location. In: Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science, pp. 426–431 (2001)Google Scholar
  28. 28.
    Fotakis, D.: On the Competitive Ratio for Online Facility Location. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 637–652. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  29. 29.
    Alon, N., Awerbuch, B., Azar, Y., Buchbinder, N.: A General Approach to Online Network Optimization Problems. In: Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 577–586 (2004)Google Scholar
  30. 30.
    Buchbinder, N., Naor, J.: Online primal-dual algorithms for covering and packing problems. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, vol. 3669, pp. 689–701. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  31. 31.
    Alon, N., Moshkovitz, D., Safra, S.: Algorithmic construction of sets for k-restrictions. ACM Transactions on Algorithms 2, 153–177 (2006)CrossRefMathSciNetGoogle Scholar
  32. 32.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I.O.N., Zaharia, M.: A view of cloud computing. Communications of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  33. 33.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I.O.N., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical Report (2009)Google Scholar
  34. 34.
    Kurze, T., Klems, M., Bermbach, D., Lenk, A., Tai, S., Kunze, M.: Cloud Federation. In: Proceedings of the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2011) (2011)Google Scholar
  35. 35.
    Villegas, D., Bobroff, N., Rodero, I., Delgado, J., Liu, Y., Devarakonda, A., Fong, L., Sadjadi, S.M., Parashar, M.: Cloud federation in a layered service model. Journal of Computer and System Sciences 78(5), 1330–1344 (2012)CrossRefGoogle Scholar
  36. 36.
    Zhang, Z., Zhang, X.: Realization of open cloud computing federation based on mobile agent. In: Proceedings of IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009), pp. 642–646 (2009)Google Scholar
  37. 37.
    Ranjan, R., Buyya, R.: Decentralized overlay for federation of enterprise clouds. CoRR abs/0811.2563 (2008)Google Scholar
  38. 38.
    Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I.M., Montero, R., Wolfsthal, Y., Elmroth, E., Cceres, J., Ben-Yehuda, M., Emmerich, W., Galn, F.: The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development 53, 535–545 (2009)CrossRefGoogle Scholar
  39. 39.
    Bernstein, D., Vij, D., Diamond, S.: An Intercloud Cloud Computing Economy - Technology, Governance, and Market Blueprints. In: SRII Global Conference (SRII 2011), pp. 293–299 (2011)Google Scholar
  40. 40.
    Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Systems Review 44(2), 35–40 (2010)CrossRefGoogle Scholar
  41. 41.
    DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: amazon’s highly available key-value store. In: Proceedings of twenty-first ACM SIGOPS Symposium on Operating Systems Principles (SOSP 2007), pp. 205–220 (2007)Google Scholar
  42. 42.
    Karger, D., Lehman, E., Leighton, T., Levine, M., Lewin, D., Panigrahy, R.: Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In: STOC 1997, pp. 654–663 (1997)Google Scholar
  43. 43.
    Plaxton, C.G., Rajaraman, R., Richa, A.W.: Accessing nearby copies of replicated objects in a distributed environment. In: SPAA 1997, pp. 311–320 (1997)Google Scholar
  44. 44.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: SIGCOMM, pp. 161–172 (2001)Google Scholar
  45. 45.
    Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  46. 46.
    Stoica, I., Morris, R., Karger, D., Frans Kaashoek, M., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: SIGCOMM, pp. 149–160 (2001)Google Scholar
  47. 47.
    Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: a resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22(1), 41–53 (2006)CrossRefGoogle Scholar
  48. 48.
    Kaashoek, F., Karger, D.R.: Koorde: A Simple Degree-optimal Hash Table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 98–107. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  49. 49.
    Godfrey, B., Lakshminarayanan, K., Surana, S., Karp, R., Stoica, I.: Load balancing in dynamic structured p2p systems. In: 23rd Conference of the IEEE Communications Society, INFOCOM (2004)Google Scholar
  50. 50.
    Rao, A., Lakshminarayanan, K., Surana, S., Karp, R., Stoica, I.: Load balancing in structured P2P systems. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 68–79. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  51. 51.
    Byers, J., Considine, J., Mitzenmacher, M.: Simple Load Balancing for DHTs. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 80–87. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  52. 52.
    Mitzenmacher, M., Richa, A.W., Sitaraman, R.: The power of two random choices: A survey of techniques and results. In: Handbook of Randomized Computing (2000)Google Scholar
  53. 53.
    Naor, M., Wieder, U.: Novel architectures for P2P applications: the continuous discrete approach. In: Proc. of the 15th ACM Symp. on Parallel Algorithms and Architectures (SPAA), pp. 50–59 (2003)Google Scholar
  54. 54.
    Naor, M., Wieder, U.: A simple fault tolerant distributed hash table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 88–97. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  55. 55.
    Karger, D.R., Ruhl, M.: Simple efficient load balancing algorithms for peer-to-peer systems. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 131–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  56. 56.
    Karger, D.R., Ruhl, M.: Simple efficient load balancing algorithms for peer-to-peer systems. In: Proc. of the 16th ACM Symp. on Parallelism in Algorithms and Architectures (SPAA), pp. 36–43 (2004)Google Scholar
  57. 57.
    Bienkowski, M., Korzeniowski, M., Meyer auf der Heide, F.: Dynamic load balancing in distributed hash tables. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 217–225. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  58. 58.
    Berns, A., Ghosh, S., Pemmaraju, S.V.: Building self-stabilizing overlay networks with the transitive closure framework. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 62–76. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  59. 59.
    Dolev, S., Kat, R.: Hypertree for self-stabilizing peer-to-peer systems. In: NCA, pp. 25–32 (2004)Google Scholar
  60. 60.
    Jacob, R., Richa, A., Scheideler, C., Schmid, S., Täubig, H.: A distributed polylogarithmic time algorithm for self-stabilizing skip graphs. In: PODC, pp. 131–140 (2009)Google Scholar
  61. 61.
    Feldotto, M., Graffi, K., Scheideler, C.: HSkip+: A self-stabilizing overlay network for nodes with heterogeneous bandwidths. Technical report, University of Paderborn (2014)Google Scholar
  62. 62.
    Godfrey, P.B., Stoica, I.: Heterogeneity and Load Balance in Distributed Hash Tables. In: IEEE INFOCOM (2005)Google Scholar
  63. 63.
    Bienkowski, M., Brinkmann, A., Klonowski, M., Korzeniowski, M.: SkewCCC+: A heterogeneous distributed hash table. In: Lu, C., Masuzawa, T., Mosbah, M. (eds.) OPODIS 2010. LNCS, vol. 6490, pp. 219–234. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  64. 64.
    Kniesburges, S., Koutsopoulos, A., Scheideler, C.: Re-chord: a self-stabilizing chord overlay network. In: SPAA 2011, pp. 235–244 (2011)Google Scholar
  65. 65.
    Schindelhauer, C., Schomaker, G.: Weighted distributed hash tables. In: SPAA 2005, pp. 218–227 (2005)Google Scholar
  66. 66.
    Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17, 643–644 (1974)CrossRefzbMATHGoogle Scholar
  67. 67.
    Kniesburges, S., Koutsopoulos, A., Scheideler, C.: CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System. In: Afek, Y. (ed.) DISC 2013. LNCS, vol. 8205, pp. 537–549. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Sebastian Kniesburges
    • 1
  • Christine Markarian
    • 1
  • Friedhelm Meyer auf der Heide
    • 1
  • Christian Scheideler
    • 1
  1. 1.Heinz Nixforf Institute & Department of Computer ScienceUniversity of PaderbornGermany

Personalised recommendations