SlideShare a Scribd company logo
Cost-Based Optimization of Service Compositions
ABSTRACT:
For providers of composite services, preventing cases of SLA violations is crucial.
Previous work has established runtime adaptation of compositions as a promising
tool to achieve SLA conformance. However, to get a realistic and complete view of
the decision process of service providers, the costs of adaptation need to be taken
into account. In this paper, we formalize the problem of finding the optimal set of
adaptations, which minimizes the total costs arising from SLA violations and the
adaptations to prevent them. We present possible algorithms to solve this complex
optimization problem, and detail an end-to-end system based on our earlier work
on the PREvent (prediction and prevention based on event monitoring) framework,
which clearly indicates the usefulness of our model. We discuss experimental
results that show how the application of our approach leads to reduced costs for the
service provider, and explain the circumstances in which different algorithms lead
to more or less satisfactory results.
EXISTING SYSTEM:
Previous work has established runtime adaptation of compositions as a promising
tool to achieve SLA conformance. However, to get a realistic and complete view of
the decision process of service providers, the costs of adaptation need to be taken
into account.
DISADVANTAGES OF EXISTING SYSTEM:
 Complex optimization problem
PROPOSED SYSTEM:
 In this paper, we contribute to the state of the art by formalizing this tradeoff
as an optimization problem, with the goal of minimizing the total costs (of
violations and applied adaptations) for the service provider. We argue that
this formulation better captures the real goals of service providers.
Additionally, we present possible algorithms to solve this optimization
problem efficiently enough to be applied at composition runtime. We
evaluate these algorithms within our PREVENT (prediction and prevention
based on event monitoring) framework.
 In this paper, we formalize the problem of finding the optimal set of
adaptations, which minimizes the total costs arising from SLA violations and
the adaptations to prevent them.
ADVANTAGES OF PROPOSED SYSTEM:
 To the best of our knowledge, no approaches with the exact focus of this
paper (cost-based optimization of service compositions) have been published
so far.
 There generally is a tradeoff to consider between preventing SLA violations
and the costs of doing so. Hence, a composite service provider is
maximizing his own revenue by minimizing his total costs.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Philipp Leitner, Member, IEEE, Waldemar Hummer, Student Member, IEEE, and
Schahram Dustdar, Senior Member, IEEE, “Cost-Based Optimization of Service
Compositions”, IEEE TRANSACTIONS ON SERVICES COMPUTING,
VOL. 6, NO. 2, APRIL-JUNE 2013.

More Related Content

DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Secure encounter based mobile social networks requirements, designs, and trad...
DOCX
Efficient rekeying framework for secure multicast with diverse subscription-p...
DOCX
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
DOCX
Cross domain privacy-preserving cooperative firewall optimization
DOCX
Anonymization of centralized and distributed social networks by sequential cl...
Attribute based encryption with verifiable outsourced decryption
A highly scalable key pre distribution scheme for wireless sensor networks
Scalable and secure sharing of personal health records in cloud computing usi...
Secure encounter based mobile social networks requirements, designs, and trad...
Efficient rekeying framework for secure multicast with diverse subscription-p...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cross domain privacy-preserving cooperative firewall optimization
Anonymization of centralized and distributed social networks by sequential cl...

Viewers also liked (10)

DOCX
Pmse a personalized mobile search engine
DOCX
Beyond text qa multimedia answer generation by harvesting web information
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
DOCX
Distributed processing of probabilistic top k queries in wireless sensor netw...
DOC
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
Dynamic audit services for outsourced storages in clouds
DOCX
Attribute aware data aggregation using potential-based dynamic routing n wire...
DOCX
Two tales of privacy in online social networks
DOC
Adaptive position update for geographic routing in mobile ad hoc networks
Pmse a personalized mobile search engine
Beyond text qa multimedia answer generation by harvesting web information
Sort a self o rganizing trust model for peer-to-peer systems
Distributed processing of probabilistic top k queries in wireless sensor netw...
Scalable and secure sharing of personal health records in cloud computing usi...
Privacy preserving data sharing with anonymous id assignment
Dynamic audit services for outsourced storages in clouds
Attribute aware data aggregation using potential-based dynamic routing n wire...
Two tales of privacy in online social networks
Adaptive position update for geographic routing in mobile ad hoc networks
Ad

Similar to Cost based optimization of service compositions (7)

PDF
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDY
PDF
Iaetsd protecting privacy preserving for cost effective adaptive actions
PDF
Location-aware deep learning-based framework for optimizing cloud consumer q...
PDF
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
PDF
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
PDF
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
PDF
Seminar pasqualina potena
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDY
Iaetsd protecting privacy preserving for cost effective adaptive actions
Location-aware deep learning-based framework for optimizing cloud consumer q...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...
Seminar pasqualina potena
Ad

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Computing-Curriculum for Schools in Ghana
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PDF
01-Introduction-to-Information-Management.pdf
PDF
Sports Quiz easy sports quiz sports quiz
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial diseases, their pathogenesis and prophylaxis
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Computing-Curriculum for Schools in Ghana
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
VCE English Exam - Section C Student Revision Booklet
Final Presentation General Medicine 03-08-2024.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Classroom Observation Tools for Teachers
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program
RMMM.pdf make it easy to upload and study
01-Introduction-to-Information-Management.pdf
Sports Quiz easy sports quiz sports quiz

Cost based optimization of service compositions

  • 1. Cost-Based Optimization of Service Compositions ABSTRACT: For providers of composite services, preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of the decision process of service providers, the costs of adaptation need to be taken into account. In this paper, we formalize the problem of finding the optimal set of adaptations, which minimizes the total costs arising from SLA violations and the adaptations to prevent them. We present possible algorithms to solve this complex optimization problem, and detail an end-to-end system based on our earlier work on the PREvent (prediction and prevention based on event monitoring) framework, which clearly indicates the usefulness of our model. We discuss experimental results that show how the application of our approach leads to reduced costs for the service provider, and explain the circumstances in which different algorithms lead to more or less satisfactory results. EXISTING SYSTEM: Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of
  • 2. the decision process of service providers, the costs of adaptation need to be taken into account. DISADVANTAGES OF EXISTING SYSTEM:  Complex optimization problem PROPOSED SYSTEM:  In this paper, we contribute to the state of the art by formalizing this tradeoff as an optimization problem, with the goal of minimizing the total costs (of violations and applied adaptations) for the service provider. We argue that this formulation better captures the real goals of service providers. Additionally, we present possible algorithms to solve this optimization problem efficiently enough to be applied at composition runtime. We evaluate these algorithms within our PREVENT (prediction and prevention based on event monitoring) framework.  In this paper, we formalize the problem of finding the optimal set of adaptations, which minimizes the total costs arising from SLA violations and the adaptations to prevent them.
  • 3. ADVANTAGES OF PROPOSED SYSTEM:  To the best of our knowledge, no approaches with the exact focus of this paper (cost-based optimization of service compositions) have been published so far.  There generally is a tradeoff to consider between preventing SLA violations and the costs of doing so. Hence, a composite service provider is maximizing his own revenue by minimizing his total costs. SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005 REFERENCE: Philipp Leitner, Member, IEEE, Waldemar Hummer, Student Member, IEEE, and Schahram Dustdar, Senior Member, IEEE, “Cost-Based Optimization of Service
  • 5. Compositions”, IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 6, NO. 2, APRIL-JUNE 2013.