Power-aware admission control and virtual machine allocation for cloud applications

Mina Taheri, Nirwan Ansari

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


Different service providers in the cloud computing environment assume different responsibilities. Software as a Service (SaaS) providers have to respond to users' requests within an acceptable deadline determined in their Service Level Agreement (SLA) contracts, while Infrastructure as a Service (IaaS) providers mostly care about the infrastructural resources. Power and cooling management and pricing of available resources are concerns of IaaS providers. The goal of an SaaS provider is to maximize the revenue from SLAs and minimize the cost of using IaaS resources. An IaaS provider wants to maximize the prices of its own resources that it charges its clients, and at the same time minimize the total power consumption of infrastructural resources. Each provider's decision may affect the other providers' strategies. In this paper, we propose a power-aware algorithm for both IaaS and SaaS providers to jointly and optimally control the admission rate and allocate the resources. We simulate different scenarios to substantiate the viability of our proposed scheme.

Original languageEnglish (US)
Title of host publication2015 36th IEEE Sarnoff Symposium
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781467380423
StatePublished - Nov 10 2015
Event36th IEEE Sarnoff Symposium, Sarnoff 2015 - Newark, United States
Duration: Sep 20 2015Sep 22 2015

Publication series

Name2015 36th IEEE Sarnoff Symposium


Other36th IEEE Sarnoff Symposium, Sarnoff 2015
Country/TerritoryUnited States

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications


  • Admission control
  • Cloud computing
  • Power consumption
  • Resource allocation


Dive into the research topics of 'Power-aware admission control and virtual machine allocation for cloud applications'. Together they form a unique fingerprint.

Cite this