{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T13:10:08Z","timestamp":1727529008254},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1587\/transcom.2022ebp3024","type":"journal-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T22:09:48Z","timestamp":1656972588000},"page":"18-34","source":"Crossref","is-referenced-by-count":0,"title":["Robust Optimization Model for Primary and Backup Capacity Allocations against Multiple Physical Machine Failures under Uncertain Demands in Cloud"],"prefix":"10.23919","volume":"E106.B","author":[{"given":"Mitsuki","family":"ITO","sequence":"first","affiliation":[{"name":"Kyoto University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fujun","family":"HE","sequence":"additional","affiliation":[{"name":"Kyoto University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kento","family":"YOKOUCHI","sequence":"additional","affiliation":[{"name":"Kyoto University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eiji","family":"OKI","sequence":"additional","affiliation":[{"name":"Kyoto University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M. Ito, F. He, and E. Oki, \u201cRobust optimization for probabilistic protection with primary and backup allocations under uncertain demands,\u201d Proc. 2021 17th Int. Conf. on Des. Rel. Commun. Netw., pp.1-6, April 2021. 10.1109\/drcn51631.2021.9477368","DOI":"10.1109\/DRCN51631.2021.9477368"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] V. Javaraiah, \u201cBackup for cloud and disaster recovery for consumers and SMBs,\u201d Proc. 2011 5th IEEE Int. Conf. on Adv. Telcommun. Syst. Netw., pp.1-3, Dec. 2011. 10.1109\/ants.2011.6163671","DOI":"10.1109\/ANTS.2011.6163671"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] R. Madhumathi and R. Radhakrishnan, \u201cA resource allocation strategy in cloud using roulette wheel selection method,\u201d Proc. 2015 Int. Conf. on Proc. Green Comput. Internet Things, pp.341-345, Oct. 2015. 10.1109\/icgciot.2015.7380485","DOI":"10.1109\/ICGCIoT.2015.7380485"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Hadji and D. Zeghlache, \u201cMinimum cost maximum flow algorithm for dynamic resource allocation in clouds,\u201d Proc. 2012 IEEE 5th Int. Conf. on Cloud Comput., pp.876-882, June 2012. 10.1109\/cloud.2012.36","DOI":"10.1109\/CLOUD.2012.36"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] P.T. Endo, G.L. Santos, D. Rosendo, D.M. Gomes, A. Moreira, J. Kelner, D. Sadok, G.E. Gon\u00e7alves, and M. Mahloo, \u201cMinimizing and managing cloud failures,\u201d Comput., vol.50, no.11, pp.86-90, Nov. 2017. 10.1109\/mc.2017.4041358","DOI":"10.1109\/MC.2017.4041358"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Jammal, A. Kanso, P. Heidari, and A. Shami, \u201cAvailability analysis of cloud deployed applications,\u201d Proc. 2016 IEEE Int. Conf. on Cloud Eng., pp.234-235, April 2016. 10.1109\/ic2e.2016.44","DOI":"10.1109\/IC2E.2016.44"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] F. He, T. Sato, B.C. Chatterjee, T. Kurimoto, S. Urushidani, and E. Oki, \u201cRobust optimization model for primary and backup resource allocation in cloud providers,\u201d IEEE Trans. Cloud Comput., 2021 (in press). 10.1109\/TCC.2021.3051018","DOI":"10.1109\/TCC.2021.3051018"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] M. Johnston, H. Lee, and E. Modiano, \u201cA robust optimization approach to backup network design with random failures,\u201d IEEE\/ACM Trans. Netw., vol.23, no.4, pp.1216-1228, Aug. 2015. 10.1109\/TNET.2014.2320829","DOI":"10.1109\/TNET.2014.2320829"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A. Ben-Tal and A. Nemirovski, \u201cRobust optimization-methodology and applications,\u201d Math. Program., vol.92, no.3, pp.453-480, May 2002. 10.1007\/s101070100286","DOI":"10.1007\/s101070100286"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S. Dutta, S. Gera, A. Verma, and B. Viswanathan, \u201cSmartScale: Automatic application scaling in enterprise clouds,\u201d Proc. 2012 IEEE 5th Int. Conf. on Cloud Comput., pp.221-228, June 2012. 10.1109\/cloud.2012.12","DOI":"10.1109\/CLOUD.2012.12"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] L. Yazdanov and C. Fetzer, \u201cVertical scaling for prioritized VMs provisioning,\u201d Proc. 2012 2nd Int. Conf. on Cloud Green Comput., pp.118-125, Nov. 2012. 10.1109\/cgc.2012.108","DOI":"10.1109\/CGC.2012.108"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] H. Yu, J. Yang, and C. Fung, \u201cFine-grained cloud resource provisioning for virtual network function,\u201d IEEE Trans. Netw. Service Manage., vol.17, no.3, pp.1363-1376, Sept. 2020. 10.1109\/tnsm.2020.2986223","DOI":"10.1109\/TNSM.2020.2986223"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] M. Ito, F. He, and E. Oki, \u201cRobust optimization model for probabilistic protection under uncertain virtual machine capacity in cloud,\u201d Proc. 2020 16th Int. Conf. on Des. Rel. Commun. Netw., pp.1-8, March 2020. 10.1109\/drcn48652.2020.1570609411","DOI":"10.1109\/DRCN48652.2020.1570609411"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] M. Ito, F. He, and E. Oki, \u201cBackup resource allocation of virtual machines for probabilistic protection under capacity uncertainty,\u201d IEICE Trans. Commun., vol.E105-B, no.7, pp.814-832, July 2022. 10.1587\/transcom.2021ebp3144","DOI":"10.1587\/transcom.2021EBP3144"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] A. Juttner, I. Szabo, and A. Szentesi, \u201cOn bandwidth efficiency of the hose resource management model in virtual private networks,\u201d Proc. 2003 IEEE Int. Conf. on Comput. Commun., vol.1, pp.386-395, March 2003. 10.1109\/infcom.2003.1208690","DOI":"10.1109\/INFCOM.2003.1208690"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] J. Chu and C.T. Lea, \u201cOptimal link weights for maximizing QoS traffic,\u201d Proc. 2007 IEEE Int. Conf. on Commum., pp.610-615, June 2007. 10.1109\/icc.2007.105","DOI":"10.1109\/ICC.2007.105"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] E. Oki and A. Iwaki, \u201cPerformance of optimal routing by pipe, hose, and intermediate models,\u201d IEICE Trans. Commun., vol.E93-B, no.5, pp.1180-1189, May 2010. 10.1587\/transcom.e93.b.1180","DOI":"10.1587\/transcom.E93.B.1180"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] I.A. Ou\u00e9draogo and E. Oki, \u201cA green and robust optimization strategy for energy saving against traffic uncertainty,\u201d IEEE J. Sel. Areas Commun., vol.34, no.5, pp.1405-1416, May 2016. 10.1109\/jsac.2016.2545378","DOI":"10.1109\/JSAC.2016.2545378"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] B.C. Das, S. Takahashi, E. Oki, and M. Muramatsu, \u201cNetwork congestion minimization models based on robust optimization,\u201d IEICE Trans. Commun., vol.E101-B, no.3, pp.772-784, March 2018. 10.1587\/transcom.2017ebp3193","DOI":"10.1587\/transcom.2017EBP3193"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] S. Khouangvichit and E. Oki, \u201cOptimization model for backup network design with primary and backup routing against multiple link failures under uncertain traffic demands,\u201d IEICE Trans. Commun., vol.E104-B, no.4, pp.378-390, April 2021. 10.1587\/transcom.2020ebp3084","DOI":"10.1587\/transcom.2020EBP3084"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] S. Mireslami, L. Rakai, M. Wang, and B.H. Far, \u201cDynamic cloud resource allocation considering demand uncertainty,\u201d IEEE Trans. Cloud Comput., vol.9, no.3, pp.981-994, 2021. 10.1109\/tcc.2019.2897304","DOI":"10.1109\/TCC.2019.2897304"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] M. Nguyen, M. Dolati, and M. Ghaderi, \u201cDeadline-aware SFC orchestration under demand uncertainty,\u201d IEEE Trans. Netw. Service Manage., vol.17, no.4, pp.2275-2290, Dec. 2020. 10.1109\/tnsm.2020.3029749","DOI":"10.1109\/TNSM.2020.3029749"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] F. He, T. Sato, B.C. Chatterjee, T. Kurimoto, S. Urushidani, and E. Oki, \u201cRobust optimization model for backup resource allocation in cloud provider,\u201d Proc. 2018 IEEE Int. Conf. on Commun., pp.1-6, May 2018. 10.1109\/icc.2018.8422840","DOI":"10.1109\/ICC.2018.8422840"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] M. Ito, F. He, and E. Oki, \u201cRobust optimization model for probabilistic protection with multiple types of resources,\u201d IEEE Trans. Netw. Service Manage., vol.18, no.4, pp.4711-4729, Dec. 2021. 10.1109\/tnsm.2021.3093066","DOI":"10.1109\/TNSM.2021.3093066"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] B. Guo, C. Qiao, J. Wang, H. Yu, Y. Zuo, J. Li, Z. Chen, and Y. He, \u201cSurvivable virtual network design and embedding to survive a facility node failure,\u201d J. Lightw. Technol., vol.32, no.3, pp.483-493, Feb. 2014. 10.1109\/jlt.2013.2293193","DOI":"10.1109\/JLT.2013.2293193"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] S. Ayoubi, Y. Chen, and C. Assi, \u201cTowards promoting backup-sharing in survivable virtual network design,\u201d IEEE\/ACM Trans. Netw., vol.24, no.5, pp.3218-3231, Oct. 2016. 10.1109\/tnet.2015.2510864","DOI":"10.1109\/TNET.2015.2510864"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] F. He, T. Sato, and E. Oki, \u201cBackup resource allocation model for virtual networks with probabilistic protection against multiple facility node failures,\u201d Proc. 2019 15th IEEE Int. Conf. on Des. Rel. Commun. Netw., pp.37-42, March 2019. 10.1109\/drcn.2019.8713736","DOI":"10.1109\/DRCN.2019.8713736"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] F. He and E. Oki, \u201cBackup allocation model with probabilistic protection for virtual networks against multiple facility node failures,\u201d IEEE Trans. Netw. Service Manage., vol.18, no.3, pp.2943-2959, Sept. 2021. 10.1109\/tnsm.2021.3075458","DOI":"10.1109\/TNSM.2021.3075458"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] A. Hmaity, F. Musumeci, and M. Tornatore, \u201cSurvivable virtual network mapping to provide content connectivity against double-link failures,\u201d Proc. 2016 12th Int. Conf. on Des. Rel. Commun. Netw., pp.160-166, March 2016. 10.1109\/drcn.2016.7470851","DOI":"10.1109\/DRCN.2016.7470851"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] G. Le, S. Ferdousi, A. Marotta, S. Xu, Y. Hirota, Y. Awaji, M. Tornatore, and B. Mukherjee, \u201cSurvivable virtual network mapping with content connectivity against multiple link failures in optical metro networks,\u201d IEEE\/OSA J. Opt. Commun. Netw., vol.12, no.11, pp.301-311, Nov. 2020. 10.1364\/jocn.397565","DOI":"10.1364\/JOCN.397565"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] N. Shahriar, S.R. Chowdhury, R. Ahmed, A. Khan, S. Fathi, R. Boutaba, J. Mitra, and L. Liu, \u201cVirtual network survivability through joint spare capacity allocation and embedding,\u201d IEEE J. Sel. Areas Commun., vol.36, no.3, pp.502-518, March 2018. 10.1109\/jsac.2018.2815430","DOI":"10.1109\/JSAC.2018.2815430"},{"key":"32","doi-asserted-by":"publisher","unstructured":"[32] X. Liu, B. Cheng, S. Wang, and J. Chen, \u201cJoint availability enhancement and traffic optimization of virtual cluster allocation in cloud datacenters,\u201d IEEE Trans. Netw. Service Manage., vol.17, no.3, pp.1554-1567, Sept. 2020. 10.1109\/tnsm.2020.2994146","DOI":"10.1109\/TNSM.2020.2994146"},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] H.A. Alameddine, S. Ayoubi, and C. Assi, \u201cAn efficient survivable design with bandwidth guarantees for multi-tenant cloud networks,\u201d IEEE Trans. Netw. Service Manage., vol.14, no.2, pp.357-372, June 2017. 10.1109\/tnsm.2017.2704427","DOI":"10.1109\/TNSM.2017.2704427"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] M. Torquato, L. Torquato, P. Maciel, and M. Vieira, \u201cIaaS cloud availability planning using models and genetic algorithms,\u201d Proc. 2019 9th Latin-Amer. Symp. on Dependable Comput., pp.1-10, Nov. 2019. 10.1109\/ladc48089.2019.8995734","DOI":"10.1109\/LADC48089.2019.8995734"},{"key":"35","unstructured":"[35] \u201cILOG CPLEX Optimization Studio 12.10.0,\u201d https:\/\/www.ibm.com\/docs\/en\/icos\/12.10.0, Accessed: Feb. 12, 2022."},{"key":"36","doi-asserted-by":"publisher","unstructured":"[36] Y. Hirano, F. He, T. Sato, and E. Oki, \u201cBackup network design against multiple link failures to avoid link capacity overestimation,\u201d IEEE Trans. Netw. Service Manage., vol.17, no.2, pp.1254-1267, June 2020. 10.1109\/tnsm.2019.2959072","DOI":"10.1109\/TNSM.2019.2959072"},{"key":"37","doi-asserted-by":"publisher","unstructured":"[37] M. Hassan and A. Baharum, \u201cModified Courant-Beltrami penalty function and a duality gap for invex optimization problem,\u201d Int. J. Simul. Multidisci. Des. Optim., vol.10, no.A10, pp.1-7, June 2019. 10.1051\/smdo\/2019010","DOI":"10.1051\/smdo\/2019010"},{"key":"38","unstructured":"[38] R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Flows: Theory, Algorithms, and Applications, Prentice hall, 1993."},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] A. Beloglazov, J. Abawajy, and R. Buyya, \u201cEnergy-aware resource allocation heuristics for efficient management of data centers for cloud computing,\u201d Future Gener. Comput. Syst., vol.28, no.5, pp.755-768, May 2012. 10.1016\/j.future.2011.04.017","DOI":"10.1016\/j.future.2011.04.017"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] T. Sato, F. He, E. Oki, T. Kurimoto, and S. Urushidani, \u201cExperiment and availability analytical model of cloud computing system based on backup resource sharing and probabilistic protection guarantee,\u201d IEEE Open J. Commun. Soc., vol.1, pp.700-712, May 2020. 10.1109\/ojcoms.2020.2994995","DOI":"10.1109\/OJCOMS.2020.2994995"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E106.B\/1\/E106.B_2022EBP3024\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T12:43:10Z","timestamp":1727527390000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E106.B\/1\/E106.B_2022EBP3024\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2022ebp3024","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"type":"print","value":"0916-8516"},{"type":"electronic","value":"1745-1345"}],"subject":[],"published":{"date-parts":[[2023,1,1]]},"article-number":"2022EBP3024"}}