Autonomous, Collaborative Control for Resilient Cyber Defense (ACCORD)

Stuart Wagner, Eric Van Den Berg, Jim Giacopelli, Andrei Ghetie, Jim Burns, Miriam Tauil, Soumya Sen, Michael Wang, Mung Chiang, Tian Lan, Robert Laddaga, Paul Robertson, Prakash Manghwani

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

ACCORD addresses the need for robust, rapidly adaptive resource allocation mechanisms in cloud computing. It employs a distributed, game-theoretic approach to apportion computational loads in an efficient, prioritized, Pareto-optimal fashion among geographically dispersed cloud computing infrastructure. This paper describes ACCORD algorithms, software implementation, and initial experimental results. Our results illustrate how a distributed, ACCORD-enabled cloud architecture autonomously adapts to the loss of computing resources (e.g., due to failures, poor network connectivity, or cyber attack) while ensuring that users receive maximal, prioritized utility from available cloud resources.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE 6th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2012
Pages39-46
Number of pages8
DOIs
StatePublished - Dec 1 2012
Event2012 IEEE 6th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2012 - Lyon, France
Duration: Sep 10 2012Sep 14 2012

Publication series

NameProceedings - 2012 IEEE 6th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2012

Other

Other2012 IEEE 6th International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2012
CountryFrance
CityLyon
Period9/10/129/14/12

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering

Keywords

  • Nash Bargaining
  • cloud computing
  • distributed resource allocation
  • game theory

Fingerprint Dive into the research topics of 'Autonomous, Collaborative Control for Resilient Cyber Defense (ACCORD)'. Together they form a unique fingerprint.

Cite this