Multi-Objective Optimization Models for Performance, Energy, and Security in Hybrid Cloud Infrastructures

Authors

  • Amaka Udo Faculty of Data Science, Enugu State University of Science and Technology, Enugu, Nigeria. Author
  • Vo Thi Mai Faculty of Data Science, Enugu State University of Science and Technology, Enugu, Nigeria. Author
  • Amani Abdelrahman Faculty of Data Science, Enugu State University of Science and Technology, Enugu, Nigeria. Author

DOI:

https://doi.org/10.63282/3117-5481/AIJCST-V4I2P101

Keywords:

Hybrid Cloud, Multi-Objective Optimization, Pareto Frontier, NSGA-II, MOEA/D, Model-Predictive Control, Robust Optimization, Cvar Risk, Carbon-Aware Scheduling, Energy Efficiency, SLO-Aware Autoscalin, Secure Workload Placement, Zero-Trust Architecture, Data-Sovereignty Constraints, Differential Privacy, Federated Learning, Queueing-Theoretic Surrogates, Kubernetes Orchestration, Edge Cloud Continuum

Abstract

Hybrid clouds spanning on-premises; edge; and multiple public providers demand orchestration that balances conflicting goals: low latency and high throughput; energy and carbon reduction; and rigorous security. This work frames resource provisioning; workload placement; and autoscaling as a multi-objective optimization problem under uncertainty. We model application components (VMs/containers/functions) with performance SLOs; security postures; and energy carbon profiles tied to time-varying grid intensity and datacenter PUE. Objectives minimize end-to-end latency and SLO violations; total energy and carbon cost; and security risk (e.g.; exposure time; vulnerability risk scores; data-in-motion footprint); while respecting budget; data-sovereignty; and trust-zone constraints. Solution strategies combine exact formulations (MILP for small horizons) with scalable heuristics and metaheuristics (e.g.; NSGA-II/MOEA-D) to approximate the Pareto frontier; and a model-predictive layer that adapts to demand; spot price volatility; and carbon signals. Robust and risk-aware variants incorporate chance constraints and CVaR to hedge against workload and failure uncertainty. We integrate zero-trust placement rules; encryption overhead; and privacy controls (federated learning/differential privacy) as first-class constraints; and co-optimize network paths to limit cross-cloud data exfiltration risk. A learning-augmented scheduler uses surrogate models for queueing delays and power draw to accelerate search at runtime. The resulting policies enable operators to trade milliseconds of tail latency for double-digit energy/carbon savings or reduced attack surface; making decisions transparent via Pareto sets and what-if analysis. The framework generalizes across microservices; data pipelines; and AI inference; and can plug into Kubernetes-centric control planes

References

[1] Deb, K., Pratap, A., Agarwal, S., & Meyarivan, T. (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation. https://doi.org/10.1109/4235.996017

[2] Zhang, Q., & Li, H. (2007). MOEA/D: A multiobjective evolutionary algorithm based on decomposition. IEEE Transactions on Evolutionary Computation. https://doi.org/10.1109/TEVC.2007.892759

[3] Zitzler, E., Laumanns, M., & Thiele, L. (2001). SPEA2: Improving the Strength Pareto Evolutionary Algorithm. ETH Zürich Technical Report. https://www.tik.ee.ethz.ch/file/0f6f3b0ccbbf8f1a/SPEA2_TechnicalReport.pdf

[4] Boyd, S., & Vandenberghe, L. (2004). Convex Optimization. Cambridge University Press. https://web.stanford.edu/~boyd/cvxbook/

[5] Rockafellar, R. T., & Uryasev, S. (2000). Optimization of Conditional Value-at-Risk. Operations Research. https://doi.org/10.1287/opre.48.2.193.12386

[6] Mayne, D. Q., Rawlings, J. B., Rao, C. V., & Scokaert, P. O. M. (2000). Constrained model predictive control: Stability and optimality. Automatica. https://doi.org/10.1016/S0005-1098(99)00214-9

[7] NIST (2020). Zero Trust Architecture (SP 800-207). https://csrc.nist.gov/publications/detail/sp/800-207/final

[8] Costan, V., & Devadas, S. (2016). Intel SGX Explained. IACR ePrint. https://eprint.iacr.org/2016/086.pdf

[9] AMD (2020). SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf

[10] Confidential Computing Consortium (2020). Confidential Computing Primer. https://confidentialcomputing.io/wp-content/uploads/sites/85/2020/10/confidentialcomputing_primer.pdf

[11] The Green Grid (2012). PUE: A Comprehensive Examination of the Metric. https://www.thegreengrid.org/en/resources/library-and-tools/100-PUEv2

[12] Google Research (2013). The Tail at Scale. Communications of the ACM. https://research.google/pubs/the-tail-at-scale/

[13] Fan, X., Weber, W.-D., & Barroso, L. A. (2007). Power provisioning for a warehouse-sized computer. ISCA. https://dl.acm.org/doi/10.1145/1273440.1250665

[14] Barroso, L. A., Clidaras, J., & Hölzle, U. (2018). The Datacenter as a Computer (3rd ed.). Morgan & Claypool. https://doi.org/10.2200/S00999ED3V01Y201809CAC046

[15] Urgaonkar, B., Shenoy, P., Chandra, A., Goyal, P., & Wood, T. (2008). Agile dynamic provisioning for multi-tier Internet applications. Autonomic Computing (ICAC). https://dl.acm.org/doi/10.1145/1375527.1375531

[16] Google AI Blog (2020). Carbon-Intelligent Computing at Google. https://ai.googleblog.com/2020/05/carbon-intelligent-computing-at-google.html

[17] Beloglazov, A., & Buyya, R. (2012). Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.1867

[18] Beloglazov, A., Buyya, R., Lee, Y. C., & Zomaya, A. (2011). A taxonomy and survey of energy-efficient data centers and cloud computing systems. Advances in Computers. https://doi.org/10.1016/B978-0-12-385512-1.00001-7

[19] McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. AISTATS (Federated Learning). https://arxiv.org/abs/1602.05629

[20] Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. TCC. https://www.microsoft.com/en-us/research/publication/calibrating-noise-to-sensitivity-in-private-data-analysis/

[21] Google SRE Book (2016). Service Level Objectives and Error Budgets. https://sre.google/sre-book/service-level-objectives/

[22] Enabling Mission-Critical Communication via VoLTE for Public Safety Networks - Varinder Kumar Sharma - IJAIDR Volume 10, Issue 1, January-June 2019. DOI 10.71097/IJAIDR.v10.i1.1539

[23] Thallam, N. S. T. (2020). Comparative Analysis of Data Warehousing Solutions: AWS Redshift vs. Snowflake vs. Google BigQuery. European Journal of Advances in Engineering and Technology, 7(12), 133-141.

[24] The Role of Zero-Emission Telecom Infrastructure in Sustainable Network Modernization - Varinder Kumar Sharma - IJFMR Volume 2, Issue 5, September-October 2020. https://doi.org/10.36948/ijfmr.2020.v02i05.54991

[25] Krishna Chaitanaya Chittoor, “Architecting Scalable Ai Systems For Predictive Patient Risk”, INTERNATIONAL JOURNAL OF CURRENT SCIENCE, 11(2), PP-86-94, 2021, https://rjpn.org/ijcspub/papers/IJCSP21B1012.pdf

[26] Kanji, R. K. (2021). Real-Time Big Data Processing with Edge Computing. European Journal of Advances in Engineering and Technology, 8(11), 152-155.

[27] Thallam, N. S. T. (2021). Performance Optimization in Big Data Pipelines: Tuning EMR, Redshift, and Glue for Maximum Efficiency.

Downloads

Published

2022-03-03

Issue

Section

Articles

How to Cite

[1]
A. Udo, V. Thi Mai, and A. Abdelrahman, “Multi-Objective Optimization Models for Performance, Energy, and Security in Hybrid Cloud Infrastructures”, AIJCST, vol. 4, no. 2, pp. 1–12, Mar. 2022, doi: 10.63282/3117-5481/AIJCST-V4I2P101.

Similar Articles

1-10 of 98

You may also start an advanced similarity search for this article.