Peak Power Shaving for Reduced Electricity Costs in Cloud Data Centers: Opportunities and Challenges
Authors:
Mehiar Dabbagh,
Bechir Hamdaoui,
Ammar Rayes
Abstract:
An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: Energy Charge, a cost based on the amount of consumed energy (in kWh), and Peak Charge, a cost based on the maximum power…
▽ More
An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: Energy Charge, a cost based on the amount of consumed energy (in kWh), and Peak Charge, a cost based on the maximum power (in kW) requested during the billing cycle. The latter charge component is forced to encourage DCs to balance and regulate their power demands over the billing cycle, allowing the utility company to manage congestion without increasing supply. This billing model has thus called for the development of peak power shaving approaches that reduce costs by smoothing peak power demands over the billing cycle to minimize the Peak Charge component. In this paper, we investigate peak power shaving approaches, and begin by using Google data traces to quantify and provide a real sense of how much electricity cost reduction can peak power demand shaving achieve on a Google DC cluster. We then discuss why peak power shaving is well-suited for reducing electricity costs of DCs, and describe two commonly used peak shaving approaches, namely energy storage and workload modulation. We finally identify and describe key research problems that remain unsolved and require further investigation.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
Authors:
Nader Sohrabi Safa,
Carsten Maple,
Steve Furnell,
Muhammad Ajmal Azad,
Charith Perera,
Mohammad Dabbagh,
Mehdi Sookhak
Abstract:
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information as…
▽ More
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information assets in organisations. This research presents a novel conceptual framework to mitigate the risk of insiders using deterrence and prevention approaches. Deterrence factors discourage employees from engaging in information security misbehaviour in organisations, and situational crime prevention factors encourage them to prevent information security misconduct. Our findings show that perceived sanctions certainty and severity significantly influence individuals' attitudes and deter them from information security misconduct. In addition, the output revealed that increasing the effort, risk and reducing the reward (benefits of crime) influence the employees' attitudes towards prevent information security misbehaviour. However, removing excuses and reducing provocations do not significantly influence individuals' attitudes towards prevent information security misconduct. Finally, the output of the data analysis also showed that subjective norms, perceived behavioural control and attitude influence individuals' intentions, and, ultimately, their behaviour towards avoiding information security misbehaviour.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.