Advertisement

Maintaining Trust in Cloud Computing through SLA Monitoring

  • Walayat Hussain
  • Farookh Khadeer Hussain
  • Omar Khadeer Hussain
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8836)

Abstract

Maintaining trust in cloud computing is a significant challenge due to the dynamic nature of cloud computing and the fragility of trust. Trust can be established by conducting successful transactions and meeting all the parameters of the Service Level Agreement (SLA) drawn up between two interacting parties. Trust can be maintained by continuous monitoring of these predefined SLA parameters. There are number of commentaries on SLA monitoring that describe different frameworks for the proactive or reactive detection of SLA violations. The aim of this research is to present an overview of the literature and make a comparative analysis of SLA monitoring in respect of trust maintenance in cloud computing.

Keywords

Service level agreement monitoring cloud computing maintaining trust cloud monitoring SLA monitoring metrics proactive SLA monitoring hierarchical self-monitoring 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics 11, 127–157 (2002)CrossRefGoogle Scholar
  2. 2.
    Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS). IEEE (2010)Google Scholar
  3. 3.
    Muchahari, M.K., Sinha, S.K.: A New Trust Management Architecture for Cloud Computing Environment. In: 2012 International Symposium on Cloud and Services Computing (ISCOS). IEEE (2012)Google Scholar
  4. 4.
    Almathami, M.: Service level agreement (SLA)-based risk analysis in cloud computing environments, p. 91. Ann Arbor, Rochester Institute of Technology (2012)Google Scholar
  5. 5.
    Emeakaroha, V.C., et al.: Low level Metrics to High level SLAs-LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. In: HPCS (2010)Google Scholar
  6. 6.
    Brandic, I., et al.: Laysi: A layered approach for sla-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW). IEEE (2010)Google Scholar
  7. 7.
    Haq, I.U., Brandic, I., Schikuta, E.: Sla validation in layered cloud infrastructures. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 153–164. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Haq, I.U., et al.: Rule-based workflow validation of hierarchical service level agreements. In: Workshops at the Grid and Pervasive Computing Conference, GPC 2009. IEEE (2009)Google Scholar
  9. 9.
    Emeakaroha, V.C., et al.: Casvid: Application level monitoring for sla violation detection in clouds. In: 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC). IEEE (2012)Google Scholar
  10. 10.
    Mosallanejad, A., et al.: HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS 2013). The Society of Digital Information and Wireless Communication (2013)Google Scholar
  11. 11.
    Katsaros, G., et al.: A Self-adaptive hierarchical monitoring mechanism for Clouds. Journal of Systems and Software 85(5), 1029–1041 (2012)CrossRefGoogle Scholar
  12. 12.
    Fachrunnisa, O., Hussain, F.K.: A methodology for maintaining trust in industrial digital ecosystems. IEEE Transactions on Industrial Electronics 60(3), 1042–1058 (2013)CrossRefGoogle Scholar
  13. 13.
    Chandrasekar, A., Chandrasekar, K., Mahadevan, M., Varalakshmi, P.: QoS monitoring and dynamic trust establishment in the cloud. In: Li, R., Cao, J., Bourgeois, J. (eds.) GPC 2012. LNCS, vol. 7296, pp. 289–301. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Daniel, D., Lovesum, S.: A novel approach for scheduling service request in cloud with trust monitor. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE (2011)Google Scholar
  15. 15.
    Quillinan, T.B., et al.: Negotiation and monitoring of service level agreements. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176. Springer (2010)Google Scholar
  16. 16.
    Badidi, E.: A Cloud Service Broker for SLA-based SaaS provisioning. In: 2013 International Conference on Information Society (i-Society). IEEE (2013)Google Scholar
  17. 17.
    Falasi, A.A., Serhani, M.A., Dssouli, R.: A Model for Multi-levels SLA Monitoring in Federated Cloud Environment. In: 2013 IEEE 10th International Conference on Autonomic and Trusted Computing (UIC/ATC) Ubiquitous Intelligence and Computing. IEEE (2013)Google Scholar
  18. 18.
    Jrad, F., Tao, J., Streit, A.: SLA based Service Brokering in Intercloud Environments. In: CLOSER (2012)Google Scholar
  19. 19.
    Lee, J., et al.: Cloud Service Broker Portal: Main entry point for multi-cloud service providers and consumers. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 1108–1112. IEEE (2014)Google Scholar
  20. 20.
    Wang, M., et al.: A conceptual platform of SLA in cloud computing. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)Google Scholar
  21. 21.
    Schulz, F.: Towards measuring the degree of fulfillment of service level agreements. In: 2010 Third International Conference on Information and Computing (ICIC). IEEE (2010)Google Scholar
  22. 22.
    Hammadi, A.M., Hussain, O.: A framework for SLA assurance in cloud computing. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2012)Google Scholar
  23. 23.
    Sun, Y., et al.: SLA detective control model for workflow composition of cloud services. In: 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE (2013)Google Scholar
  24. 24.
    Emeakaroha, V.C., et al.: Towards autonomic detection of sla violations in cloud infrastructures. Future Generation Computer Systems 28(7), 1017–1029 (2012)CrossRefGoogle Scholar
  25. 25.
    Mosallanejad, A., Atan, R.: HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing. Journal of Software Engineering and Applications 6(3B), 114–117 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Walayat Hussain
    • 1
  • Farookh Khadeer Hussain
    • 1
  • Omar Khadeer Hussain
    • 2
  1. 1.School of Software, Centre for Quantum Computation and Intelligent SystemsUniversity of Technology SydneySydneyAustralia
  2. 2.School of BusinessUniversity of New South WalesCanberraAustralia

Personalised recommendations