Risk Management Framework to Avoid SLA Violation in Cloud from a Provider’s Perspective
Managing risk is an important issue for a service provider to avoid SLA violation in any business. The elastic nature of cloud allows consumers to use a number of resources depending on their business needs. Therefore, it is crucial for service providers; particularly SMEs to first form viable SLAs and then manage them. When a provider and a consumer execute an agreed SLA, the next step is monitoring and, if a violation is predicted, appropriate action should be taken to manage that risk. In this paper we propose a Risk Management Framework to avoid SLA violation (RMF-SLA) that assists cloud service providers to manage the risk of service violation. Our framework uses a Fuzzy Inference System (FIS) and considers inputs such as the reliability of a consumer; the attitude towards risk of the provider; and the predicted trajectory of consumer behavior to calculate the amount of risk and the appropriate action to manage it. The framework will help small-to-medium sized service providers manage the risk of service violation in an optimal way.
KeywordsRisk management framework cloud computing SLA violation prediction
Unable to display preview. Download preview PDF.
- 1.Khajeh-Hosseini, A., D. Greenwood, and I. Sommerville. Cloud migration: a case study of migrating an enterprise IT system to IaaS. in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. 2010. IEEE.Google Scholar
- 2.Hashem, I.A.T., et al., The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 2015. 47: p. 98-115.Google Scholar
- 3.Hussain, W., F.K. Hussain, and O.K. Hussain. Maintaining Trust in Cloud Computing through SLA Monitoring. in Neural Information Processing. 2014. Springer.Google Scholar
- 4.Hussain, W., F.K. Hussain, and O. Hussain, Comparative analysis of consumer profile-based methods to predict SLA violation, in FUZZ-IEEE, IEEE, Editor. 2015, IEEE: Istanbul Turkey.Google Scholar
- 5.Hussain, W., et al., Profile-based viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud, in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). 2015, IEEE: Krakow, Poland. p. 268-272.Google Scholar
- 6.Hussain, O.K., et al., A methodology to quantify failure for risk-based decision support system in digital business ecosystems. Data & knowledge engineering, 2007. 63(3): p. 597-621.Google Scholar
- 7.Albakri, S.H., et al., Security risk assessment framework for cloud computing environments. Security and Communication Networks, 2014. 7(11): p. 2114-2124.Google Scholar
- 8.Zhang, X., et al. Information security risk management framework for the cloud computing environments. in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. 2010. IEEE.Google Scholar
- 9.Majd, E. and V. Balakrishnan, A trust model for recommender agent systems. Soft Computing, 2016: p. 1-17.Google Scholar
- 10.Morin, J.-H., J. Aubert, and B. Gateau. Towards cloud computing SLA risk management: issues and challenges. in System Science (HICSS), 2012 45th Hawaii International Conference on. 2012. IEEE.Google Scholar
- 11.Wang, H., F. Liu, and H. Liu, A method of the cloud computing security management risk assessment, in Advances in Computer Science and Engineering. 2012, Springer. p. 609-618.Google Scholar
- 12.Wang, P., et al. Threat risk analysis for cloud security based on Attack-Defense Trees. in Computing Technology and Information Management (ICCM), 2012 8th International Conference on. 2012. IEEE.Google Scholar
- 13.Hussain, W., F.K. Hussain, and O. Hussain, QoS Prediction Methods to Avoid SLA Violation in Post-Interaction Time Phase, in 11th IEEE Conference on Industrial Electronics and Applications (ICIEA 2016) 2016, IEEE: Hefei, China.Google Scholar
- 14.CloudClimate. Watching the Cloud. Available from: http://www.cloudclimate.com/.
- 15.Monitor, P.N.; PRTG Network Monitor ]. Available from: https://prtg.paessler.com/.