A Hierarchical Framework for Evaluation of Cloud Service Qualities

  • Qi Wang
  • MingWei Liu
  • KaiQu Chen
  • Yu Zhang
  • Jing Zheng
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 747)


The reliability and availability of cloud computing services improved dramatically in recent years. More and more users tend to migrate their business systems to cloud environment. The compliance of SLAs (Service Level Agreement) in cloud services must be efficiently evaluated to ensure the enforcement of SLAs. Traditionally, an Evaluation Center will be established to collecting performance and reliability metrics data of SLAs. However, since the volume of data collected is huge, and the speed of data generation is fast, large bandwidth and computation capacity is needed in the Evaluation Center. This paper proposes a hierarchical architecture for monitoring and evaluating of the compliances of SLAs. In this architecture, a Data Collection Service is deployed in the intranet of each cloud service provider. Metrics data is first collected and analyzed by local Data Collection Service. When SLA violations are detected, related data is packed, signed and sent to the Evaluation Center located on the Internet. Simulations show that the use of local Data Collection Service will effectively reduce the amount of data transferred via Internet and will not cause much overhead in the construction of evaluation infrastructure.



The work described in this paper is supported by Shenzhen Science and Technology Project “Research on Key Technologies in Trusted Cloud Architecture” (Project No. JSGG20160229122214337).


  1. 1.
    Xiao, Y., Du, X., Zhang, J., Hu, F., Guizani, S.: Internet protocol television (IPTV): the killer application for the next-generation internet. IEEE Commun. Mag. 45(11), 126–134 (2007)CrossRefGoogle Scholar
  2. 2.
    Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud. IEEE/ACM Trans. Netw. 23(2), 603–615 (2015)CrossRefGoogle Scholar
  3. 3.
    Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52–59 (2015)CrossRefGoogle Scholar
  4. 4.
    Green, M.: The Threat in the Cloud. IEEE Educational Activities Department (2013)Google Scholar
  5. 5.
    Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5, December 2010Google Scholar
  6. 6.
    Wang, M.C., Wu, X., Zhang, W., Ding, F.Q., Zhou, J., Pei, G.C.: A conceptual platform of SLA in cloud computing. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 1131–1135 (2011)Google Scholar
  7. 7.
    Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference on Network-Based Information Systems (NBiS), pp. 321–324. IEEE (2010)Google Scholar
  8. 8.
    Hogben, G., Dekker, M.: Procure secure: a guide to monitoring of security service levels in cloud contracts. Technical report, European Network and Information Security Agency (ENISA) (2012)Google Scholar
  9. 9.
    Gunter, D., Tierney, B., Crowley, B., Holding, M., Lee, J.: NetLogger: a toolkit for distributed system performance analysis. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No. PR00728), pp. 267–273 (2000)Google Scholar
  10. 10.
    Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level metrics to high level SLAs - LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: International Conference on High Performance Computing Simulation, pp. 48–54, June 2010Google Scholar
  11. 11.
    Shou-Xu, J., Jian-Zhong, L.: A reputation-based trust mechanism for P2P E-commerce systems. J. Softw. 18(10), 2551–2563 (2007)CrossRefGoogle Scholar
  12. 12.
    Du, X., Chen, H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4), 60–66 (2008)CrossRefGoogle Scholar
  13. 13.
    Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314–2341 (2007). Special issue on security on wireless ad hoc and sensor networksCrossRefGoogle Scholar
  14. 14.
    Zhao, P., Han, Z., He, Y.: SLA-based dynamic trust evaluation for cloud computing. J. Beijing Jiaotong Univ. 37(5), 80–87 (2013)Google Scholar
  15. 15.
    Alhamad, M., Dillon, T., Chang, E.: Conceptual SLA framework for cloud computing. In: IEEE International Conference on Digital Ecosystems and Technologies, pp. 606–610 (2010)Google Scholar
  16. 16.
    Gao, Y.-L., Shen, B.-J., Kong, H.-F.: Trust model for cloud computing based on SLA and user ratings. Comput. Eng. 38(8), 28–30 (2012)Google Scholar
  17. 17.
    Emeakaroha, V.C., Calheiros, R.N., Netto, M.A.S., Brandic, I., Rose, C.A.F.D.: DeSVi: an architecture for detecting SLA violations in cloud computing infrastructures. In: Proceedings of the 2nd International ICST Conference on Cloud Computing (CloudComp 2010) (2010)Google Scholar
  18. 18.
    Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). Security Issues in Sensor and Ad Hoc NetworksCrossRefGoogle Scholar
  19. 19.
    Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2009)CrossRefGoogle Scholar
  20. 20.
    Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Veh. Technol. 57(4), 2387–2394 (2008)CrossRefGoogle Scholar
  21. 21.
    Du, X., Xiao, Y., Chen, H.H., Wu, Q.: Secure cell relay routing protocol for sensor networks. Wirel. Commun. Mob. Comput. 6(3), 375–391 (2006)CrossRefGoogle Scholar
  22. 22.
    Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: 2011 Proceedings of IEEE INFOCOM, 346–350, April 2011Google Scholar
  23. 23.
    Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens. J. 13(10), 3693–3701 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Qi Wang
    • 1
  • MingWei Liu
    • 1
  • KaiQu Chen
    • 1
  • Yu Zhang
    • 1
  • Jing Zheng
    • 1
  1. 1.Shenzhen HuaTech Information Technology Co., Ltd.ShenzhenChina

Personalised recommendations