A Hierarchical Framework for Evaluation of Cloud Service Qualities
The reliability and availability of cloud computing services improved dramatically in recent years. More and more users tend to migrate their business systems to cloud environment. The compliance of SLAs (Service Level Agreement) in cloud services must be efficiently evaluated to ensure the enforcement of SLAs. Traditionally, an Evaluation Center will be established to collecting performance and reliability metrics data of SLAs. However, since the volume of data collected is huge, and the speed of data generation is fast, large bandwidth and computation capacity is needed in the Evaluation Center. This paper proposes a hierarchical architecture for monitoring and evaluating of the compliances of SLAs. In this architecture, a Data Collection Service is deployed in the intranet of each cloud service provider. Metrics data is first collected and analyzed by local Data Collection Service. When SLA violations are detected, related data is packed, signed and sent to the Evaluation Center located on the Internet. Simulations show that the use of local Data Collection Service will effectively reduce the amount of data transferred via Internet and will not cause much overhead in the construction of evaluation infrastructure.
The work described in this paper is supported by Shenzhen Science and Technology Project “Research on Key Technologies in Trusted Cloud Architecture” (Project No. JSGG20160229122214337).
- 4.Green, M.: The Threat in the Cloud. IEEE Educational Activities Department (2013)Google Scholar
- 5.Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5, December 2010Google Scholar
- 6.Wang, M.C., Wu, X., Zhang, W., Ding, F.Q., Zhou, J., Pei, G.C.: A conceptual platform of SLA in cloud computing. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 1131–1135 (2011)Google Scholar
- 7.Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference on Network-Based Information Systems (NBiS), pp. 321–324. IEEE (2010)Google Scholar
- 8.Hogben, G., Dekker, M.: Procure secure: a guide to monitoring of security service levels in cloud contracts. Technical report, European Network and Information Security Agency (ENISA) (2012)Google Scholar
- 9.Gunter, D., Tierney, B., Crowley, B., Holding, M., Lee, J.: NetLogger: a toolkit for distributed system performance analysis. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No. PR00728), pp. 267–273 (2000)Google Scholar
- 10.Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level metrics to high level SLAs - LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: International Conference on High Performance Computing Simulation, pp. 48–54, June 2010Google Scholar
- 14.Zhao, P., Han, Z., He, Y.: SLA-based dynamic trust evaluation for cloud computing. J. Beijing Jiaotong Univ. 37(5), 80–87 (2013)Google Scholar
- 15.Alhamad, M., Dillon, T., Chang, E.: Conceptual SLA framework for cloud computing. In: IEEE International Conference on Digital Ecosystems and Technologies, pp. 606–610 (2010)Google Scholar
- 16.Gao, Y.-L., Shen, B.-J., Kong, H.-F.: Trust model for cloud computing based on SLA and user ratings. Comput. Eng. 38(8), 28–30 (2012)Google Scholar
- 17.Emeakaroha, V.C., Calheiros, R.N., Netto, M.A.S., Brandic, I., Rose, C.A.F.D.: DeSVi: an architecture for detecting SLA violations in cloud computing infrastructures. In: Proceedings of the 2nd International ICST Conference on Cloud Computing (CloudComp 2010) (2010)Google Scholar
- 22.Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: 2011 Proceedings of IEEE INFOCOM, 346–350, April 2011Google Scholar