SLA-DO: A SLA-Based Data Distribution Strategy on Multiple Cloud Storage Systems

One of the major advantages of the cloud storage system is that it simplifies the time-consuming processes of hardware and software provisioning, deployment and distribution for users. Currently there is a tremendous increase in the scale of data generated as well as being consumed by applications on cloud storage systems, but besides availability metrics, few of cloud storage services provide data privacy guarantees in their Service Level Agreements (SLAs), which can be a major concern for the adoption of cloud storage services. The paper firstly proposes an analysis approach for the data privacy, then introduces privacy into the service quality, and defines a service quality evaluation model including privacy, availability, throughput, transfer time and operating cost. At last, a novel data distribution strategy called SLA-DO is presented. The comparison experiment results confirmed that SLA-DO strategy shows better performance in SLAs compliance, resource utilization, security guarantees and multiple cloud environmental adaptability than the data distribution policy adopted in HDFS and OpenStack.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[3]  Rajkumar Buyya,et al.  SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[4]  T. Grance,et al.  SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .

[5]  Yun Yang,et al.  A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[6]  S.A. Brandt,et al.  CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data , 2006, ACM/IEEE SC 2006 Conference (SC'06).

[7]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[8]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[9]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[10]  Bin Tang,et al.  Data Replication in Data Intensive Scientific Applications with Performance Guarantee , 2011, IEEE Transactions on Parallel and Distributed Systems.

[11]  Ayob Sether,et al.  Cloud Computing Benefits , 2016 .

[12]  Hairong Kuang,et al.  The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).

[13]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[14]  Ju Wang,et al.  Windows Azure Storage: a highly available cloud storage service with strong consistency , 2011, SOSP.

[15]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[16]  Ryan K. L. Ko,et al.  Cloud computing vulnerability incidents: a statistical overview , 2013 .

[18]  Bharat K. Bhargava,et al.  Protection of Identity Information in Cloud Computing without Trusted Third Party , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[19]  Wei Chen,et al.  MORM: A Multi-objective Optimized Replication Management strategy for cloud storage cluster , 2014, J. Syst. Archit..

[20]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[21]  Zhonghai Wu,et al.  User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[22]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[23]  Elizabeth Chang,et al.  Conceptual SLA framework for cloud computing , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[24]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[25]  Moni Naor,et al.  Theory and Applications of Models of Computation , 2015, Lecture Notes in Computer Science.

[26]  Layuan Li,et al.  Efficient resource allocation for optimizing objectives of cloud users, IaaS provider and SaaS provider in cloud environment , 2013, The Journal of Supercomputing.

[27]  Boleslaw K. Szymanski,et al.  Simulation of dynamic data replication strategies in Data Grids , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[28]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[29]  Chen Wang,et al.  Systematic Analysis of Public Cloud Service Level Agreements and Related Business Values , 2013, 2013 IEEE International Conference on Services Computing.