A Service Level Agreement Formal Model for Cloud Computing

Cloud Computing services are regulated by a contract called Service Level Agreement (SLA). It is co-signed between the customers and the providers after a negotiation phase, and during their validity time several constraints have to be respected by the involved parties. Due to their popularity, cloud services are enormously used and unfortunately also abused, specially by cyber-criminals. Sometimes the crimes have the consequence of violating some contractual constraints without the parties are aware of. A manner for guaranteeing more control of the SLA respect is to consider a dedicated system interacting with the cloud services and detecting the SLA violations by analysing the log files. We introduce a formal model aimed to represent the contents of such SLAs necessary in the context of an automatic mechanism for detecting SLA violations.

[1]  Mohammad Reza Meybodi,et al.  Decreasing Impact of SLA Violations:A Proactive Resource Allocation Approachfor Cloud Computing Environments , 2014, IEEE Transactions on Cloud Computing.

[2]  Rizos Sakellariou,et al.  Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[3]  Filomena Ferrucci,et al.  Formalization of SLAs for Cloud Forensic Readiness , 2014 .

[4]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[5]  Ian T. Foster,et al.  SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems , 2002, JSSPP.

[6]  Rajkumar Buyya,et al.  Towards autonomic detection of SLA violations in Cloud infrastructures , 2012, Future Gener. Comput. Syst..

[7]  Frank Leymann,et al.  Aggregation of Service Level Agreements in the Context of Business Processes , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[8]  Xavier Franch,et al.  Comprehensive Explanation of SLA Violations at Runtime , 2014, IEEE Transactions on Services Computing.

[9]  Soumya K. Ghosh,et al.  An approach to identify and monitor SLA parameters for storage-as-a-service cloud delivery model , 2012, 2012 IEEE Globecom Workshops.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Silvia Mara Abrahão,et al.  Towards Monitoring Cloud Services using Models@run.time , 2014, MoDELS@Run.time.

[12]  Martin Bichler,et al.  Knowledge representation concepts for automated SLA management , 2006, Decis. Support Syst..

[13]  César A. F. De Rose,et al.  DeSVi : An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures , 2010 .

[14]  Fang Liu,et al.  NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.

[15]  Mordechai Ben-Ari,et al.  Mathematical Logic for Computer Science , 2012, Springer London.

[16]  Schahram Dustdar,et al.  LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.