Maintaining Trust in Cloud Computing through SLA Monitoring

Maintaining trust in cloud computing is a significant challenge due to the dynamic nature of cloud computing and the fragility of trust. Trust can be established by conducting successful transactions and meeting all the parameters of the Service Level Agreement (SLA) drawn up between two interacting parties. Trust can be maintained by continuous monitoring of these predefined SLA parameters. There are number of commentaries on SLA monitoring that describe different frameworks for the proactive or reactive detection of SLA violations. The aim of this research is to present an overview of the literature and make a comparative analysis of SLA monitoring in respect of trust maintenance in cloud computing.

[1]  Laurence T. Yang,et al.  Advances in Grid and Pervasive Computing, Third International Conference, GPC 2008, Kunming, China, May 25-28, 2008. Proceedings , 2008, GPC.

[2]  P. Varalakshmi,et al.  QoS Monitoring and Dynamic Trust Establishment in the Cloud , 2012, GPC.

[3]  Dimosthenis Kyriazis,et al.  A Self-adaptive hierarchical monitoring mechanism for Clouds , 2012, J. Syst. Softw..

[4]  Elarbi Badidi,et al.  A Cloud Service Broker for SLA-based SaaS provisioning , 2013, International Conference on Information Society (i-Society 2013).

[5]  Mohammed Almathami Service level agreement (SLA)-based risk analysis in cloud computing environments , 2012 .

[6]  César A. F. De Rose,et al.  CASViD: Application Level Monitoring for SLA Violation Detection in Clouds , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[7]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[8]  Jinmee Kim,et al.  Cloud service broker portal: Main entry point for multi-cloud service providers and consumers , 2014, 16th International Conference on Advanced Communication Technology.

[9]  Erich Schikuta,et al.  Rule-Based Workflow Validation of Hierarchical Service Level Agreements , 2009, 2009 Workshops at the Grid and Pervasive Computing Conference.

[10]  Schahram Dustdar,et al.  Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments , 2010, 2010 International Conference on High Performance Computing & Simulation.

[11]  D. Daniel,et al.  A novel approach for scheduling service request in cloud with trust monitor , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[12]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[13]  Rodziah Atan,et al.  HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing , 2013 .

[14]  Ahmad Mosallanejad,et al.  HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing , 2013 .

[15]  Schahram Dustdar,et al.  LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[16]  Samir Kouro,et al.  Unidimensional Modulation Technique for Cascaded Multilevel Converters , 2009, IEEE Transactions on Industrial Electronics.

[17]  Farookh Khadeer Hussain,et al.  A Methodology for Maintaining Trust in Industrial Digital Ecosystems , 2013, IEEE Transactions on Industrial Electronics.

[18]  Adil M. Hammadi,et al.  A Framework for SLA Assurance in Cloud Computing , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[19]  S. K. Sinha,et al.  A New Trust Management Architecture for Cloud Computing Environment , 2012, 2012 International Symposium on Cloud and Services Computing.

[20]  MinChao Wang,et al.  A Conceptual Platform of SLA in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[21]  Erich Schikuta,et al.  SLA Validation in Layered Cloud Infrastructures , 2010, GECON.

[22]  WenAn Tan,et al.  SLA detective control model for workflow composition of cloud services , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[23]  Achim Streit,et al.  SLA based Service Brokering in Intercloud Environments , 2012, CLOSER.

[24]  F. Brazier,et al.  NEGOTIATION AND MONITORING OF SERVICE LEVEL AGREEMENTS , 2010 .

[25]  Rajkumar Buyya,et al.  Towards autonomic detection of SLA violations in Cloud infrastructures , 2012, Future Gener. Comput. Syst..

[26]  Frank Schulz Towards Measuring the Degree of Fulfillment of Service Level Agreements , 2010, 2010 Third International Conference on Information and Computing.

[27]  Mohamed Adel Serhani,et al.  A Model for Multi-levels SLA Monitoring in Federated Cloud Environment , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.