Verifying cloud Service Level Agreement

In this paper we study the important issue of verifying Service Level Agreement (SLA) in a semi-trusted (or untrusted) cloud. Cloud computing services promise elastic computing and storage resources in a pay-as-you-go way. A SLA between a cloud service provider (CSP) and a user is a contract which specifies the resources and performances that the cloud should offer. However, the CSP has the incentive to cheat on SLA, e.g., providing users with less CPU and memory resources than that specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can disrupt the existing SLA monitoring/verification techniques by interfering the monitoring/measurement process. Therefore, we present a SLA verification framework that leverages a third party auditor (TPA). Under the TPA framework, we propose an effective testing algorithm that can detect SLA violations of physical memory size in virtual machine (VM). Using real experiments, we show that the algorithm can detect cloud cheating on VM memory size (i.e., SLA violations). Furthermore, our algorithm can defend various attacks from a malicious CSP, which tries to hide a SLA violation.

[1]  Albert Greenberg,et al.  Operations and Management of IP Networks: What Researchers Should Know , 2005 .

[2]  Schahram Dustdar,et al.  LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[3]  Andy Hopper,et al.  Predicting the Performance of Virtual Machine Migration , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[4]  T. S. Eugene Ng,et al.  The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[6]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[7]  Paul Barford,et al.  Multiobjective Monitoring for SLA Compliance , 2010, IEEE/ACM Transactions on Networking.

[8]  Arne A. Nilsson,et al.  On service level agreements for IP networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[9]  Renato J. O. Figueiredo,et al.  Experimental Study of Virtual Machine Migration in Support of Reservation of Cluster Resources , 2007, Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC '07).

[10]  Zhi Wang,et al.  HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.

[11]  Philippe Owezarski,et al.  An efficient and lightweight method for Service Level Agreement assessment , 2010, Comput. Networks.