Skip to main content

Maintaining Trust in Cloud Computing through SLA Monitoring

  • Conference paper
Book cover Neural Information Processing (ICONIP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8836))

Included in the following conference series:

Abstract

Maintaining trust in cloud computing is a significant challenge due to the dynamic nature of cloud computing and the fragility of trust. Trust can be established by conducting successful transactions and meeting all the parameters of the Service Level Agreement (SLA) drawn up between two interacting parties. Trust can be maintained by continuous monitoring of these predefined SLA parameters. There are number of commentaries on SLA monitoring that describe different frameworks for the proactive or reactive detection of SLA violations. The aim of this research is to present an overview of the literature and make a comparative analysis of SLA monitoring in respect of trust maintenance in cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics 11, 127–157 (2002)

    Article  Google Scholar 

  2. Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS). IEEE (2010)

    Google Scholar 

  3. Muchahari, M.K., Sinha, S.K.: A New Trust Management Architecture for Cloud Computing Environment. In: 2012 International Symposium on Cloud and Services Computing (ISCOS). IEEE (2012)

    Google Scholar 

  4. Almathami, M.: Service level agreement (SLA)-based risk analysis in cloud computing environments, p. 91. Ann Arbor, Rochester Institute of Technology (2012)

    Google Scholar 

  5. Emeakaroha, V.C., et al.: Low level Metrics to High level SLAs-LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. In: HPCS (2010)

    Google Scholar 

  6. Brandic, I., et al.: Laysi: A layered approach for sla-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW). IEEE (2010)

    Google Scholar 

  7. Haq, I.U., Brandic, I., Schikuta, E.: Sla validation in layered cloud infrastructures. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 153–164. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Haq, I.U., et al.: Rule-based workflow validation of hierarchical service level agreements. In: Workshops at the Grid and Pervasive Computing Conference, GPC 2009. IEEE (2009)

    Google Scholar 

  9. Emeakaroha, V.C., et al.: Casvid: Application level monitoring for sla violation detection in clouds. In: 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC). IEEE (2012)

    Google Scholar 

  10. Mosallanejad, A., et al.: HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS 2013). The Society of Digital Information and Wireless Communication (2013)

    Google Scholar 

  11. Katsaros, G., et al.: A Self-adaptive hierarchical monitoring mechanism for Clouds. Journal of Systems and Software 85(5), 1029–1041 (2012)

    Article  Google Scholar 

  12. Fachrunnisa, O., Hussain, F.K.: A methodology for maintaining trust in industrial digital ecosystems. IEEE Transactions on Industrial Electronics 60(3), 1042–1058 (2013)

    Article  Google Scholar 

  13. Chandrasekar, A., Chandrasekar, K., Mahadevan, M., Varalakshmi, P.: QoS monitoring and dynamic trust establishment in the cloud. In: Li, R., Cao, J., Bourgeois, J. (eds.) GPC 2012. LNCS, vol. 7296, pp. 289–301. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Daniel, D., Lovesum, S.: A novel approach for scheduling service request in cloud with trust monitor. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE (2011)

    Google Scholar 

  15. Quillinan, T.B., et al.: Negotiation and monitoring of service level agreements. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176. Springer (2010)

    Google Scholar 

  16. Badidi, E.: A Cloud Service Broker for SLA-based SaaS provisioning. In: 2013 International Conference on Information Society (i-Society). IEEE (2013)

    Google Scholar 

  17. Falasi, A.A., Serhani, M.A., Dssouli, R.: A Model for Multi-levels SLA Monitoring in Federated Cloud Environment. In: 2013 IEEE 10th International Conference on Autonomic and Trusted Computing (UIC/ATC) Ubiquitous Intelligence and Computing. IEEE (2013)

    Google Scholar 

  18. Jrad, F., Tao, J., Streit, A.: SLA based Service Brokering in Intercloud Environments. In: CLOSER (2012)

    Google Scholar 

  19. Lee, J., et al.: Cloud Service Broker Portal: Main entry point for multi-cloud service providers and consumers. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 1108–1112. IEEE (2014)

    Google Scholar 

  20. Wang, M., et al.: A conceptual platform of SLA in cloud computing. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)

    Google Scholar 

  21. Schulz, F.: Towards measuring the degree of fulfillment of service level agreements. In: 2010 Third International Conference on Information and Computing (ICIC). IEEE (2010)

    Google Scholar 

  22. Hammadi, A.M., Hussain, O.: A framework for SLA assurance in cloud computing. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2012)

    Google Scholar 

  23. Sun, Y., et al.: SLA detective control model for workflow composition of cloud services. In: 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE (2013)

    Google Scholar 

  24. Emeakaroha, V.C., et al.: Towards autonomic detection of sla violations in cloud infrastructures. Future Generation Computer Systems 28(7), 1017–1029 (2012)

    Article  Google Scholar 

  25. Mosallanejad, A., Atan, R.: HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing. Journal of Software Engineering and Applications 6(3B), 114–117 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hussain, W., Hussain, F.K., Hussain, O.K. (2014). Maintaining Trust in Cloud Computing through SLA Monitoring. In: Loo, C.K., Yap, K.S., Wong, K.W., Beng Jin, A.T., Huang, K. (eds) Neural Information Processing. ICONIP 2014. Lecture Notes in Computer Science, vol 8836. Springer, Cham. https://doi.org/10.1007/978-3-319-12643-2_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12643-2_83

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12642-5

  • Online ISBN: 978-3-319-12643-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics