Abstract
Cloud computing has enabled users to access various resources and applications as a service and in return pay the provider only for the time for which they are used. Service Level Agreements (SLA) are formed between the user and provider to ensure that the required services and applications are delivered as expected. With the increase of public cloud providers, challenges such as availability, reliability, security, privacy and transactional risk demand detailed assessment during the formation of SLAs. This paper focuses on one sub-category of transactional risk while forming SLAs: namely, performance risk. We argue that performance risk assessment should be done by the user before entering into an SLA with a service provider. We propose to measure performance risk according to the specific context and assessment criteria with the aid of a semantic similarity model for the SLA requirement being negotiated in a cloud computing environment. We show through simulations that the performance risk analysis is more accurate using semantic similarity matching compared with analysis without semantic similarity matching.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud Security Issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517–520. IEEE Computer Society, Bangalore (2009)
Comellas, J.O.F., Presa, I.G., Fernández, J.G.: SLA-driven Elastic Cloud Hosting Provider. In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, pp. 111–118. IEEE Computer Society, Pisa (2010)
Nurmela, T., Kutvonen, L.: Service Level Agreement Management in Federated Virtual Organizations. In: Indulska, J., Raymond, K. (eds.) DAIS 2007. LNCS, vol. 4531, pp. 62–75. Springer, Heidelberg (2007)
Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. In: Cloud Computing, pp. 131–144. Springer, Heidelberg (2009)
Dillon, T., Wu, C., Chang, E.: Cloud Computing: Issues and Challenges. In: Proceedings on the 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 27–33. IEEE Computer Society, Perth (2010)
Fitó, J.O., Guitart, J.: Introducing Risk Management into Cloud Computing. Barcelona Supercomputing Center and Technical University of Catalonia, Barcelona, Spain (2010)
AssessGrid Consortium.: D4.1 Advanced Risk Assessment. In: Carlsson, C., Weissmann, O. (eds.): Assess Grid Deliverable (2008)
ISO Guide 73: Risk Management Vocabulary (2009), http://www.iso.org/iso/cataloguedetail?csnumber=44651
ISO 31000: Risk management - Principles and guidelines (2009), http://www.iso.org/iso/cataloguedetail?csnumber=43170
Aberer, K., Despotovic, Z.: Managing trust in a Peer-2-Peer Information System. In: ACM (ed.): Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM 2001), Atlanta, Georgia, USA, pp. 310–317 (2001)
Zheng, X., Wu, Z., Chen, H., Mao, Y.: A Scalable Probabilistic Approach to Trust Evaluation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 423–438. Springer, Heidelberg (2006)
Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 93–107. Springer, Heidelberg (2005)
Hassell, L.: Affect and Trust. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 131–145. Springer, Heidelberg (2005)
Pearson, S., Mont, M.C., Crane, S.: Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 355–363. Springer, Heidelberg (2005)
Wang, Y., Wong, D.S., Lin, K.-J., Varadharajan, V.: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Information Systems and E-Business Management 6, 25–48 (2008)
Hussain, O.K., Chang, E., Hussain, F.K., Dillon, T.S.: A methodology to quantify failure for risk-based decision support system in digital business ecosystems. Data & Knowledge Engineering 63, 597–621 (2007)
Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)
Sowa, J.F.: Semantic Networks. In: Shapiro, S.C. (ed.) Encyclopaedia of Artificial Intelligence. Wiley, Chichester (1992)
Dong, H., Hussain, F.K., Chang, E.: A hybrid concept similarity measure model for ontology environment. In: Meersman, R., Herrero, P., Dillon, T. (eds.) OTM 2009, pp. 848–857. Springer, Vilamoura (2009)
Gruber, T.: A translation approach to portable ontology specifications. Knowledge Acquisition 5, 199–220 (1995)
Dong, H., Hussain, F.K., Chang, E.: A context-aware semantic similarity model for ontology environments. Concurrency and Computation: Practice and Experience (in Press)
Rada, R., Mili, H., Bicknell, E., Blettner, M.: Development and application of a metric on Semantic Nets. IEEE Transactions on Systems, Man and Cybernetics 19, 17–30 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hussain, O., Dong, H., Singh, J. (2010). Semantic Similarity Model for Risk Assessment in Forming Cloud Computing SLAs. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems, OTM 2010. OTM 2010. Lecture Notes in Computer Science, vol 6427. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16949-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-16949-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16948-9
Online ISBN: 978-3-642-16949-6
eBook Packages: Computer ScienceComputer Science (R0)