Abstract
In the cloud service system, the expectation between the customer and the cloud provider for the delivered services like, responsibilities and penalties of the violation arise in the cloud parties are specifically designed in a document named as Service Level Agreement (SLA). However, violation in the Service Level Agreement is a major challenge in the research community of SaaS cloud providers. Hence, an effective violation detection method named Chicken Spider Monkey Optimization-based Deep Belief Network (ChicSMO-based DBN) is proposed in this research to perform the violation detection mechanism in the cloud environment. The proposed Chicken Spider Monkey Optimization-based Deep Belief Network effectively computes the scores, like User Privacy Score (UPS), Service Level Agreement score (SLA), and Cloud Service Provider score (CSP) based on the fitness value. The spider monkeys forage the food by evaluating the distance from the food, and update their position towards the food source. The feature scores are computed by updating the position of local and global leader group members, and perform the violation detection process using the Deep Belief Network classifier. The performance enhancement attained by the proposed algorithm in terms of the evaluation metrics, like accuracy, coverage rate, and F-value which acquire with the values of 0.862, 0.944, and 0.889 with the transaction data of 1000, respectively. It increases the reliability to address the QoS guarantee issues and increase the confidence level of the prediction model.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Wu, L., Garg, S. K., Versteeg, S., & Buyya, R. (2013). “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments. IEEE Transactions on services computing, 7(3), 465–485.
Polepally, V., & Chatrapati, K. S. (2018). Exponential gravitational search algorithm-based VM migration strategy for load balancing in cloud computing. International Journal of Modeling, Simulation, and Scientific Computing, 9(1), 1850002.
Zhao, L., Sakr, S., & Liu, A. (2013). A framework for consumer-centric SLA management of cloud-hosted databases. IEEE Transactions on Services Computing, 8(4), 534–549.
Mustafa, S., Bilal, K., Malik, S. U. R., & Madani, S. A. (2018). SLA-aware energy efficient resource management for cloud environments. IEEE Access, 6, 15004–15020.
Rimal, B.P., Choi, E. & Lumb, I. (August 2009). A taxonomy and survey of cloud computing systems. In IEEE International Joint Conference on INC, IMS and IDC (pp. 44–51).
Grit, L., Irwin, D., Yumerefendi, A. & Chase, J. (2006). Virtual machine hosting for networked clusters: Building the foundations for autonomic orchestration. In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, Computer Society, (p. 7), IEEE .
Schad, J., Dittrich, J., & Quiané-Ruiz, J. A. (2010). Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proceedings of the VLDB Endowment, 3(1–2), 460–471.
Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R. & Sears, R. (2010). Benchmarking cloud serving systems with YCSB. In ACM symposium on Cloud computing (pp. 143–154).
Valsalan, P., & Sankaranarayanan, K. (2012) Analysis of low power submicron circuits. International Journal of Computer Applications.
Son, J., Dastjerdi, A. V., Calheiros, R. N., & Buyya, R. (2017). SLA-aware and energy-efficient dynamic overbooking in SDN-based cloud data centers. IEEE Transactions on Sustainable Computing, 2(2), 76–89.
VhatkarKapilNetaji, & Bhole G. P. (2020). Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture. Multimedia Research, 3(1), 11–20.
Yadav, R., Zhang, W., Kaiwartya, O., Singh, P. R., Elgendy, I. A., & Tian, Y. C. (2018). Adaptive energy-aware algorithms for minimizing energy consumption and SLA violation in cloud computing. IEEE Access, 6, 55923–55936.
Xie, X., Wang, W., & Qin, T. (2015) Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines. In Proceedings of 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA.
Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S., & Leymann, F. (2009) Runtime Prediction of Service Level Agreement Violations for Composite Services. Service-Oriented Computing, ICSOC/ServiceWave 2009 Workshops ( pp. 176–186).
Li, L., Dong, J., Zuo, D., & Wu. J. (2017). SLA-aware and energy-efficient VM consolidation in cloud data centers using robust linear regression prediction model. IEEE Access, 7, 9490–9500
Paputungan, I. V., Hani, A. F. M., Hassan, M. F., & Asirvadam, V. S. (2018). Real-time and proactive SLA renegotiation for a cloud-based system. IEEE Systems Journal, 13(1), 400–411.
Begnum, K., Burgess, M., Jonassen, T. M., & Fagernes, S. (2006). On the stability of adaptive service level agreements. IEEE Transactions on Network and Service Management, 3(1), 13–21.
Greenwood, D., Vitaglione, G., Keller, L. & Calisti, M. (2006) Service level agreement management with adaptive coordination. In IEEE International conference on Networking and Services (ICNS'06) (pp. 45–45), July 2006.
Wu, L., Garg, S. K. & Buyya, R. (2011) SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Computer Society (pp. 195-204)
Goudarzi, H., & Pedram, M. (2015). Hierarchical SLA-driven resource management for peak power-aware and energy-efficient operation of a cloud datacenter. IEEE Transactions on Cloud Computing, 4(2), 222–236.
Swamy, S. M., Rajakumar, B. R., & Valarmathi, I. R. (2013) Design of Hybrid Wind and Photovoltaic Power System using Opposition-based Genetic Algorithm with Cauchy Mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), Chennai, India.
Agarkhed, J. & Ashalatha, R. (2017). A privacy preservation scheme in cloud environment. In IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 549–552).
Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364–368.
Zhang, G., Yang, Y., Zhang, X., Liu, C. and Chen, J. (2012) Key research issues for privacy protection and preservation in cloud computing. In: IEEE Second International Conference on Cloud and Green Computing (pp. 47–54).
Wenge, O., Lampe, U., Müller, A. & Schaarschmidt, R. (2014) Data Privacy in cloud computing–an empirical study in the financial industry. Americas Conference on Information Systems, 1-9.
Li, C., Xu, Z. & Zhang, Z. (2012) A trusted information sharing skeleton for privacy preservation. In IEEE International Conference on Cloud Computing and Intelligence Systems (Vol. 3, pp. 1372-1376)
Meng, X., Liu, Y., Gao, X. and Zhang, H. (2014). A new bio-inspired algorithm: Chicken swarm optimization. In International conference in swarm intelligence (pp. 86-94), Cham: Springer
Bansal, J. C., Sharma, H., Jadon, S. S., & Clerc, M. (2014). Spider monkey optimization algorithm for numerical optimization. Memetic computing, 6(1), 31–47.
Zhou, S., Wu, L., & Jin, C. (2017). A privacy-based SLA violation detection model for the security of cloud computing. China Communications, 14(9), 155–165.
Al-Aloussi, S., (2013) Neural network solution for service level agreement. International Journal of Advanced Computer Science and Applications, (IJACSA), 4(2),72–80.
Qiu, F., Zhang, B., & Guo, J. (2016) A deep learning approach for VM workload prediction in the cloud. In IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp 319–324).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pradeepa, P., PushpaLakshmi, R. Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. Wireless Pers Commun 117, 1659–1683 (2021). https://doi.org/10.1007/s11277-020-07940-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07940-9