Skip to main content
Log in

Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the cloud service system, the expectation between the customer and the cloud provider for the delivered services like, responsibilities and penalties of the violation arise in the cloud parties are specifically designed in a document named as Service Level Agreement (SLA). However, violation in the Service Level Agreement is a major challenge in the research community of SaaS cloud providers. Hence, an effective violation detection method named Chicken Spider Monkey Optimization-based Deep Belief Network (ChicSMO-based DBN) is proposed in this research to perform the violation detection mechanism in the cloud environment. The proposed Chicken Spider Monkey Optimization-based Deep Belief Network effectively computes the scores, like User Privacy Score (UPS), Service Level Agreement score (SLA), and Cloud Service Provider score (CSP) based on the fitness value. The spider monkeys forage the food by evaluating the distance from the food, and update their position towards the food source. The feature scores are computed by updating the position of local and global leader group members, and perform the violation detection process using the Deep Belief Network classifier. The performance enhancement attained by the proposed algorithm in terms of the evaluation metrics, like accuracy, coverage rate, and F-value which acquire with the values of 0.862, 0.944, and 0.889 with the transaction data of 1000, respectively. It increases the reliability to address the QoS guarantee issues and increase the confidence level of the prediction model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Wu, L., Garg, S. K., Versteeg, S., & Buyya, R. (2013). “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments. IEEE Transactions on services computing, 7(3), 465–485.

    Article  Google Scholar 

  2. Polepally, V., & Chatrapati, K. S. (2018). Exponential gravitational search algorithm-based VM migration strategy for load balancing in cloud computing. International Journal of Modeling, Simulation, and Scientific Computing, 9(1), 1850002.

    Article  Google Scholar 

  3. Zhao, L., Sakr, S., & Liu, A. (2013). A framework for consumer-centric SLA management of cloud-hosted databases. IEEE Transactions on Services Computing, 8(4), 534–549.

    Article  Google Scholar 

  4. Mustafa, S., Bilal, K., Malik, S. U. R., & Madani, S. A. (2018). SLA-aware energy efficient resource management for cloud environments. IEEE Access, 6, 15004–15020.

    Article  Google Scholar 

  5. Rimal, B.P., Choi, E. & Lumb, I. (August 2009). A taxonomy and survey of cloud computing systems. In IEEE International Joint Conference on INC, IMS and IDC (pp. 44–51).

  6. Grit, L., Irwin, D., Yumerefendi, A. & Chase, J. (2006). Virtual machine hosting for networked clusters: Building the foundations for autonomic orchestration. In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, Computer Society, (p. 7), IEEE .

  7. Schad, J., Dittrich, J., & Quiané-Ruiz, J. A. (2010). Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proceedings of the VLDB Endowment, 3(1–2), 460–471.

    Article  Google Scholar 

  8. Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R. & Sears, R. (2010). Benchmarking cloud serving systems with YCSB. In ACM symposium on Cloud computing (pp. 143–154).

  9. Valsalan, P., & Sankaranarayanan, K. (2012) Analysis of low power submicron circuits. International Journal of Computer Applications.

  10. Son, J., Dastjerdi, A. V., Calheiros, R. N., & Buyya, R. (2017). SLA-aware and energy-efficient dynamic overbooking in SDN-based cloud data centers. IEEE Transactions on Sustainable Computing, 2(2), 76–89.

    Article  Google Scholar 

  11. VhatkarKapilNetaji, & Bhole G. P. (2020). Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture. Multimedia Research, 3(1), 11–20.

  12. Yadav, R., Zhang, W., Kaiwartya, O., Singh, P. R., Elgendy, I. A., & Tian, Y. C. (2018). Adaptive energy-aware algorithms for minimizing energy consumption and SLA violation in cloud computing. IEEE Access, 6, 55923–55936.

    Article  Google Scholar 

  13. Xie, X., Wang, W., & Qin, T. (2015) Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines. In Proceedings of 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA.

  14. Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S., & Leymann, F. (2009) Runtime Prediction of Service Level Agreement Violations for Composite Services. Service-Oriented Computing, ICSOC/ServiceWave 2009 Workshops ( pp. 176–186).

  15. Li, L., Dong, J., Zuo, D., & Wu. J. (2017). SLA-aware and energy-efficient VM consolidation in cloud data centers using robust linear regression prediction model. IEEE Access, 7, 9490–9500

    Article  Google Scholar 

  16. Paputungan, I. V., Hani, A. F. M., Hassan, M. F., & Asirvadam, V. S. (2018). Real-time and proactive SLA renegotiation for a cloud-based system. IEEE Systems Journal, 13(1), 400–411.

    Article  Google Scholar 

  17. Begnum, K., Burgess, M., Jonassen, T. M., & Fagernes, S. (2006). On the stability of adaptive service level agreements. IEEE Transactions on Network and Service Management, 3(1), 13–21.

    Article  Google Scholar 

  18. Greenwood, D., Vitaglione, G., Keller, L. & Calisti, M. (2006) Service level agreement management with adaptive coordination. In IEEE International conference on Networking and Services (ICNS'06) (pp. 45–45), July 2006.

  19. Wu, L., Garg, S. K. & Buyya, R. (2011) SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Computer Society (pp. 195-204)

  20. Goudarzi, H., & Pedram, M. (2015). Hierarchical SLA-driven resource management for peak power-aware and energy-efficient operation of a cloud datacenter. IEEE Transactions on Cloud Computing, 4(2), 222–236.

    Article  Google Scholar 

  21. Swamy, S. M., Rajakumar, B. R., & Valarmathi, I. R. (2013) Design of Hybrid Wind and Photovoltaic Power System using Opposition-based Genetic Algorithm with Cauchy Mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), Chennai, India.

  22. Agarkhed, J. & Ashalatha, R. (2017). A privacy preservation scheme in cloud environment. In IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 549–552).

  23. Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364–368.

    Article  Google Scholar 

  24. Zhang, G., Yang, Y., Zhang, X., Liu, C. and Chen, J. (2012) Key research issues for privacy protection and preservation in cloud computing. In: IEEE Second International Conference on Cloud and Green Computing (pp. 47–54).

  25. Wenge, O., Lampe, U., Müller, A. & Schaarschmidt, R. (2014) Data Privacy in cloud computing–an empirical study in the financial industry. Americas Conference on Information Systems, 1-9.

  26. Li, C., Xu, Z. & Zhang, Z. (2012) A trusted information sharing skeleton for privacy preservation. In IEEE International Conference on Cloud Computing and Intelligence Systems (Vol. 3, pp. 1372-1376)

  27. Meng, X., Liu, Y., Gao, X. and Zhang, H. (2014). A new bio-inspired algorithm: Chicken swarm optimization. In International conference in swarm intelligence (pp. 86-94), Cham: Springer

  28. Bansal, J. C., Sharma, H., Jadon, S. S., & Clerc, M. (2014). Spider monkey optimization algorithm for numerical optimization. Memetic computing, 6(1), 31–47.

    Article  Google Scholar 

  29. Zhou, S., Wu, L., & Jin, C. (2017). A privacy-based SLA violation detection model for the security of cloud computing. China Communications, 14(9), 155–165.

    Article  Google Scholar 

  30. Al-Aloussi, S., (2013) Neural network solution for service level agreement. International Journal of Advanced Computer Science and Applications, (IJACSA), 4(2),72–80.

    Google Scholar 

  31. Qiu, F., Zhang, B., & Guo, J. (2016) A deep learning approach for VM workload prediction in the cloud. In IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp 319–324).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Pradeepa.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pradeepa, P., PushpaLakshmi, R. Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. Wireless Pers Commun 117, 1659–1683 (2021). https://doi.org/10.1007/s11277-020-07940-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07940-9

Keywords

Navigation