Abstract
Maintaining trust in cloud computing is a significant challenge due to the dynamic nature of cloud computing and the fragility of trust. Trust can be established by conducting successful transactions and meeting all the parameters of the Service Level Agreement (SLA) drawn up between two interacting parties. Trust can be maintained by continuous monitoring of these predefined SLA parameters. There are number of commentaries on SLA monitoring that describe different frameworks for the proactive or reactive detection of SLA violations. The aim of this research is to present an overview of the literature and make a comparative analysis of SLA monitoring in respect of trust maintenance in cloud computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics 11, 127–157 (2002)
Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS). IEEE (2010)
Muchahari, M.K., Sinha, S.K.: A New Trust Management Architecture for Cloud Computing Environment. In: 2012 International Symposium on Cloud and Services Computing (ISCOS). IEEE (2012)
Almathami, M.: Service level agreement (SLA)-based risk analysis in cloud computing environments, p. 91. Ann Arbor, Rochester Institute of Technology (2012)
Emeakaroha, V.C., et al.: Low level Metrics to High level SLAs-LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. In: HPCS (2010)
Brandic, I., et al.: Laysi: A layered approach for sla-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW). IEEE (2010)
Haq, I.U., Brandic, I., Schikuta, E.: Sla validation in layered cloud infrastructures. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 153–164. Springer, Heidelberg (2010)
Haq, I.U., et al.: Rule-based workflow validation of hierarchical service level agreements. In: Workshops at the Grid and Pervasive Computing Conference, GPC 2009. IEEE (2009)
Emeakaroha, V.C., et al.: Casvid: Application level monitoring for sla violation detection in clouds. In: 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC). IEEE (2012)
Mosallanejad, A., et al.: HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS 2013). The Society of Digital Information and Wireless Communication (2013)
Katsaros, G., et al.: A Self-adaptive hierarchical monitoring mechanism for Clouds. Journal of Systems and Software 85(5), 1029–1041 (2012)
Fachrunnisa, O., Hussain, F.K.: A methodology for maintaining trust in industrial digital ecosystems. IEEE Transactions on Industrial Electronics 60(3), 1042–1058 (2013)
Chandrasekar, A., Chandrasekar, K., Mahadevan, M., Varalakshmi, P.: QoS monitoring and dynamic trust establishment in the cloud. In: Li, R., Cao, J., Bourgeois, J. (eds.) GPC 2012. LNCS, vol. 7296, pp. 289–301. Springer, Heidelberg (2012)
Daniel, D., Lovesum, S.: A novel approach for scheduling service request in cloud with trust monitor. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE (2011)
Quillinan, T.B., et al.: Negotiation and monitoring of service level agreements. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 167–176. Springer (2010)
Badidi, E.: A Cloud Service Broker for SLA-based SaaS provisioning. In: 2013 International Conference on Information Society (i-Society). IEEE (2013)
Falasi, A.A., Serhani, M.A., Dssouli, R.: A Model for Multi-levels SLA Monitoring in Federated Cloud Environment. In: 2013 IEEE 10th International Conference on Autonomic and Trusted Computing (UIC/ATC) Ubiquitous Intelligence and Computing. IEEE (2013)
Jrad, F., Tao, J., Streit, A.: SLA based Service Brokering in Intercloud Environments. In: CLOSER (2012)
Lee, J., et al.: Cloud Service Broker Portal: Main entry point for multi-cloud service providers and consumers. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 1108–1112. IEEE (2014)
Wang, M., et al.: A conceptual platform of SLA in cloud computing. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)
Schulz, F.: Towards measuring the degree of fulfillment of service level agreements. In: 2010 Third International Conference on Information and Computing (ICIC). IEEE (2010)
Hammadi, A.M., Hussain, O.: A framework for SLA assurance in cloud computing. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2012)
Sun, Y., et al.: SLA detective control model for workflow composition of cloud services. In: 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE (2013)
Emeakaroha, V.C., et al.: Towards autonomic detection of sla violations in cloud infrastructures. Future Generation Computer Systems 28(7), 1017–1029 (2012)
Mosallanejad, A., Atan, R.: HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing. Journal of Software Engineering and Applications 6(3B), 114–117 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hussain, W., Hussain, F.K., Hussain, O.K. (2014). Maintaining Trust in Cloud Computing through SLA Monitoring. In: Loo, C.K., Yap, K.S., Wong, K.W., Beng Jin, A.T., Huang, K. (eds) Neural Information Processing. ICONIP 2014. Lecture Notes in Computer Science, vol 8836. Springer, Cham. https://doi.org/10.1007/978-3-319-12643-2_83
Download citation
DOI: https://doi.org/10.1007/978-3-319-12643-2_83
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12642-5
Online ISBN: 978-3-319-12643-2
eBook Packages: Computer ScienceComputer Science (R0)