SlideShare a Scribd company logo
1 of 16
SLA INFORMATION MANAGEMENT THROUGH
DEPENDENCY DIGRAPHS: THE CASE OF
CLOUD DATA SERVICES

Katerina Stamou, Verena Kantere, Jean-Henry
Morin
Institute of Services Science, University of Geneva,
Switzerland

and Michael Georgiou
Cyprus University of Technology, Cyprus
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA
In a nutshell..
2


The term SLA data management encloses data operations that may take
place before, during or after the service level agreement (SLA) and service
execution.



The systematic management of SLA data is required for the automation of
SLAs and of service management processes (e.g. auditing, monitoring) that
generate a new cloud computing market and add business value in a
service-oriented economy.



We propose that the systematic management of SLAs can be efficiently
achieved using a digraph data model that perceives SLA elements and
their data relations as operational pipelines.



Service Level Agreements
dependency graphs.



A dependency graph is defined as a directed graph that contains
properties.- Secure Cloud edges security mini-track, Hawaii,
Graph computing denote dependencies among connected
HICSS 47
1/10/2014
component pairs.
USA

can

be

formalized

and

processed

as
Agenda
3

Definitions, problem description
 SLA
formalization:
anatomy,
service
dependencies
 SLA data management requirements
 SLA digraph data model: WSLA [1] into a
property digraph
 Data service provisioning scenario: service
properties, SLA template
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
 Ongoing work: SLA representation as a triple1/10/2014


USA
Definitions, problem description
4



Service Level Agreements (SLAs) express mutually agreed service
levels between providers and customers [1]. SLAs define quality of
service (QoS) criteria, along with functional service properties.



The definition and structure of SLAs for cloud computing services
are not yet standardized.





The term “systematic SLA data management” describes the
process of automated SLA formulation, storage and processing
according to a dynamic, adaptable data-schema and by one or more
backend supporting data-stores or DBMS.
SLA data management through graph data structures allows for
numerous traversal and filtering options that support the service and
SLA management over distributed virtual resources that are
dominated by availability and demand.
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
SLA anatomy:
Web Service Level Agreement (WSLA), IBM [1]
5

Signatories, third parties: customerprovider pair and their connections to third
party support for the service execution.

Service
description:
decomposition and hierarchical
classification of service objects or
operations, whose accumulation
and/or combination constitutes the
service definition.
Guarantees: obligations, typically from the provider part, to fulfill agreed and
promised levels or service provisioning. IBM distinguishes between
measureable targets (objectives) and predefined actions that occur during the
serviceHICSS 47 - Secure Cloud computing security mini-track, Hawaii,
up-time.
USA

1/10/2014
SLA formalization: service
dependencies

6









According to Keller et al [2], service dependencies represent
customer/provider relationships that are reflected to cooperating
components in a distributed service management system.
The term "dependency"defines the relationship between a
dependent service component that requires an operation
performed by an antecedent component in order for the former
to execute its function.
Service dependencies between internal SLA components can
be translated as actions (rules) that are fired when a predefined
condition is triggered.
Service dependencies are reflected in the SLA by:



Identified relationships between SLA components of the same service
HICSS 47 Identified Secure Cloud computing security mini-track, Hawaii, subsets within service
hierarchies of services and service 1/10/2014
USA
networks
7

SLA data management
requirements

Data criteria/ SLA
components

SLA
paramet
er

Metrics

SLOs

Action
guarantee
s

SLA
doc

exampleSLA mgt
operations

accessibility,
integrity

✖

✖

✖

✖

✖

measurement,
auditing

velocity rate

high

high

high

low

na

real-time monitoring

replication, staging

✖

✖

na

na

✖

real-time value
evaluation

dependencies

✖

na

✖

✖

✖

alerts, actions

cleanness

✖

✖

✖

✖

✖

auditing,
guaranteeevaluation

accuracy

✖

✖

✖

✖

✖

real-time monitoring,
auditing

ownership,
authenticity

✖

✖

✖

✖

✖

auditing, guarantee
definition

✖

function definition,
metric evaluation

heterogeneity - Secure ✖ computing security mini-track, ✖
✖
✖
HICSS 47
Cloud
Hawaii,
USA

1/10/2014
SLA digraph formalization skeleton
8

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
Data Service scenario (& next 3
slides)
9








A service provider offers deployed relational databases. The
scenario assumes alternative provisioning configurations
according to:
 Database isolation, data sharing
 DB/Schema administration
 Storage partitioning
Exercise goal: data service profiling and provisioning metrics.
Method: a data service representation as a collection of
attributes; map attributes to service provisioning semantics;
generate SLA template(s).
Scenario example, 3 service types:
 Separate DB, Separate schema (ST1)
 Shared DB, Separate schema (ST2)
 Shared - DB, Shared schemamini-track, Hawaii,
HICSS 47 Secure Cloud computing security (ST3)
USA

1/10/2014
10

Data Service scenario
infrastructure

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
11

Data service properties
(scenario)

Resource/System
characteristics

ST ST
1
2

OS platform:
Windows, Unix, Linux
(32/64)

✔

CPU (family
type/frequency)

ST
3

✔

ST
1

ST
2

DB instance/Schema nr.

✔

✔

DB memory (MB)

Processor
✔
•Classification by service
(nr/frequency) generate
type to
SLA

Database/Schema criteria

✔
✔

DB memory per connection
(MB)

ST
3

✔

DB/Schema size (MB/GB)

✔

✔

DB/Schema operations
DB/Schema growing ratio

ST
✔
1

ST
✔
2

ST
3

✔
✔
✔

✔
✔

✔

✔

✔

✔

template(s).
DB shutdown/start-up
•The three service types DB/Schema administration
On-demand
represent three service DB/schema/table backups
description branches that DB/schema/table restores
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
1/10/2014
belong to the same SLA
USA
Separate DB, Separate schema
SLA template example (scenario)
12

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
Ongoing work
13

SLA model representation in triple format.
 Advantages from SLA data management
through graphs: traversal and filtering
opportunities through RDF triple stores.
 AllegroGraph [3] servers on Amazon WS
[4] resources to evaluate the SLA graph
model for identified use cases that are
positioned in the cloud computing setting.


HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
On-going work: SLA graph model in
the Allegro triple store
14

Our current experimentation
uses:
•AllegroGraph server instances
on Amazon WS to simulate the
selection and exchange of
service
offers
through
distributed
RDF
graph
repositories.
•Synthetic data taken from real
service offers as advertised in
Amazon WS to compose SLA
data repositories for the cloud
simulation.
•The tests aim to evaluate the
efficiency, expressiveness and
usability of the proposed SLA
data model by experimenting
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
on service data management
USA
use
case
over
virtual

1/10/2014
Thank you!
15

SLA template as a property digraph can be reached at:
http://thinkcloud.unige.ch/SLAgraph/ (using the
NetworkX [5] programming library
Q&A: aikaterini.stamou@unige.ch

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
References
16

1.

2.

3.

4.
5.

H. Ludwig et al., “Web Service Level Agreement
(WSLA) Language Specification,” IBM Corporation,
2003.
A. Keller, U. Blumenthal, and G. Kar, “Classification
and Computation of Dependencies for Distributed
Management,” in Proc. of the Fifth IEEE Symposium
on Computers and Communications (ISCC 2000),
ser. ISCC ’00. IEEE Computer Society, 2000.
AllegroGraph 4.12.2,
http://www.franz.com/agraph/allegrograph/
Amazon Web Services, http://aws.amazon.com/
NetworkX: High-productivity software for complex
networks, http://networkx.github.io/
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014

More Related Content

What's hot

Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computingvimalraman
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Whitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureWhitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureNewt Global Consulting LLC
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo
 
Dimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesDimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesImran Khan
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG Bob Marcus
 
Dqs mds-matching 15042015
Dqs mds-matching 15042015Dqs mds-matching 15042015
Dqs mds-matching 15042015Neil Hambly
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopCitiusTech
 
Amplitude wave architecture - Test
Amplitude wave architecture - TestAmplitude wave architecture - Test
Amplitude wave architecture - TestKiran Naiga
 
Introduction to RAGLD
Introduction to RAGLDIntroduction to RAGLD
Introduction to RAGLDragld
 
Tutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxTutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxSubandi Wahyudi
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesPvrtechnologies Nellore
 
(More) Transparency Transformation
(More) Transparency Transformation(More) Transparency Transformation
(More) Transparency TransformationGeorge Thomas
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid ithman10010
 
Changing Landscape of Data Centers
Changing Landscape of Data CentersChanging Landscape of Data Centers
Changing Landscape of Data CentersSuhas Kelkar
 
Master Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachMaster Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachJeff Prom
 
Building Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaBuilding Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaGuido Schmutz
 

What's hot (20)

Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computing
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Whitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureWhitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices Architecture
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
 
Dimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesDimension of quality in Cloud Database Services
Dimension of quality in Cloud Database Services
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
 
Dqs mds-matching 15042015
Dqs mds-matching 15042015Dqs mds-matching 15042015
Dqs mds-matching 15042015
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
 
Data Quality Services
Data Quality ServicesData Quality Services
Data Quality Services
 
Amplitude wave architecture - Test
Amplitude wave architecture - TestAmplitude wave architecture - Test
Amplitude wave architecture - Test
 
Introduction to RAGLD
Introduction to RAGLDIntroduction to RAGLD
Introduction to RAGLD
 
Tutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxTutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdx
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
(More) Transparency Transformation
(More) Transparency Transformation(More) Transparency Transformation
(More) Transparency Transformation
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid it
 
Changing Landscape of Data Centers
Changing Landscape of Data CentersChanging Landscape of Data Centers
Changing Landscape of Data Centers
 
Ogsa
OgsaOgsa
Ogsa
 
Master Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachMaster Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington Beach
 
Building Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaBuilding Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache Kafka
 
The Social Data Web
The Social Data WebThe Social Data Web
The Social Data Web
 

Similar to SLA information management through dependency digraphs: the case of cloud data services

Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecturemeenalkakkar
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...riyak40
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureJohnny Le
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 

Similar to SLA information management through dependency digraphs: the case of cloud data services (20)

Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecture
 
20150113
2015011320150113
20150113
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
saas
saassaas
saas
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
M 94 4
M 94 4M 94 4
M 94 4
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architecture
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
V04405122126
V04405122126V04405122126
V04405122126
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 

Recently uploaded

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 

Recently uploaded (20)

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 

SLA information management through dependency digraphs: the case of cloud data services

  • 1. SLA INFORMATION MANAGEMENT THROUGH DEPENDENCY DIGRAPHS: THE CASE OF CLOUD DATA SERVICES Katerina Stamou, Verena Kantere, Jean-Henry Morin Institute of Services Science, University of Geneva, Switzerland and Michael Georgiou Cyprus University of Technology, Cyprus HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA
  • 2. In a nutshell.. 2  The term SLA data management encloses data operations that may take place before, during or after the service level agreement (SLA) and service execution.  The systematic management of SLA data is required for the automation of SLAs and of service management processes (e.g. auditing, monitoring) that generate a new cloud computing market and add business value in a service-oriented economy.  We propose that the systematic management of SLAs can be efficiently achieved using a digraph data model that perceives SLA elements and their data relations as operational pipelines.  Service Level Agreements dependency graphs.  A dependency graph is defined as a directed graph that contains properties.- Secure Cloud edges security mini-track, Hawaii, Graph computing denote dependencies among connected HICSS 47 1/10/2014 component pairs. USA can be formalized and processed as
  • 3. Agenda 3 Definitions, problem description  SLA formalization: anatomy, service dependencies  SLA data management requirements  SLA digraph data model: WSLA [1] into a property digraph  Data service provisioning scenario: service properties, SLA template HICSS 47 - Secure Cloud computing security mini-track, Hawaii,  Ongoing work: SLA representation as a triple1/10/2014  USA
  • 4. Definitions, problem description 4  Service Level Agreements (SLAs) express mutually agreed service levels between providers and customers [1]. SLAs define quality of service (QoS) criteria, along with functional service properties.  The definition and structure of SLAs for cloud computing services are not yet standardized.   The term “systematic SLA data management” describes the process of automated SLA formulation, storage and processing according to a dynamic, adaptable data-schema and by one or more backend supporting data-stores or DBMS. SLA data management through graph data structures allows for numerous traversal and filtering options that support the service and SLA management over distributed virtual resources that are dominated by availability and demand. HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 5. SLA anatomy: Web Service Level Agreement (WSLA), IBM [1] 5 Signatories, third parties: customerprovider pair and their connections to third party support for the service execution. Service description: decomposition and hierarchical classification of service objects or operations, whose accumulation and/or combination constitutes the service definition. Guarantees: obligations, typically from the provider part, to fulfill agreed and promised levels or service provisioning. IBM distinguishes between measureable targets (objectives) and predefined actions that occur during the serviceHICSS 47 - Secure Cloud computing security mini-track, Hawaii, up-time. USA 1/10/2014
  • 6. SLA formalization: service dependencies 6     According to Keller et al [2], service dependencies represent customer/provider relationships that are reflected to cooperating components in a distributed service management system. The term "dependency"defines the relationship between a dependent service component that requires an operation performed by an antecedent component in order for the former to execute its function. Service dependencies between internal SLA components can be translated as actions (rules) that are fired when a predefined condition is triggered. Service dependencies are reflected in the SLA by:   Identified relationships between SLA components of the same service HICSS 47 Identified Secure Cloud computing security mini-track, Hawaii, subsets within service hierarchies of services and service 1/10/2014 USA networks
  • 7. 7 SLA data management requirements Data criteria/ SLA components SLA paramet er Metrics SLOs Action guarantee s SLA doc exampleSLA mgt operations accessibility, integrity ✖ ✖ ✖ ✖ ✖ measurement, auditing velocity rate high high high low na real-time monitoring replication, staging ✖ ✖ na na ✖ real-time value evaluation dependencies ✖ na ✖ ✖ ✖ alerts, actions cleanness ✖ ✖ ✖ ✖ ✖ auditing, guaranteeevaluation accuracy ✖ ✖ ✖ ✖ ✖ real-time monitoring, auditing ownership, authenticity ✖ ✖ ✖ ✖ ✖ auditing, guarantee definition ✖ function definition, metric evaluation heterogeneity - Secure ✖ computing security mini-track, ✖ ✖ ✖ HICSS 47 Cloud Hawaii, USA 1/10/2014
  • 8. SLA digraph formalization skeleton 8 HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 9. Data Service scenario (& next 3 slides) 9     A service provider offers deployed relational databases. The scenario assumes alternative provisioning configurations according to:  Database isolation, data sharing  DB/Schema administration  Storage partitioning Exercise goal: data service profiling and provisioning metrics. Method: a data service representation as a collection of attributes; map attributes to service provisioning semantics; generate SLA template(s). Scenario example, 3 service types:  Separate DB, Separate schema (ST1)  Shared DB, Separate schema (ST2)  Shared - DB, Shared schemamini-track, Hawaii, HICSS 47 Secure Cloud computing security (ST3) USA 1/10/2014
  • 10. 10 Data Service scenario infrastructure HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 11. 11 Data service properties (scenario) Resource/System characteristics ST ST 1 2 OS platform: Windows, Unix, Linux (32/64) ✔ CPU (family type/frequency) ST 3 ✔ ST 1 ST 2 DB instance/Schema nr. ✔ ✔ DB memory (MB) Processor ✔ •Classification by service (nr/frequency) generate type to SLA Database/Schema criteria ✔ ✔ DB memory per connection (MB) ST 3 ✔ DB/Schema size (MB/GB) ✔ ✔ DB/Schema operations DB/Schema growing ratio ST ✔ 1 ST ✔ 2 ST 3 ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ template(s). DB shutdown/start-up •The three service types DB/Schema administration On-demand represent three service DB/schema/table backups description branches that DB/schema/table restores HICSS 47 - Secure Cloud computing security mini-track, Hawaii, 1/10/2014 belong to the same SLA USA
  • 12. Separate DB, Separate schema SLA template example (scenario) 12 HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 13. Ongoing work 13 SLA model representation in triple format.  Advantages from SLA data management through graphs: traversal and filtering opportunities through RDF triple stores.  AllegroGraph [3] servers on Amazon WS [4] resources to evaluate the SLA graph model for identified use cases that are positioned in the cloud computing setting.  HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 14. On-going work: SLA graph model in the Allegro triple store 14 Our current experimentation uses: •AllegroGraph server instances on Amazon WS to simulate the selection and exchange of service offers through distributed RDF graph repositories. •Synthetic data taken from real service offers as advertised in Amazon WS to compose SLA data repositories for the cloud simulation. •The tests aim to evaluate the efficiency, expressiveness and usability of the proposed SLA data model by experimenting HICSS 47 - Secure Cloud computing security mini-track, Hawaii, on service data management USA use case over virtual 1/10/2014
  • 15. Thank you! 15 SLA template as a property digraph can be reached at: http://thinkcloud.unige.ch/SLAgraph/ (using the NetworkX [5] programming library Q&A: aikaterini.stamou@unige.ch HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 16. References 16 1. 2. 3. 4. 5. H. Ludwig et al., “Web Service Level Agreement (WSLA) Language Specification,” IBM Corporation, 2003. A. Keller, U. Blumenthal, and G. Kar, “Classification and Computation of Dependencies for Distributed Management,” in Proc. of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), ser. ISCC ’00. IEEE Computer Society, 2000. AllegroGraph 4.12.2, http://www.franz.com/agraph/allegrograph/ Amazon Web Services, http://aws.amazon.com/ NetworkX: High-productivity software for complex networks, http://networkx.github.io/ HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014