In the present atmosphere of tighter budgets and pressure on resources, many public sector organiza-tions, including local authorities, are outsourcing services to outer organizations under service level agreements in cloud computing. Cloud computing is an approach to convey facilitated benefits over the web. Services are available to the users relying upon cloud arrangement and the Service Level Agreement (SLA) between the service providers and the cli-ents. Service level agreements are being utilized inside associations, directing connection between various sections of the association. It requires a commitment from both parties to support and adhere to the agreement in order for the SLA to work effectively. In spite of the fact that it gives a straightforward view about the cloud condition, such as cloud services, cloud distribution, security issues, responsibilities, agreements and warranties of the services. However, there are several issues occur from incorrect SLA which can cause misunderstanding among service providers and clients. SLA checking device confirm the SLA effectively whether it deals with all administrations as per SLA. In this paper, we represent a SLA confirmation and checking process that can distinguish SLA verification in gathering the information. We consider IaaS (Infrastructure as a Service) parameters for SLA verification in Cloud.
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
Lessons Learned: Pilot Texas Cloud Offering (PTCO) – PDF (267 KB, 13 pages)
Report on lessons learned from Texas state government and cloud provider pilot project; includes cloud computing overview
The Jamcracker Platform - Cloud Services Governance and Management for the En...John Katrick
Enterprise cloud computing has transformed IT. Cloud computing decreases time- to-market, improves agility by allowing businesses to adapt quickly to changing market demands, and, ultimately, drives down costs.The ease of deploying and scaling cloud services, along with their relatively low cost of acquisition, has resulted in increasingly decentralized IT, or what is referred to as “shadow IT.”
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is critical for any enterprise IT departments. This requires a set of 12 cloud-based apps including infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS). With Amazon Web Services (AWS) as an environment, we offer a guide to the key considerations for PCI DSS compliance
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
Lessons Learned: Pilot Texas Cloud Offering (PTCO) – PDF (267 KB, 13 pages)
Report on lessons learned from Texas state government and cloud provider pilot project; includes cloud computing overview
The Jamcracker Platform - Cloud Services Governance and Management for the En...John Katrick
Enterprise cloud computing has transformed IT. Cloud computing decreases time- to-market, improves agility by allowing businesses to adapt quickly to changing market demands, and, ultimately, drives down costs.The ease of deploying and scaling cloud services, along with their relatively low cost of acquisition, has resulted in increasingly decentralized IT, or what is referred to as “shadow IT.”
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is critical for any enterprise IT departments. This requires a set of 12 cloud-based apps including infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS). With Amazon Web Services (AWS) as an environment, we offer a guide to the key considerations for PCI DSS compliance
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has evolved as a disruptive technology and picked up speed with the presence of many vendors in cloud computing space. The evolution of cloud computing from numerous technological approaches and business models such as SaaS, cluster computing, high performance computing, etc., signifies that the cloud IDM can be considered as a superset of all the corresponding issues from these paradigms and many more. In this paper we will discuss Life cycle management, Cloud architecture, Pattern in Cloud IDM, Volatility of Cloud relations.
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
Computing is being transformed to a model consisting of services based on their requirements without regard to where the services are hosted or how they are delivered.
Today Cloud computing is used in a wide range of domains. By using cloud computing a user
can utilize services and pool of resources through internet. The cloud computing platform
guarantees subscribers that it will live up to the service level agreement (SLA) in providing
resources as service and as per needs. However, it is essential that the provider be able to
effectively manage the resources. One of the important roles of the cloud computing platform is
to balance the load amongst different servers in order to avoid overloading in any host and
improve resource utilization.
It is defined as a distributed system containing a collection of computing and communication
resources located in distributed data enters which are shared by several end users. It has widely
been adopted by the industry, though there are many existing issues like Load Balancing, Virtual
Machine Migration, Server Consolidation, Energy Management, etc.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
Software as a Service (SaaS): Custom Acquisition Strategies - LabGroup.com.auSusan Diaz
Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise.
Market-Oriented Cloud Computing (as part of cloud symposium of ACM Compute 2009)
Srikumar Venugopal
Grid Computing and Distributed Systems (GRIDS) Laboratory
Dept. of Computer Science and Software Engineering
The University of Melbourne, Australia
Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for coming world. It is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We
call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an
infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network.
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
This is a study to the research paper (Service Performance and Analysis in Cloud Computing) by Kaiqi Xiong and Harry Perros in the class related to the course of EC636 Stochastic and Random Process in Tripoli University-Engineering faculty-Computer Engineering Department.
You can find this paper in (https://ieeexplore.ieee.org/document/5190711)
Dynamic congestion management system for cloud service brokerIJECEIAES
The cloud computing model offers a shared pool of resources and services with diverse models presented to the clients through the internet by an on-demand scalable and dynamic pay-per-use model. The developers have identified the need for an automated system (cloud service broker (CSB)) that can contribute to exploiting the cloud capability, enhancing its functionality, and improving its performance. This research presents a dynamic congestion management (DCM) system which can manage the massive amount of cloud requests while considering the required quality for the clients’ requirements as regulated by the service-level policy. In addition, this research introduces a forwarding policy that can be utilized to choose high-priority calls coming from the cloud service requesters and passes them by the broker to the suitable cloud resources. The policy has made use of one of the mechanisms that are used by Cisco to assist the administration of the congestion that might take place at the broker side. Furthermore, the DCM system is used to help in provisioning and monitoring the works of the cloud providers through the job operation. The proposed DCM system was implemented and evaluated by using the CloudSim tool.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has evolved as a disruptive technology and picked up speed with the presence of many vendors in cloud computing space. The evolution of cloud computing from numerous technological approaches and business models such as SaaS, cluster computing, high performance computing, etc., signifies that the cloud IDM can be considered as a superset of all the corresponding issues from these paradigms and many more. In this paper we will discuss Life cycle management, Cloud architecture, Pattern in Cloud IDM, Volatility of Cloud relations.
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
Computing is being transformed to a model consisting of services based on their requirements without regard to where the services are hosted or how they are delivered.
Today Cloud computing is used in a wide range of domains. By using cloud computing a user
can utilize services and pool of resources through internet. The cloud computing platform
guarantees subscribers that it will live up to the service level agreement (SLA) in providing
resources as service and as per needs. However, it is essential that the provider be able to
effectively manage the resources. One of the important roles of the cloud computing platform is
to balance the load amongst different servers in order to avoid overloading in any host and
improve resource utilization.
It is defined as a distributed system containing a collection of computing and communication
resources located in distributed data enters which are shared by several end users. It has widely
been adopted by the industry, though there are many existing issues like Load Balancing, Virtual
Machine Migration, Server Consolidation, Energy Management, etc.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
Software as a Service (SaaS): Custom Acquisition Strategies - LabGroup.com.auSusan Diaz
Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise.
Market-Oriented Cloud Computing (as part of cloud symposium of ACM Compute 2009)
Srikumar Venugopal
Grid Computing and Distributed Systems (GRIDS) Laboratory
Dept. of Computer Science and Software Engineering
The University of Melbourne, Australia
Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for coming world. It is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We
call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an
infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network.
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
This is a study to the research paper (Service Performance and Analysis in Cloud Computing) by Kaiqi Xiong and Harry Perros in the class related to the course of EC636 Stochastic and Random Process in Tripoli University-Engineering faculty-Computer Engineering Department.
You can find this paper in (https://ieeexplore.ieee.org/document/5190711)
Dynamic congestion management system for cloud service brokerIJECEIAES
The cloud computing model offers a shared pool of resources and services with diverse models presented to the clients through the internet by an on-demand scalable and dynamic pay-per-use model. The developers have identified the need for an automated system (cloud service broker (CSB)) that can contribute to exploiting the cloud capability, enhancing its functionality, and improving its performance. This research presents a dynamic congestion management (DCM) system which can manage the massive amount of cloud requests while considering the required quality for the clients’ requirements as regulated by the service-level policy. In addition, this research introduces a forwarding policy that can be utilized to choose high-priority calls coming from the cloud service requesters and passes them by the broker to the suitable cloud resources. The policy has made use of one of the mechanisms that are used by Cisco to assist the administration of the congestion that might take place at the broker side. Furthermore, the DCM system is used to help in provisioning and monitoring the works of the cloud providers through the job operation. The proposed DCM system was implemented and evaluated by using the CloudSim tool.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
The appearance of infinite computing resources that available on demand and fast enough to adapt with
load surges makes Cloud computing favourable service infrastructure in IT market. Core feature in Cloud
service infrastructures is Service Level Agreement (SLA) that led seamless service at high quality of service
to client. One of the challenges in Cloud is providing heterogeneous computing services for the clients.
With the increasing number of clients/tenants in the Cloud, unsatisfied agreement is becoming a critical
factor. In this paper, we present an adaptive resource allocation policy which attempts to improve
accountable in Cloud SLA while aiming for enhancing system performance. Specifically, our allocation
incorporates dynamic matching SLA rules to deal with diverse processing requirements from
tenants.Explicitly, it reduces processing overheadswhile achieving better service agreement. Simulation
experiments proved the efficacy of our allocation policy in order to satisfy the tenants; and helps improve
reliable computing.
Topic The top 5 details that should be included in your cloud SLA..docxjuliennehar
Topic The top 5 details that should be included in your cloud SLA.
Read and respond to below two student’s discussions. (5-6 lines would be more sufficient) reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions
#1.Posted by Krishnaveni
A service-level agreement (SLA) defines the level of service expected by a customer from a supplier, laying out the metrics by which that service is measured, and the remedies or penalties, if any, should the agreed-on service levels not be achieved. Usually, SLAs are between companies and external suppliers, but they may also be between two departments within a company. In my point of view below are five key things we need to consider.
Disaster recovery and backup
In the event of a disaster, our cloud provider should have a plan in place to prevent total loss of our data. Cloud providers should have a section of the SLA that describes their disaster recovery and backup solutions in detail. Depending on the provider, they may provide automatic backups and snapshots of our data. If the user is required to set up backup and recovery systems, the SLA should outline that. It may not specifically state how to activate them, but we should be aware if we need to activate them or not.
Data source.
“Where is the information coming from that will be used to measure the provider’s compliance?” In many situations, a customer may have to rely on the cloud provider to provide the information; however, increasingly, there are third parties that can help the customer with this. In a perfect world, the data should be auditable by the customer to verify the data’s accuracy, reliability and validity.
Acceptable performance.
This item specifies the minimum level of service that must be provided, and it answers the question, “What do we want from the provider for this particular service?” It flows from and is directly related to the customer’s objectives under the contract. In the cloud, many SLAs are expressed in terms of availability. For example, a SaaS provider may commit to an application availability of 99.5%.
Scalability
Many SLAs are designed to meet the needs of the customer at the time of signing, but we all know organizations can change dramatically in size over time. Make sure the SLA details intervals for reviewing a contract so that if our organization grows larger, our cloud capacity can grow with it (and if our organization happens to grow smaller, we’ll want the option to reduce capacity; no sense it paying for unused capacity).
Customer responsibilities
The SLA is a contract that outlines responsibilities that both the provider and customer agree to. Our cloud provider needs to inform us of what we’re liable for when we enter the agreement. It could be its own section or sprinkled throughout the agreement, but it must tell us what’s expected of us. Make sure we mull over the entirety of the SLA to know what our provider will manage and what we nee ...
Pricing Models for Cloud Computing Services, a SurveyEditor IJCATR
Recently, citizens and companies can access utility computing services by using Cloud Computing. These services such as
infrastructures, platforms and applications could be accessed on-demand whenever it is needed. In Cloud Computing, different types of
resources would be required to provide services, but the demands such as requests rates and user's requirements of these services and
the cost of the required resources are continuously varying. Therefore, Service Level Agreements would be needed to guarantee the
service's prices and the offered Quality of Services which are always dependable and interrelated to guarantee revenues maximization
for cloud providers as well as improve customers' satisfaction level. Cloud consumers are always searching for a cloud provider who
provides good service with the least price, so Cloud provider should use advanced technologies and frameworks to increase QoS, and
decrease cost. This paper provides a survey on cloud pricing models and analyzes the recent and relevant research in this field.
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docxjeanettehully
RUNNING HEAD: Intersession 6 Final Project Projection 1
Intersession 6 Final Project Projection 5
Intersession 6 Final Project Projection
Shalini Kantamneni
Ottawa University
Intersession 6 Final Project Projection
The policies and service agreements
The acceptable use policy issued by the cloud service provider should restrict the use of his resources in unlawful and fraudulent activity. The cloud service provider is to maintain an extensive profile of the activities of the cloud service customer through logging to comply with the government's needs for auditing. The cloud service customer is to strictly abide by this policy for secure computing.
The processing of personal data by both the cloud service customer and the cloud service provider should portray compliance to the GDPR data protection standard (Surbiryala, Agrawal & Rong, 2018). Both parties are to be tasked with ensuring that the processing practices are in line with this and other laws that advocate for data protection. It is upon the cloud service customer to ensure that these laws and regulations are abided by and that the roles and responsibilities that are derived from an agreement between him and the cloud service provider do not hamper his plan.
The payment will be expected based on a pay-as-you-go schedule. The cloud service customer is to identify the services and architecture which he would require from the cloud computing environment and set these components apart from those he would not require. Charges are to be calculated based on the set of architecture utilized and the period within which the selected architecture is dedicated to his use.
The cloud service provider holds the privilege of temporarily suspending cloud services issued to a cloud service customer in the case that there are security risks, there is the delay in payments and if there is the abnormal use of cloud services that contradicts the agreement for fair use. It is the responsibility of the cloud service customer to ensure that he strictly abides by the agreement with the cloud service provider on the terms of use and the right of the cloud service provider to consistently monitor the activities of the cloud service customer to ensure compliance to this agreement.
The cloud service provider also holds the privilege of terminating or closing a cloud service customer’s account in the case that the cloud service customer does not commit himself to the sets of agreements made with the cloud service provider. The cloud service provider is to issue warnings that lead to temporary suspension before a notification is issued prior to account termination in the case that there are no changes after the temporary suspension.
The indemnification policy immunizes the cloud service provider from any sorts of claims issued by the cloud service customer that connects the cloud service provider to instances of damage or loss. It is the responsibility of the cloud service customer to ensure his compl ...
The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers,
Infrastructure / resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing these services. Our proposed framework for generic cloud collaboration allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. This framework supports universal and dynamic collaboration in a multicloud system. It lets clients simultaneously use services from multiple clouds without prior business agreements among (CSP) cloud service providers, and without adopting common standards and specifications.
Cloud computing is basically storing and accessing data and sharing resources over the internet rather than having local servers or personal device to handle applications.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
For the past few years, the evolution of cloud computing has been potentially becoming one of the major advances in the history of computing. But is cloud computing the saviour of business? Does it signal the demise of the corporate IT functionality entirely? However, if cloud computing has to achieve its potential, there is a need to have a clear understanding of various issues involved, both from the perspectives of the providers and the consumers related to the technology, management and business aspects. Objective of this research is to explore the strategic business, management and technical challenges existing in cloud
systems. It is believed that adopting a methodology and suggesting a corresponding architectural framework would serve as a potential comprehensive conceptual tool, which shows path for mitigating challenges and hence effort are put in bringing in by mentioning a suitable methodology and its brief description. It concludes that International Business Machine Common Cloud Management Platform is one
way to realize the combined features of various models such as Hub & Spoke Model as a quality of Governance model; Gen-Spec Research Methodology design for semantic and quality research studies into one in the form of Reference Architecture. However in order to realize the full potential of the Customer- Respond-Adapt-Sense-Provider (conceptual) methodology for dealing with semantics, it is important to
consider Internet of Things Architecture Reference Model where in the resources are translated into Services.
Similar to Dynamic Service Level Agreement Verification in Cloud Computing (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Dynamic Service Level Agreement Verification in Cloud Computing
1. Dynamic Service Level Agreement verification
in Cloud Computing
Shireen Akter, Md Whaiduzzaman
Institute of Information Technology
Jahangirnagar University
{shireenmukta019@gmail.com, wzaman@juniv.edu}
Abstract-In the present atmosphere of tighter budgets and pressure on resources, many public sector organiza-
tions, including local authorities, are outsourcing services to outer organizations under service level agreements in
cloud computing. Cloud computing is an approach to convey facilitated benefits over the web. Services are available to the
users relying upon cloud arrangement and the Service Level Agreement (SLA) between the service providers and the cli-
ents. Service level agreements are being utilized inside associations, directing connection between various sections of the
association. It requires a commitment from both parties to support and adhere to the agreement in order for the SLA to
work effectively. In spite of the fact that it gives a straightforward view about the cloud condition, such as cloud services,
cloud distribution, security issues, responsibilities, agreements and warranties of the services. However, there are several
issues occur from incorrect SLA which can cause misunderstanding among service providers and clients. SLA checking
device confirm the SLA effectively whether it deals with all administrations as per SLA. In this paper, we represent a SLA
confirmation and checking process that can distinguish SLA verification in gathering the information. We consider IaaS
(Infrastructure as a Service) parameters for SLA verification in Cloud.
I. INTRODUCTION
Almost the entire telecommunication operators industry had been invested in large data centers. These investments
were done in order to satisfy, amongst others, growing customer requirements. However, these data centers are not
very flexible and their operation and maintenance cost is important [1]. Therefore, to reduce data centers overall cost,
large organizations have started moving to Cloud Computing, as Cloud Computing user or providers[2]. Cloud com-
puting is an emerging trend for the provision of IT infrastructure as services, with the potential of transforming
the way of offering business services and software development to become prominent and accessible for all
without the hassle of investing in expensive hardware resources nor of managing and maintaining them [3].
One of the principle parts of utilizing cloud services is the Service Level Agreement (SLA) that works as a contractual
document between the cloud providers and their customers. A SLA is a document that includes a description of
the agreed service, service level parameters, guarantees, and actions and remedies for all cases of violations[4] .
Cloud SLA expresses a few measurements and parameters that must be implemented by the cloud providers or con-
sumers[5]. If any contractual company fails to meet any SLA requirements, that party commits a violation and is
obligated to pay some punishment according to the SLA. SLA’s can help to provide a clear framework for service
delivery, monitor performance and service quality and support continuous improvement [6]. The run of the mill SLA
measurements incorporate memory estimate, CPU speed, stockpiling size, organize data transfer capacity, and frame-
work uptime and bundle misfortune. A SLA fills in as the reason for the normal level of services obtained from the
Cloud Service Provider (CSP) [7] . The bill that a client pays to the CSP is firmly related with the SLA. A CSP is a
benefit based organization. It has the motivator to undermine SLA. For instance, a CSP may give less memory to a
client, which permits the CSP to help more clients and make more benefits [8]. There are an extremely restricted
method for measuring the SLA parameters. Generally this SLA seem each time client utilizes the cloud services.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
183 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. However, typically clients or organizations not read the SLA completely [9]. Because of that, service provider can
state any good specification but in reality the service not perform as good as they mention in the SLA. The service
provider unfit to confirm and approve the right administrations or capacities that asked for from customer in distributed
computing by following the SLA. The cloud benefits continually managing the verification of the SLA[10] .
In this paper we build up a SLA checking instrument with that confirm whether the SLA works accurately or not. We
propose an architectural design where Core monitoring layer deal with Infrastructure as a Service (IaaS) .The gathered
information at the Data Collector Layer send to the Service Monitoring Layer. It gathers information from the different
administrations and send to the low level marker. The actual attributed that had been filter from the data collector.
Then the real time data compare with the attributes value in SLA. If some of the attributes value in the SLA is violated
then the whole SLA is said to be invalid and unable to follow the contract. If the attributes in the SLA is not violated
then the SLA is valid and follow the contract.
The paper is organized as follows. The next section provides background about concept of Cloud Computing and SLA
compliance checking. Section 3 focuses on the SLA verification architecture we propose. Section 4 details the verifi-
cation technique and different parameters for IaaS. Section 5 presents an experimental output with different parameters
values. Section 6 presents a summary of the SLA related works. Finally, section 7 concludes this paper and gives
directions for future works.
II. BACKGROUND
A. Concept of Cloud Computing
Cloud computing is a next generation computing platform that helps the users to share the resources through com-
munication mediums. The greater part of the associations are running their applications in cloud since cloud gives
dependability, adaptability, elite, low transmission capacity. It causes the clients to share the assets through corre-
spondence mediums. It encourages the clients to share the assets through communication mediums. It refers to web
based improvement and services. Fig. 1 Shows concept of Cloud Computing and its characteristics.
Figure 1. Concept of Cloud Computing
According to National Institute of Standards and Technology (NIST) one of the most accepted definition of cloud
computing is [33], “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
184 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. shared pool of configurable computing resources that can be rapidly provisioned and released with minimal manage-
ment effort or service provider interaction”. European Community for Software and Software Services (ECSS) defines
“cloud computing as the delivery of computational resources from a location other than your current one”.
Because of progression in cloud data center architecture and virtualization procedure all most boundless storage will
be given to the registered clients. Along these lines, the cloud clients won't need to be stressed over the constrained
storage spaces. Fundamentally, Cloud computing permits the clients and enterprises with different abilities to store
and process their information in either exclusive cloud, or on an outsider server keeping in mind the end goal to make
information getting to systems substantially more simple and dependable. Data centers that might be situated a long
way from the user–ranging in remove from over a city to over the world. Cloud computing depends on sharing of
assets to accomplish intelligibility and economy of scale, like a utility (like the power matrix) over a power arrange.
It gives IaaS, Platform as a Service (PaaS), and Software as a Service (SaaS) and Storage as a Service.
B. SLA Compliance Checking
SLA Compliance Checking includes a target service and a system in charge of collecting monitoring information
and verifying SLAs compliance. The target service offers probes and its usage is contractualized with at least one SLA
(based on information that can be obtained through the probes). The SLAs compliance verification system takes as
input information concerning the target service as well as at least one SLA, and produces Service Level Checking
(SLC) results about the SLA compliance, SLA violation or errors occurred during the verification or information
collection points. The target service can include software, platforms and/or infrastructure, or can even be a Cloud
system itself.
The implementation of the SLA Compliance checking module, contained in the Service Monitoring Layer. It is made
out of three segments : the Alert manager, the Log that stores and persists the SLC results produced by the Alert
manager in log files, the SLA manager. The result provided by the SLA compliance checking can be used to inform
the target service administrator, make decisions service reconfiguration, select service providers at runtime, launch an
autonomic circle, and terminate a contract.
III. SLA VERIFICATION MODEL
The compositional example we propose is a three layer design including the Core Monitoring layer, the Data Collector
layer and the Service Monitoring layer. The most minimal layer in this design is the Core Monitoring layer. This Core
Monitoring layer manage IaaS. This layer gather information from different administration tests and collaborate with
each other's. At that point send information to the low level markers. Such low level pointers speak to a perspective
of the objective administration. This low-level pointers speak to a perspective of the objective administration. Han-
dling can appear as information collection, change, improvement, corruption, relationship, synchronization and so on.
The indicator values created are then exchanged from the core monitoring to the Data Collector layers.
The Data Collector layer is the middle person level of the example. The Data Collector layer will connect with both
the Core Monitoring and the Service Monitoring layers. The Data Collector is an apparatuses where taking the info
which is the low level markers that was delivered by the Core Monitoring layer. These indicators are then prepared
keeping in mind the end goal to acquire esteems comparing to more elevated amount business pointers. Such abnormal
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
185 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. state markers characterize an arrangement of Service Level Objectives (SLO) which can be indicated in the SLAs
identified with the objective administration. All the need information enter the Service Monitoring to prepared. All
the required information in light of the SLA characteristics that most every now and again expressed in numerous
SLA.
Figure 2. SLA verification architecture.
The Service Monitoring layer is the upper layer of this proposed engineering. At that point the information send to
Service Monitoring for SLA checking. Once the information enter the SLA checking instruments, the information
confirmation process initiate. The check procedure is a procedure where the information got from Data Collector layer
(ongoing information) are being contrasted and the information that expressed in the Service Level Agreement by
utilizing the correlation strategy. In the event that the got information is coordinate with the SLA esteem then the
outcome demonstrate "Ok". In any case, if the information is not coordinate then the outcome indicate "Violate".
IV. VERIFICATION
CSP is very powerful and has complete control of its resources, such as physical machines, hypervisors, VMs etc. It
is a challenging task to detect SLA violations by an untrusted cloud. Violations occur at several SLA metrics such as
memory size, CPU speed, storage size, network bandwidth, and system uptime and packet loss. If a user agreements
a VM (denoted as VM1) with 3GB physical memory, the cloud may allocate less but sufficient memory (may be less
than 3GB). However, when the applications require more memory, the cloud will satisfy VM1 immediately, up to the
maximum value (3GB). The above behaviour is considered normal and the SLA is satisfied. Violation happen when
VM1 is specified with 3GB physical memory in the SLA. When VM1 is running, the hypervisor also tells VM1 (and
the user) that its maximum memory is 3GB. However, the hypervisor sets the actual maximum memory of VM1 to
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
186 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. 2.5GB, which means that VM1 will never get more than 2.5GB no matter how many processes are running. Thus,
when the workload increases, the computations will spend more time than should be in VM1. As a result, all the
computations in VM1 suffer from performance degradations.
The actual value that collected from the Data collector layer (Av) compare to the SLA value (Sv) from the cloud
services. Therefore, to verify the SLA let us introduce the following possibilities of outcome:
H1: Actual value (Av) >= SLA value (Sv)
H2: Actual value (Av) < SLA value (Sv)
If H1 occurs then the SLA is correct and follows the SLA rules in cloud services.
If H2 occurs then the SLA is incorrect and might be violated.
For verification results in tool provided can be used to inform the target service administrator to make decisions
regarding reconfiguration of the service or terminate a contract. Client also will get the notification of about
the services whether the services follow the SLA or not. This main target of this research is to analyst whether the
cloud services provided is following the contract or not. It is very important in terms of reliability, security and avail-
ability. This verification process occurs dynamically in the background. Randomly informs the cloud users and cloud
service provider. In this paper we use SLA attributes for IaaS. The SLA parameters are determined based on proposed
framework from . Here, we determined the most frequent attributes that applied in SLA. Table I shows the SLA
parameters for IaaS.
TABLE I
SLA PARAMETERS FOR IAAS
Parameters Description
CPU capacity (Cp) CPU speed for VM
Memory size (Mp) Size Cash memory size for VM
Storage (Sp) Storage size of data for short or long term of contract
Scale up (SUp1) Maximum of VMs for one user
Scale down (SDp2) Minimum number of VMs for one user
Scale up time (SUTp) Time to increase a specific number of VMs
Scale down time (SDTp) Time to decrease a specific number of VMs
Response Time (RTp) Time to complete and receive the process
Load Balance (LBp) When elasticity kicks in
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
187 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. V. EXPERIMENTAL PROCESS AND OUTPUT
We now present performance results related to the validation in the orbit Virtualization development environment.
This development environment performs the operations by various servers to analysis data by displaying tables, graphs
or statistics. Our initial experiment is focused on the number of customers get services from cloud in the cloud envi-
ronment.
Core monitoring layer collect data from cloud and sent to the data collector layer. The Data Collector layer then
compute the latency values from different provider and client and the report is then send to the Service Monitoring
layer which contains the SLC itself. This latter then checks report received with actual values of SLA in order to
produce the violation results. All the value collected from the data collector layer apply to the SLA checking tools.
Data collected in the following steps:
Contacting and collecting data from the probes in order to produce a raw report
Sending this raw report to Data Collector,
Processing and adapting the report,
Sending the processed report to Service Monitoring,
SLA Compliance Checking itself,
And sending the SLC results to the Cloud
We determined several values for 9 SLA parameters. Fig. 3, 4 and 5 show the CPU capacity, storage, scale up, scale
down and response time values with continuous time. In Fig. 3 we have seen that for different SLA parameters load
values changes per minutes. Load value has increased at high time.
Figure 3. CPU speed and usage of storage varies with time.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
188 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. We consider the parameters value at several load such as heavy load, average load and low load. Load values varies
in different situations such as no. of customer, availability of resources, and usage of CPU at different time. Fig. 6
demonstrate that all the average times spent are very low. The green diagram demonstrates comes about acquired
when just "OK" SLC comes about are delivered, while the yellow chart indicates comes about got when SLC produces
one "Violation" and some "Ok". As it can be seen, every one of the circumstances spent are low when just 1 pertinent
SLA is included to almost 1 second when 7 important SLAs are included. Of course, the normal time stays low and
develops with the quantity of SLAs included. As an update, each report got by the SLC is checked with all the signif-
icant SLAs and each pertinent SLA prompts the outflow of a SLC result notice.
Figure 4. Scale up and down varies with time.
Figure 5. Response Time varies with time.
Figure 6. Average time spent according to the number of SLA involved.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
189 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. Below Fig. 7, 8 shown the result for verify the SLA for cloud services. The actual value that collected from the data
collector layer compare to the SLA values from the cloud services. Then the verification process works at different
load values for SLA parameters.
Figure 7. Comparison results between SLA values and actual values in heavy and average load
Figure 8. Comparison results between SLA values and actual values in low load
Based on the fig 7, 8 it is clearly shown that if the actual value lower than the SLA value then the SLA is violated. In
heavy load, it is shown that there have 4 violated SLA and 9 with not violated.so, here maximum SLA’s are violated
and follow the contract. In average load, it is shown that maximum SLA‘s values are higher than actual value. The
verification results are used to inform the target service administrator to make decisions regarding reconfiguration or
to terminate a contract. This result also notify the clients.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
190 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. VI. LITERATURE REVIEW
The analysis of existing solutions for SLA Compliance Checking shows that proposed architectures are monolithic.
By monolithic, we mean that the checking module is itself in charge of calling the probes and collecting the infor-
mation, but also that information collected is generally not processed. Examples of such architectures include:
MoDe4SLA (University of Twente), WSLA Framework (IBM Research Division), work of Layer7 Technologies ,
WSOM framework (Peking University), works of HP Labs and of Technical University of Catalonia . Proposed data
mediation approach which requires the strict definition of data and associated data formats exchanged at each layer.
We propose an architectural pattern which contain three layers. Data collector layer contacting and collecting data
from the probes in order to produce a raw report. The Data Collector layer enables the progressive constructions of
indicators at various abstraction levels, and their sharing. The report is then send to the Service Monitoring layer which
contains the SLC itself. This latter then checks report received with actual values of SLA in order to produce the
violation results. All the value collected from the data collector layer apply to the SLA checking tools. Finally, we see
that the Data Collector layer can also be used to collect and synchronize/correlate data coming from several instances
of Core Monitoring in the case in the orbit virtualization environment. This approach we follow requires the restrict
definition of data and associated data formats exchanged at each layer.
VII. CONCLUSION
In this paper we have presented an innovating architecture for Service Level agreement compliance checking that has
been applied to the cloud computing context. We proposed three layers are Core Monitoring layer, Data Collector
layer and Service Monitoring layer which produced lower response time in collecting data. It provides a flexible way
to verify the SLA is violated or not. We consider IaaS parameters value in our work. If the SLA is violated then the
result should be invalid and the SLA is not following the contract. If the SLA is not violated then the results is valid
and the SLA is follow the contract. This check result at that point used to advise the objective administration organi-
zation to settle on choices with respect to reconfiguration or to end an agreement. This outcome additionally have
gone to customer for warning reason.
REFERENCES
1. Whaiduzzaman, M., et al., Cloud service selection using multicriteria decision analysis. The Scientific World
Journal, 2014. 2014.
2. Whaiduzzaman, M., A. Gani, and A. Naveed, TOWARDS ENHANCING RESOURCE SCARCE CLOUDLET
PERFORMANCE IN MOBILE CLOUD COMPUTING. Computer Science & Information Technology: p. 1.
3. Ahmed, E., et al., Network-centric performance analysis of runtime application migration in mobile cloud
computing. Simulation Modelling Practice and Theory, 2015. 50: p. 42-56.
4. Whaiduzzaman, M., et al., A study on strategic provisioning of cloud computing services. The Scientific
World Journal, 2014. 2014.
5. Whaiduzzaman, M. and A. Gani. Measuring security for cloud service provider: A Third Party approach. in
Electrical Information and Communication Technology (EICT), 2013 International Conference on. 2014.
IEEE.
6. Qi, H., et al., Sierpinski triangle based data center architecture in cloud computing. The Journal of
Supercomputing, 2014. 69(2): p. 887-907.
7. Shiraz, M., M. Whaiduzzaman, and A. Gani, A study on anatomy of smartphone. Computer Communication
& Collaboration, 2013. 1(1): p. 24-31.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
191 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
10. 8. Whaiduzzaman, M., A. Naveed, and A. Gani, MobiCoRE: Mobile device based cloudlet resource
enhancement for optimal task response. IEEE Transactions on Services Computing, 2016.
9. Whaiduzzaman, M., et al., A survey on vehicular cloud computing. Journal of Network and Computer
Applications, 2014. 40: p. 325-344.
10. Nasir, M.K. and M. Whaiduzzaman, Use of cell phone density for Intelligent Transportation System (ITS) in
Bangladesh. Jahangirnagar University Journal of Information Technology, 2012. 1: p. 49-54.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
192 https://sites.google.com/site/ijcsis/
ISSN 1947-5500