SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 383
SURVEY ON RELIABLE SLA-BASED MONITORING FOR BILLING
SCHEME IN CLOUD COMPUTING
Neha Ramesh Dodke1
, Sweta Kale2
1
M.E Student, Dept. of Information Technology, RMD Sinhgad school of Engineering, Maharashtra, India
2
Asst. Professor, Dept. of Information Technology, RMD Sinhgad school of Engineering, Maharashtra, India
Abstract
The facility to record and keep report of the usage of cloud resources in reliable and certifiable manner is a pioneer to both cloud
service provider and to users too. Because usage information is potentially susceptible and must be verifiably correct. This is
critical job because in an attempt to provide mutually integrated approach to the system, we come to know that computational
overhead increase due to use of traditional asymmetric key operations which lead the system bottleneck. The success of any
billing system depends upon factors like integrity, non repudiation. The traditional billing systems are restricted in the security
capabilities. To overcome this drawback, paper introduces the billing system called THEMIS. This new billing system introduces
some new attributes which provides security facilities to the billing transactions. This system brings new concept called Cloud
Notary Authority (CNA) which administer the billing transactions and make it good enough to accept by users and cloud service
provider. The Cloud Notary Authority generates the binding information which helps system to solve the future conflicts between
users and cloud service provider. SLA (service level agreement) monitoring approach is introduced to provide forgery resistance
which doesn’t allow to modify the information even by supervisor of the cloud service provider. The service level agreement
monitoring approach is improved with TPM (Trusted Platform Module) which sort the information in very secure manner.
Keywords - Cloud Notary Authority, Cloud server provider, verification, transaction processing, resource allotment.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing technology is service oriented technology
which define as a type of computing that is based on sharing
of resources instead of having confide server, private device
to administer the application. In cloud computing, the word
cloud refers for the internet and hence this technology also
called as Internet based technology. Major cloud providers
such as Amazon EC2, S3 [2], Microsoft Azure [3] are
becoming popular in current years.
Cloud server provider (CSPs) follows pay-as-you-use
mechanism, where users or tenants pay only for the
resources that they essentially utilized. This Pay-as-you-use
evaluation technique is the chief constitute of cloud
environment. CSPs generally assures about the quality of
the service in the form of service level agreement (SLA) [4].
SLA is an intermediate between tenants and cloud service
provider. It monitors quality of service (QoS) and also
defends against forgery and fallacious alteration in data.
Although cloud service provider keep track of service
billing records but they fails to provide reliability and
sureness. It is because tenants or CSPs can modify the
records for achieving the trustworthiness even third party
can’t assure that weather tenant’s record is correct or CSPs
record is correct. Along with this problem, the capability to
record and keep track of usage of cloud resources in
acceptable and verifiable way has also become difficult for
cloud service provider and users too. Every billing system or
transaction must have integrity and no repudiation. The
success of such billing system based on these two
components. For crystal clear billing, each billing
transaction should be prevented against any fraud and false
modification. To provide trusted billing system in cloud
environment is somewhat tedious for CSPs and tenants [5].
Thus system must be non obstructive and have minimum
computation complexity. This paper proposes safe and
unthreatened billing scheme called THEMIS. To defeat
these drawbacks, THEMIS devised three mechanism namely
support for mutually verifiable billing information, trusted
SLA monitoring and reduction of computational overhead.
The propose system also minimises the expensive public
key infrastructure (PKI) [8] computations without weaken
the security level of the PKI.
In this paper the billing scheme brings the concept of cloud
Notary Authority (CNA) for monitoring the billing
transaction. The CNA generates mutually verifiable
integrated information which can be used to fix the future
controversy between users and CSPs. The system assembles
such billing by supervising the service level agreement with
the help of S-Mon module. S-Mon has forgery resistive
mechanism and it also keeps the track of service logs.
2. LITERATURE SURVEY
2.1 Billing System with Inadequate Security
Concerns
Many researchers studied system like Tivoli [6] for keeping
logs of used resources. But these systems only focuses on
resource usage rather than security concerns hence they
can’t provide integrated transaction. Again these systems
designed only for distributed grid surroundings not for pay-
as-you use approach.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 384
2.2 Security Improved Billing System
Several e-payment schemes such as NetPay [7] have been
proposed in related work to provide improved billing
system. These schemes help users to perform their payment
conveniently. However it can’t support security features
because the systems basically designed only for transaction
integrity rather than other main security features.
3. THE SYSTEM FRAMWORK
The system THEMIS [1] contains four main components:
3.1 Cloud Service Provider (CSP)
The CSPs follows pay-as-you-use mechanism which means
user can consumes as many resources as he need and pay
only for resources he consumed.
3.2 Users
Users also refer as tenants are the thin clients who use
resources, services in cloud environment. Each send Check-
in message to CSP to start the session and Check-out
message to end the session.
3.3 Cloud Notary Authority (CNA)
The CAN provides agreeably valid integrity approach that
prevents the malicious behaviour of the user or CSP.
Whatever information generated by CAN used to solve the
future disputes between users and CSPs. For doing so one-
way hash chain technique is used.
Fig -1: The System Framework
3.4 S-Mon
For providing transparent and secure billing transaction in
cloud environment service level agreement (SLA) is being
monitored by S-Mon. S-Mon offers falsification free SLA
monitoring and also keeps track of records of service logs.
CNA can get these service logs from S-Mon and stores it in
repository for future use. With such system, even administer
of CSP can’t alter or counterfeit the data.
4. OVERALL BILLING PROCESS
In the system architecture, billing transaction can be
performed in two kinds of service message namely check-in
and check-out. Service check-in message is for initialization
of cloud service and service check-out is for termination of
the cloud service.
The main steps are as follows:
 User produces service check-in or check-out
message and send it to cloud service provider.
 CSP send micro-contract-CSP as a digital signature
to user using CSP hash chain.
 By using user’s hash chain, users generates digital
signature and combine it with CSP’s digital
signature and send it to CAN.
 CNA authenticate the digital signature from user and
CSP and generate integrated binding information
 Once CNA send acknowledgment to user and CSP,
the billing process is completed.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 385
 Lastly according to the service check-in or check-
out message, S-Mon sends reports of SLA
monitoring to the CNA.
Basically propose billing protocol works in three main steps
namely mutually authentication, Hash chain generation and
registration, Billing Transaction.
Fig -2: Overall Billing System
As shown in figure 2 the billing protocol works as follows:
 In first state, PKI based operation are performed by
the users, CSP and CAN. Throughout mutual
verification user, CSP and CNA share the keys.
 The second state is used to generate final hash user
and CSP generate the hash chain of length N Using
hash function. By digitally signing this final hash
they register themselves and key for getting verified
by Cloud Notary Authority.
 In this third state, user and CSP generate micro-
contract message send it to CNA. Once CNA
acknowledged them the contract between user and
CSP get terminated successfully.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 386
5. CONCLUSION
Our main goal was to provide integrated and secure billing
solution for the traditional system. To achieve this goal, we
have studied THEMIS billing system which decreases the
computational overhead by eliminating the PKI based
billing transaction without making any damage to security
level of the system. Incorporation with CNA and S-Mon
concept billing system easily keep track of logged data and
supervise the transactions.
ACKNOWLEDGEMENTS
I would like to extend my gratitude to many people who
helped me to bring this paper fruition. First I would like to
thank my guide Prof. Sweta Kale. I am so deeply grateful
for her help, professionalism, and valuable guidance
throughout this paper. I would also like to thank to my
friends and collage. This accomplishment would not have
been possible without them.
REFERENCES
[1]. Ki-Woong Park , Jaesun Han and Kyu Ho Park,
“THEMIS: A Mutually Verifiable Billing System for the
Cloud Computing Environment,” IEEE TRANSACTION
ON SERVICES COMPUTING, VOL. 6, NO.3, JULY-
SEPTEMBER 2013.
[2]. Amazon Web Services, “Amazon Elastic Compute
Cloud EC2, Simple Storage Service,
“http://aws.amazon.com/ec2, http://aws.amazon.com/s32,
Apr. 2011.
[3]. Microsoft, “Microsoft, Windows Azure Platform,”
http://www.microsoft.com/windowsazure, 2010
[4]. M. Armbrust and A.E. Fox, “Above the Clouds: A
Berkeley View of Cloud Computing,” Technical Report
UCB/EECS-2009-28, Electrical Engineering and Computer
Sciences Dept., Univ. of California, Berkeley, Feb. 2009.
[5]. N. Santos, K.P. Gummadi, and R. Rodrigues,
“TowardsTrusted Cloud Computing,” Proc. Conf. Hot
Topics inCloud Computing (HotCloud), 2009.
[6] “Tivoli: Usage and Accounting Manager,” IBM press
release, 2009.
[7] X. Dai and J. Grundy, “NetPay: An Off-Line,
Decentralized Micro-Payment System for Thin-Client
Applications,” Electronic Commerce Research Applications,
vol. 6, pp. 91-101, Jan. 2007.
[8]. G. von Voigt and W. Muller, “Comparison of Grid
Accounting Concepts for D-Grid,” Proc. Cracow Grid
Workshop, pp. 459-466, Oct. 2006
BIOGRAPHIES
Neha Ramesh Dodke has completed
bachelor degree from sant. Gadage baba
Amravati University and now M.E
Student at RMD Sinhgad school of
Engineering, Pune,Maharashtra, India
Sweta Kale, Dept. of Information
Technology, Working at RMD
Sinhgad school of Engineering, Warje
Savitribai Phule, Pune university,
Maharashtra, India

More Related Content

What's hot

An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...IJCSIS Research Publications
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsAhmed Hammam
 
Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...saidzaghloul
 
Paper id 25201464
Paper id 25201464Paper id 25201464
Paper id 25201464IJRAT
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET Journal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 

What's hot (10)

W4502140150
W4502140150W4502140150
W4502140150
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...
 
REPORT1 new
REPORT1 newREPORT1 new
REPORT1 new
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
As4301234238
As4301234238As4301234238
As4301234238
 
Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...
 
Paper id 25201464
Paper id 25201464Paper id 25201464
Paper id 25201464
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 

Similar to Survey on reliable sla based monitoring for billing scheme in cloud computing

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 
Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudeSAT Journals
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Publishing House
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Journals
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networkseSAT Journals
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
IRJET- Blockchain Technology in Supply Chain Management: A Review
IRJET-	 Blockchain Technology in Supply Chain Management: A ReviewIRJET-	 Blockchain Technology in Supply Chain Management: A Review
IRJET- Blockchain Technology in Supply Chain Management: A ReviewIRJET Journal
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 

Similar to Survey on reliable sla based monitoring for billing scheme in cloud computing (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloud
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networks
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
IRJET- Blockchain Technology in Supply Chain Management: A Review
IRJET-	 Blockchain Technology in Supply Chain Management: A ReviewIRJET-	 Blockchain Technology in Supply Chain Management: A Review
IRJET- Blockchain Technology in Supply Chain Management: A Review
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Survey on reliable sla based monitoring for billing scheme in cloud computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 383 SURVEY ON RELIABLE SLA-BASED MONITORING FOR BILLING SCHEME IN CLOUD COMPUTING Neha Ramesh Dodke1 , Sweta Kale2 1 M.E Student, Dept. of Information Technology, RMD Sinhgad school of Engineering, Maharashtra, India 2 Asst. Professor, Dept. of Information Technology, RMD Sinhgad school of Engineering, Maharashtra, India Abstract The facility to record and keep report of the usage of cloud resources in reliable and certifiable manner is a pioneer to both cloud service provider and to users too. Because usage information is potentially susceptible and must be verifiably correct. This is critical job because in an attempt to provide mutually integrated approach to the system, we come to know that computational overhead increase due to use of traditional asymmetric key operations which lead the system bottleneck. The success of any billing system depends upon factors like integrity, non repudiation. The traditional billing systems are restricted in the security capabilities. To overcome this drawback, paper introduces the billing system called THEMIS. This new billing system introduces some new attributes which provides security facilities to the billing transactions. This system brings new concept called Cloud Notary Authority (CNA) which administer the billing transactions and make it good enough to accept by users and cloud service provider. The Cloud Notary Authority generates the binding information which helps system to solve the future conflicts between users and cloud service provider. SLA (service level agreement) monitoring approach is introduced to provide forgery resistance which doesn’t allow to modify the information even by supervisor of the cloud service provider. The service level agreement monitoring approach is improved with TPM (Trusted Platform Module) which sort the information in very secure manner. Keywords - Cloud Notary Authority, Cloud server provider, verification, transaction processing, resource allotment. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing technology is service oriented technology which define as a type of computing that is based on sharing of resources instead of having confide server, private device to administer the application. In cloud computing, the word cloud refers for the internet and hence this technology also called as Internet based technology. Major cloud providers such as Amazon EC2, S3 [2], Microsoft Azure [3] are becoming popular in current years. Cloud server provider (CSPs) follows pay-as-you-use mechanism, where users or tenants pay only for the resources that they essentially utilized. This Pay-as-you-use evaluation technique is the chief constitute of cloud environment. CSPs generally assures about the quality of the service in the form of service level agreement (SLA) [4]. SLA is an intermediate between tenants and cloud service provider. It monitors quality of service (QoS) and also defends against forgery and fallacious alteration in data. Although cloud service provider keep track of service billing records but they fails to provide reliability and sureness. It is because tenants or CSPs can modify the records for achieving the trustworthiness even third party can’t assure that weather tenant’s record is correct or CSPs record is correct. Along with this problem, the capability to record and keep track of usage of cloud resources in acceptable and verifiable way has also become difficult for cloud service provider and users too. Every billing system or transaction must have integrity and no repudiation. The success of such billing system based on these two components. For crystal clear billing, each billing transaction should be prevented against any fraud and false modification. To provide trusted billing system in cloud environment is somewhat tedious for CSPs and tenants [5]. Thus system must be non obstructive and have minimum computation complexity. This paper proposes safe and unthreatened billing scheme called THEMIS. To defeat these drawbacks, THEMIS devised three mechanism namely support for mutually verifiable billing information, trusted SLA monitoring and reduction of computational overhead. The propose system also minimises the expensive public key infrastructure (PKI) [8] computations without weaken the security level of the PKI. In this paper the billing scheme brings the concept of cloud Notary Authority (CNA) for monitoring the billing transaction. The CNA generates mutually verifiable integrated information which can be used to fix the future controversy between users and CSPs. The system assembles such billing by supervising the service level agreement with the help of S-Mon module. S-Mon has forgery resistive mechanism and it also keeps the track of service logs. 2. LITERATURE SURVEY 2.1 Billing System with Inadequate Security Concerns Many researchers studied system like Tivoli [6] for keeping logs of used resources. But these systems only focuses on resource usage rather than security concerns hence they can’t provide integrated transaction. Again these systems designed only for distributed grid surroundings not for pay- as-you use approach.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 384 2.2 Security Improved Billing System Several e-payment schemes such as NetPay [7] have been proposed in related work to provide improved billing system. These schemes help users to perform their payment conveniently. However it can’t support security features because the systems basically designed only for transaction integrity rather than other main security features. 3. THE SYSTEM FRAMWORK The system THEMIS [1] contains four main components: 3.1 Cloud Service Provider (CSP) The CSPs follows pay-as-you-use mechanism which means user can consumes as many resources as he need and pay only for resources he consumed. 3.2 Users Users also refer as tenants are the thin clients who use resources, services in cloud environment. Each send Check- in message to CSP to start the session and Check-out message to end the session. 3.3 Cloud Notary Authority (CNA) The CAN provides agreeably valid integrity approach that prevents the malicious behaviour of the user or CSP. Whatever information generated by CAN used to solve the future disputes between users and CSPs. For doing so one- way hash chain technique is used. Fig -1: The System Framework 3.4 S-Mon For providing transparent and secure billing transaction in cloud environment service level agreement (SLA) is being monitored by S-Mon. S-Mon offers falsification free SLA monitoring and also keeps track of records of service logs. CNA can get these service logs from S-Mon and stores it in repository for future use. With such system, even administer of CSP can’t alter or counterfeit the data. 4. OVERALL BILLING PROCESS In the system architecture, billing transaction can be performed in two kinds of service message namely check-in and check-out. Service check-in message is for initialization of cloud service and service check-out is for termination of the cloud service. The main steps are as follows:  User produces service check-in or check-out message and send it to cloud service provider.  CSP send micro-contract-CSP as a digital signature to user using CSP hash chain.  By using user’s hash chain, users generates digital signature and combine it with CSP’s digital signature and send it to CAN.  CNA authenticate the digital signature from user and CSP and generate integrated binding information  Once CNA send acknowledgment to user and CSP, the billing process is completed.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 385  Lastly according to the service check-in or check- out message, S-Mon sends reports of SLA monitoring to the CNA. Basically propose billing protocol works in three main steps namely mutually authentication, Hash chain generation and registration, Billing Transaction. Fig -2: Overall Billing System As shown in figure 2 the billing protocol works as follows:  In first state, PKI based operation are performed by the users, CSP and CAN. Throughout mutual verification user, CSP and CNA share the keys.  The second state is used to generate final hash user and CSP generate the hash chain of length N Using hash function. By digitally signing this final hash they register themselves and key for getting verified by Cloud Notary Authority.  In this third state, user and CSP generate micro- contract message send it to CNA. Once CNA acknowledged them the contract between user and CSP get terminated successfully.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 386 5. CONCLUSION Our main goal was to provide integrated and secure billing solution for the traditional system. To achieve this goal, we have studied THEMIS billing system which decreases the computational overhead by eliminating the PKI based billing transaction without making any damage to security level of the system. Incorporation with CNA and S-Mon concept billing system easily keep track of logged data and supervise the transactions. ACKNOWLEDGEMENTS I would like to extend my gratitude to many people who helped me to bring this paper fruition. First I would like to thank my guide Prof. Sweta Kale. I am so deeply grateful for her help, professionalism, and valuable guidance throughout this paper. I would also like to thank to my friends and collage. This accomplishment would not have been possible without them. REFERENCES [1]. Ki-Woong Park , Jaesun Han and Kyu Ho Park, “THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment,” IEEE TRANSACTION ON SERVICES COMPUTING, VOL. 6, NO.3, JULY- SEPTEMBER 2013. [2]. Amazon Web Services, “Amazon Elastic Compute Cloud EC2, Simple Storage Service, “http://aws.amazon.com/ec2, http://aws.amazon.com/s32, Apr. 2011. [3]. Microsoft, “Microsoft, Windows Azure Platform,” http://www.microsoft.com/windowsazure, 2010 [4]. M. Armbrust and A.E. Fox, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB/EECS-2009-28, Electrical Engineering and Computer Sciences Dept., Univ. of California, Berkeley, Feb. 2009. [5]. N. Santos, K.P. Gummadi, and R. Rodrigues, “TowardsTrusted Cloud Computing,” Proc. Conf. Hot Topics inCloud Computing (HotCloud), 2009. [6] “Tivoli: Usage and Accounting Manager,” IBM press release, 2009. [7] X. Dai and J. Grundy, “NetPay: An Off-Line, Decentralized Micro-Payment System for Thin-Client Applications,” Electronic Commerce Research Applications, vol. 6, pp. 91-101, Jan. 2007. [8]. G. von Voigt and W. Muller, “Comparison of Grid Accounting Concepts for D-Grid,” Proc. Cracow Grid Workshop, pp. 459-466, Oct. 2006 BIOGRAPHIES Neha Ramesh Dodke has completed bachelor degree from sant. Gadage baba Amravati University and now M.E Student at RMD Sinhgad school of Engineering, Pune,Maharashtra, India Sweta Kale, Dept. of Information Technology, Working at RMD Sinhgad school of Engineering, Warje Savitribai Phule, Pune university, Maharashtra, India