[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2428955.2429005acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective

Published: 03 December 2012 Publication History

Abstract

Cloud computing is a new paradigm for service-based computing and is gaining popularity. An efficient way for the assurances of the expected service levels in cloud computing is to establish a tailor-made Service Level Agreement (SLA) and to ensure the commitment of SLAs by service providers. In this paper, we conduct a survey of the state of the art in cloud SLA assurance from two aspects -- pre- and post-interaction phases, based on which research gaps in existing approaches are identified. New research requirements for SLA assurance are then presented.

References

[1]
A. Sahai, V. Machiraju, M. Sayal et al., Automated SLA monitoring for web services, in Proc. 13th IFIP/IEEE Intl. Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications, Canada, 2002, pp. 28--41.
[2]
O. Hussain, H. Dong, and J. Singh, Semantic similarity model for risk assessment in forming cloud computing SLAs, in Proc. Intl. Conf. on the Move to Meaningful Internet Systems: Part II, Greece, 2010, pp. 843--860.
[3]
J. Powell. Service Level Agreements Too IT-centric, Forrester Report Warns, October 12, 2012; http://esj.com/articles/2008/07/22/service-level-agreements-too-itcentric-forrester-report-warns.aspx.
[4]
L. Wu, and R. Buyya, Service Level Agreement (SLA) in Utility Computing Systems, Technical Report, The University of Melbourne, Australia, 2010.
[5]
W. A. Michalk, SLA Establishment Decisions: Minimizing the Risk of SLA Violations, Institut für Informationswirtschaft und -management (IISM) Karlsruher Institut für Technologie, 2011.
[6]
Y. Asnar, H. W. Lim, F. Massacci et al., Realizing trustworthy business services by a new grc approach, ISACA Journal, vol. 2, 26 Jan 2010.
[7]
C. Smith, and A. Moorsel, Mitigating provider uncertainty in service provision contracts, in Proc. Workshop on Economic Models and Algorithms for Grid Systems, USA, 2010, pp. 143--159.
[8]
J. Abdullah, and A. van Moorsel, Uncertainty and Uncertainty Tolerance in Service Provisioning, Technical report, vol. 1, Newcastle University, England, 2011.
[9]
F. Raimondi, J. Skene, and W. Emmerich, Efficient online monitoring of web-service SLAs, in Proc. 16th ACM SIGSOFT Intl. Symposium on Foundations of Software Engineering, 2008, pp. 170--180.
[10]
M. Comuzzi, C. Kotsokalis, G. Spanoudakis et al., Establishing and monitoring SLAs in complex service based systems, in Proc. IEEE Intl. Conf. on Web Services, USA, 2009, pp. 783--790.
[11]
G. Katsaros, G. Gallizo, R. Kübert et al., An Integrated Monitoring Infrastructure for Cloud Environments, Cloud Comput. and Services Science, Springer 2012, pp. 149--164.
[12]
T. Wood, P. Shenoy, A. Venkataramani et al., Sandpiper: Black-box and gray-box resource management for virtual machines, Computer Networks, vol. 53, no. 17, pp. 2923--2938, 2009.
[13]
V. C. Emeakaroha, I. Brandic, M. Maurer et al., Low level metrics to high level SLAs-LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in Cloud environments, in Proc. Intl. Conf. on High Perform. Comput. and Simulation, France, 2010, pp. 48--54.
[14]
K. Park, J. Han, and J. Chung, THEMIS: A Mutually verifiable billing system for the cloud computing environment, in Proc. IEEE 3rd Intl. Conf. on Cloud Computing, USA, 2012, pp. 139--147.
[15]
B. Balis, R. Slota, J. Kitowski et al., On-line monitoring of service-level agreements in the grid, in Proc. Intl. Conf. on Parallel Processing, Taiwan, 2012, pp. 76--85.
[16]
D. Daniel, and S. Jeno Lovesum, A novel approach for scheduling service request in cloud with trust monitor, in Proc. Intl. Conf. on Signal Process., Communicat., Comput. and Netw. Technol., India, 2011, pp. 509--513.
[17]
B. Ciciani, D. Didona, P. Di Sanzo et al., Automated workload characterization in cloud-based transactional data grids, in Proc. 26th IEEE Intl. Parallel and Distributed Processing Symposium - DPDNS Workshop, China, 2012, pp. 1525--1533.
[18]
RHQ. The RHQ project, October 12, 2012; http://www.rhq-project.org/.
[19]
H. Mathieu, and F. Biennier, A service level agreement management architecture to improve an information system, business processes administration and evolution, Schedae Informaticae, vol. 16, pp. 69--86, 2007.
[20]
H. Foster, and G. Spanoudakis, Advanced service monitoring configurations with SLA decomposition and selection, in Proc. ACM Symposium on Applied Computing, Taiwan, 2011, pp. 1582--1589.
[21]
M. Boniface, S. Phillips, A. Sanchez-Macian et al., Dynamic service provisioning using GRIA SLAs, in Proc. Service-Oriented Computing - ICSOC 2007 Workshops, Heidelberg, 2009, pp. 56--67.
[22]
M. Maurer, I. Brandic, V. C. Emeakaroha et al., Towards knowledge management in self-adaptable clouds, in Proc. 6th World Congress on Services, USA, 2010, pp. 527--534.
[23]
W. Fu, and Q. Huang, GridEye: A service-oriented grid monitoring system with improved forecasting algorithm, in Proc. 5th Intl. Conf. on Grid and Cooperative Computing Workshops, China, 2006, pp. 5--12.
[24]
V. Cardellini, E. Casalicchio, F. Lo Presti et al., SLA-aware resource management for application service providers in the cloud, in Proc. 1st Intl. Symposium on Network Cloud Computing and Applications, Toulouse, 2011, pp. 20--27.
[25]
Institute for Statistics and Mathematics of the WU Wien, The R Project for Statistical Computing, 2012.
[26]
F. Raimondi, J. Skene, and W. Emmerich, Efficient online monitoring of web-service SLAs, in Proc. 16th ACM SIGSOFT Intl. Symposium on Foundations of Software Engineering, USA, 2008, pp. 170--180.
[27]
J. Y. Hu, C. H. Wu, C. C. Chu et al., Constructing a cloudcentric service assurance platform for computing as a service, in Proc. Intl. Conf. on Cyber-Enabled Distributed Comput. and Knowl. Discovery, China, 2011, pp. 139--145.
[28]
D. De Mari, Z. Jerzak, and C. Fetzer, A novel approach to QoS monitoring in the cloud, in Proc. 1st Intl. Conf. on Data Compression, Communications and Processing, Italy, 2011, pp. 45--51.
[29]
M. Rak, S. Venticinque, T. Mahr et al., Cloud application monitoring: The mOSAIC approach, in Proc. IEEE 3rd Intl. Conf. on Cloud Computing Technology and Science, Italy 2011, pp. 758--763.
[30]
A. Keller, and H. Ludwig, The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services, Journal of Network and Systems Management, vol. 11, no. 1, pp. 57--81, 2003.

Cited By

View all
  • (2024)Service Level Agreements (SLAs) and Their Role in Establishing TrustAnalyzing and Mitigating Security Risks in Cloud Computing10.4018/979-8-3693-3249-8.ch009(182-193)Online publication date: 5-Jan-2024
  • (2022)AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplacesJournal of Cloud Computing10.1186/s13677-022-00292-811:1Online publication date: 19-Aug-2022
  • (2022)CASHT: Contention Analysis in Shared Hierarchies with TheftsACM Transactions on Architecture and Code Optimization10.1145/349453819:1(1-27)Online publication date: 23-Jan-2022
  • Show More Cited By

Index Terms

  1. Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MoMM '12: Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
    December 2012
    323 pages
    ISBN:9781450313070
    DOI:10.1145/2428955
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • @WAS: International Organization of Information Integration and Web-based Applications and Services

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 December 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud computing
    2. prediction of SLA violation
    3. proactive SLA assurance
    4. risk assessment
    5. service monitoring

    Qualifiers

    • Research-article

    Conference

    MoMM '12
    Sponsor:
    • @WAS

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 24 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Service Level Agreements (SLAs) and Their Role in Establishing TrustAnalyzing and Mitigating Security Risks in Cloud Computing10.4018/979-8-3693-3249-8.ch009(182-193)Online publication date: 5-Jan-2024
    • (2022)AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplacesJournal of Cloud Computing10.1186/s13677-022-00292-811:1Online publication date: 19-Aug-2022
    • (2022)CASHT: Contention Analysis in Shared Hierarchies with TheftsACM Transactions on Architecture and Code Optimization10.1145/349453819:1(1-27)Online publication date: 23-Jan-2022
    • (2020)Towards a capability and maturity model for Collaborative Software-as-a-ServiceInnovations in Systems and Software Engineering10.1007/s11334-020-00360-9Online publication date: 21-Mar-2020
    • (2020)For a Dynamic Web Services Discovery Model for Open Ecosystems of Software ProvidersBoosting Collaborative Networks 4.010.1007/978-3-030-62412-5_7(83-97)Online publication date: 16-Nov-2020
    • (2020)Trustworthy Cloud ComputingData Privacy and Trust in Cloud Computing10.1007/978-3-030-54660-1_7(129-145)Online publication date: 14-Oct-2020
    • (2019)Security and Privacy of Smart Cities: A Survey, Research Issues and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286728821:2(1718-1743)Online publication date: Oct-2020
    • (2018)Management of Service Level Agreements for Cloud Services in IoT: A Systematic Mapping StudyIEEE Access10.1109/ACCESS.2017.27446776(30184-30207)Online publication date: 2018
    • (2014)Generic cloud platform multi-objective optimization leveraging [email protected]Proceedings of the 29th Annual ACM Symposium on Applied Computing10.1145/2554850.2555044(343-350)Online publication date: 24-Mar-2014
    • (2014)Role-Based Templates for Cloud MonitoringProceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing10.1109/UCC.2014.33(242-250)Online publication date: 8-Dec-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media