CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Service-based Architecture for SLA Management in Cloud Computing

by Hend S. Salem, Rania Hodhod, Ghada S. El-Tawel, Hany F. ElYamany
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 26
Year of Publication: 2020
Authors: Hend S. Salem, Rania Hodhod, Ghada S. El-Tawel, Hany F. ElYamany
10.5120/ijca2020920806

Hend S. Salem, Rania Hodhod, Ghada S. El-Tawel, Hany F. ElYamany . Service-based Architecture for SLA Management in Cloud Computing. International Journal of Computer Applications. 175, 26 ( Oct 2020), 1-10. DOI=10.5120/ijca2020920806

@article{ 10.5120/ijca2020920806,
author = { Hend S. Salem, Rania Hodhod, Ghada S. El-Tawel, Hany F. ElYamany },
title = { Service-based Architecture for SLA Management in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2020 },
volume = { 175 },
number = { 26 },
month = { Oct },
year = { 2020 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number26/31612-2020920806/ },
doi = { 10.5120/ijca2020920806 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:26:12.758268+05:30
%A Hend S. Salem
%A Rania Hodhod
%A Ghada S. El-Tawel
%A Hany F. ElYamany
%T Service-based Architecture for SLA Management in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 26
%P 1-10
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Service Level Agreements (SLAs) have proven their added value in the modern distributed computing era.Well-established systems for managing SLAs represent a challenging aspect in cloud computing. Certainly, proper design of such systems can save a lot of costs that are spent in paying SLA violation penalties. A managed SLA can be accomplished through several stages (i.e. life cycle): Definition and Awareness, Negotiation, Design, Implementation, and Monitoring and Compliance. In this work, a reliable service-based architecture for managing the SLA life cycle in cloud computing is proposed. The introduced architecture is composed of five main layers: Infrastructure Layer, SLA Layer, Provider Layer, Consumer Layer, and Security and Privacy Layer; each layer in turn consists of multiple components that provide certain management functionalities (e.g. violation detection and recovery). This paper focuses on the design and implementation of the SLA layer and its components, in addition to a monitoring system that observes the SLA performance, detects any violations by determining a particular calculated compliance value, and diagnoses and recovers from such violations by taking the proper actions.

References
  1. D. Serrano, S. Bouchenak, Y. Kouki, F. A. de Oliveira Jr, T. Ledoux, J. Lejeune, J. Sopena, L. Arantes, P. Sens, Sla guarantees for cloud services, Future Generation Computer Systems 54 (2016) 233–246.
  2. W. Hussain, F. K. Hussain, M. Saberi, O. K. Hussain, E. Chang, Comparing time series with machine learningbased prediction approaches for violation management in cloud slas, Future Generation Computer Systems 89 (2018) 464–477.
  3. N. Ghosh, S. K. Ghosh, An approach to identify and monitor sla parameters for storage-as-a-service cloud delivery model, in: Globecom Workshops (GC Wkshps), 2012 IEEE, IEEE, 2012, pp. 724–729.
  4. H. S. Salem, H. F. El Yamany, G. S. El-Tawel, Towards service level agreements engineering process in cloud computing, Accepted in International Journal of Internet Manufacturing and Services (IJIMS), Inderscience Publishers, 2014.
  5. Ieee guide–adoption of iso/iec tr 24748-2:2011 systems and software engineering– life cycle management– part 2: Guide to the application of iso/iec 15288 (system life cycle processes), IEEE Std 24748-2-2012 (2012) 1–96doi:10.1109/ IEEESTD.2012.6187665.
  6. W. A. Ghumman, Automation of the sla life cycle in cloud computing, in: Service-Oriented Computing–ICSOC 2013 Workshops, Springer, 2014, pp. 557–562.
  7. M. Comuzzi, C. Kotsokalis, G. Spanoudakis, R. Yahyapour, Establishing and monitoring slas in complex service based systems, in: Web Services, 2009. ICWS 2009. IEEE International Conference on, IEEE, 2009, pp. 783–790.
  8. L. Wu, S. K. Garg, R. Buyya, C. Chen, S. Versteeg, Automated sla negotiation framework for cloud computing, in: Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on, IEEE, 2013, pp. 235–244.
  9. B. An, V. Lesser, D. Irwin, M. Zink, Automated negotiation with decommitment for dynamic resource allocation in cloud computing, in: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, International Foundation for Autonomous Agents and Multiagent Systems, 2010, pp. 981–988.
  10. V. C. Emeakaroha, M. A. Netto, R. N. Calheiros, I. Brandic, R. Buyya, C. A. De Rose, Towards autonomic detection of sla violations in cloud infrastructures, Future Generation Computer Systems 28 (7) (2012) 1017–1029.
  11. K. Stamou, V. Kantere, J.-H. Morin, Sla data management criteria, in: Big Data, 2013 IEEE International Conference on, IEEE, 2013, pp. 34–42.
  12. M. Kajko-Mattsson, C. Makridis, Outline of an sla management model, in: IEEE Conference on Software Reengineering and Maintenance, European Conference on Software Maintenance and Reengineering, 2008, pp. 308–310.
  13. H. F. El Yamany, M. A. Capretz, D. S. Allison, Quality of security service for web services within soa, in: Services-I, 2009 World Conference on, IEEE, 2009, pp. 653–660.
  14. D. S. Allison, A. Kamoun, M. A. Capretz, S. Tazi, K. Drira, H. F. El Yamany, An ontology driven privacy framework for collaborative working environments, Accepted in International Journal Autonomous and Adaptive Communications Systems, InderScience Publishers, 2014.
  15. IEEE Computer Society, Software Engineering Body of Knowledge (SWEBOK V3), EUA, 2014. URL http://www.swebok.org/
  16. M. I. Babar, M. Ramzan, S. Ghayyur, Challenges and future trends in software requirements prioritization, in: Computer Networks and Information Technology (ICCNIT), 2011 International Conference on, IEEE, 2011, pp. 319–324.
  17. S. Baskaran, A survey on prioritization methodologies to prioritize non functional requirements, International Journal of Computer Science and Business Informatics 12 (1) (2014) 32–44.
  18. M. Ramzan, M. A. Jaffar, A. A. Shahid, Value based intelligent requirement prioritization (virp): expert driven fuzzy logic based prioritization technique, International Journal Of Innovative Computing, Information And Control (ICIC) 7 (3) (2011) 1017–1038.
  19. R. B. Svensson, T. Gorschek, B. Regnell, R. Torkar, A. Shahrokni, R. Feldt, A. Aurum, Prioritization of quality requirements: State of practice in eleven companies, in: Requirements Engineering Conference (RE), 2011 19th IEEE International, IEEE, 2011, pp. 69–78.
  20. J. H. Allen, S. Barnum, R. Ellison, G. McGraw, N. Mead, Software Security Engineering, Addison-Wesley Professional, 2009.
  21. A. Herrmann, M. Daneva, Requirements prioritization based on benefit and cost prediction: an agenda for future research, in: International Requirements Engineering, 2008. RE’08. 16th IEEE, IEEE, 2008, pp. 125–134.
  22. R. L. Gomes, E. Madeira, An automatic sla negotiation protocol for a future internet, in: Communications (LATINCOM), 2011 IEEE Latin-American Conference on, IEEE, 2011, pp. 1–6.
  23. E. Yaqub, P. Wieder, C. Kotsokalis, V. Mazza, L. Pasquale, J. L. Rueda, S. G. G´omez, A. E. Chimeno, A generic platform for conducting sla negotiations, in: Service Level Agreements for Cloud Computing, Springer, 2011, pp. 187–206.
  24. P. Hasselmeyer, H. Mersch, B. Koller, H. Quyen, L. Schubert, P. Wieder, Implementing an sla negotiation framework, in: Proceedings of the eChallenges Conference (e-2007), Vol. 4, 2007, pp. 154–161.
  25. S. Son, S. C. Jun, Negotiation-based flexible sla establishment with sla-driven resource allocation in cloud computing, in: Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on, IEEE, 2013, pp. 168–171.
  26. S. Son, G. Jung, S. C. Jun, An sla-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider, The Journal of Supercomputing 64 (2) (2013) 606–637.
  27. R. Sahal, M. H. Khafagy, F. A. Omara, A survey on sla management for cloud computing and cloud-hosted big data analytic applications, International Journal of Database Theory and Application 9 (4) (2016) 107–118.
  28. S. S. Gill, I. Chana, M. Singh, R. Buyya, Chopper: an intelligent qos-aware autonomic resource management approach for cloud computing, Cluster Computing 21 (2) (2018) 1203– 1241.
  29. Cloudsim: A framework for modeling and simulation of cloud computing infrastructures and services, accessed: 2013-02-16 (2014). URL http://www.cloudbus.org/cloudsim/
  30. R. Kumar, G. Sahoo, Cloud computing simulation using cloudsim, International Journal of Engineering Trends and Technology (IJETT) 8 (2) (2014) 82–86.
  31. Xenserver: Open source virtualization, accessed: 2014-06-12 (2014). URL http://www.xenserver.org
  32. The xen project, accessed: 2014-06-12 (2014). URL http://www.xenproject.org/
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Service Level Agreement(SLA) Service Level Objectives(SLO) Quality of Service(QoS) Engineering Process Prioritization