Skip to main content

A Hierarchical Framework for Evaluation of Cloud Service Qualities

  • Conference paper
  • First Online:
Mobile Ad-hoc and Sensor Networks (MSN 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 747))

Included in the following conference series:

Abstract

The reliability and availability of cloud computing services improved dramatically in recent years. More and more users tend to migrate their business systems to cloud environment. The compliance of SLAs (Service Level Agreement) in cloud services must be efficiently evaluated to ensure the enforcement of SLAs. Traditionally, an Evaluation Center will be established to collecting performance and reliability metrics data of SLAs. However, since the volume of data collected is huge, and the speed of data generation is fast, large bandwidth and computation capacity is needed in the Evaluation Center. This paper proposes a hierarchical architecture for monitoring and evaluating of the compliances of SLAs. In this architecture, a Data Collection Service is deployed in the intranet of each cloud service provider. Metrics data is first collected and analyzed by local Data Collection Service. When SLA violations are detected, related data is packed, signed and sent to the Evaluation Center located on the Internet. Simulations show that the use of local Data Collection Service will effectively reduce the amount of data transferred via Internet and will not cause much overhead in the construction of evaluation infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://en.wikipedia.org/wiki/ICloud_leaks_of_celebrity_photos.

  2. 2.

    According to CloudHarmony, the longest downtime (per region) of cloud services by major CSPs in Sep. 2017 is 51.03 min. Data source: https://cloudharmony.com/status-of-compute-group-by-regions.

  3. 3.

    http://kafka.apache.org.

  4. 4.

    http://hbase.apache.org.

  5. 5.

    http://spark.apache.org.

References

  1. Xiao, Y., Du, X., Zhang, J., Hu, F., Guizani, S.: Internet protocol television (IPTV): the killer application for the next-generation internet. IEEE Commun. Mag. 45(11), 126–134 (2007)

    Article  Google Scholar 

  2. Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud. IEEE/ACM Trans. Netw. 23(2), 603–615 (2015)

    Article  Google Scholar 

  3. Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52–59 (2015)

    Article  Google Scholar 

  4. Green, M.: The Threat in the Cloud. IEEE Educational Activities Department (2013)

    Google Scholar 

  5. Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5, December 2010

    Google Scholar 

  6. Wang, M.C., Wu, X., Zhang, W., Ding, F.Q., Zhou, J., Pei, G.C.: A conceptual platform of SLA in cloud computing. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 1131–1135 (2011)

    Google Scholar 

  7. Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference on Network-Based Information Systems (NBiS), pp. 321–324. IEEE (2010)

    Google Scholar 

  8. Hogben, G., Dekker, M.: Procure secure: a guide to monitoring of security service levels in cloud contracts. Technical report, European Network and Information Security Agency (ENISA) (2012)

    Google Scholar 

  9. Gunter, D., Tierney, B., Crowley, B., Holding, M., Lee, J.: NetLogger: a toolkit for distributed system performance analysis. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No. PR00728), pp. 267–273 (2000)

    Google Scholar 

  10. Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level metrics to high level SLAs - LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: International Conference on High Performance Computing Simulation, pp. 48–54, June 2010

    Google Scholar 

  11. Shou-Xu, J., Jian-Zhong, L.: A reputation-based trust mechanism for P2P E-commerce systems. J. Softw. 18(10), 2551–2563 (2007)

    Article  Google Scholar 

  12. Du, X., Chen, H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4), 60–66 (2008)

    Article  Google Scholar 

  13. Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314–2341 (2007). Special issue on security on wireless ad hoc and sensor networks

    Article  Google Scholar 

  14. Zhao, P., Han, Z., He, Y.: SLA-based dynamic trust evaluation for cloud computing. J. Beijing Jiaotong Univ. 37(5), 80–87 (2013)

    Google Scholar 

  15. Alhamad, M., Dillon, T., Chang, E.: Conceptual SLA framework for cloud computing. In: IEEE International Conference on Digital Ecosystems and Technologies, pp. 606–610 (2010)

    Google Scholar 

  16. Gao, Y.-L., Shen, B.-J., Kong, H.-F.: Trust model for cloud computing based on SLA and user ratings. Comput. Eng. 38(8), 28–30 (2012)

    Google Scholar 

  17. Emeakaroha, V.C., Calheiros, R.N., Netto, M.A.S., Brandic, I., Rose, C.A.F.D.: DeSVi: an architecture for detecting SLA violations in cloud computing infrastructures. In: Proceedings of the 2nd International ICST Conference on Cloud Computing (CloudComp 2010) (2010)

    Google Scholar 

  18. Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). Security Issues in Sensor and Ad Hoc Networks

    Article  Google Scholar 

  19. Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2009)

    Article  Google Scholar 

  20. Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Veh. Technol. 57(4), 2387–2394 (2008)

    Article  Google Scholar 

  21. Du, X., Xiao, Y., Chen, H.H., Wu, Q.: Secure cell relay routing protocol for sensor networks. Wirel. Commun. Mob. Comput. 6(3), 375–391 (2006)

    Article  Google Scholar 

  22. Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: 2011 Proceedings of IEEE INFOCOM, 346–350, April 2011

    Google Scholar 

  23. Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens. J. 13(10), 3693–3701 (2013)

    Article  Google Scholar 

Download references

Acknowledgment

The work described in this paper is supported by Shenzhen Science and Technology Project “Research on Key Technologies in Trusted Cloud Architecture” (Project No. JSGG20160229122214337).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Q., Liu, M., Chen, K., Zhang, Y., Zheng, J. (2018). A Hierarchical Framework for Evaluation of Cloud Service Qualities. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8890-2_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8889-6

  • Online ISBN: 978-981-10-8890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics