Introducing Policy-Driven Governance and Service Level Failure Mitigation in Cloud Service Brokers: Challenges Ahead

Author(s):  
Konstantinos Bratanis ◽  
Dimitrios Kourtesis
2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


2020 ◽  
Vol 17 (12) ◽  
pp. 5296-5306
Author(s):  
N. Keerthana ◽  
Viji Vinod ◽  
Sudhakar Sengan

Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories, and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.


2013 ◽  
Vol 4 (3) ◽  
pp. 38-52
Author(s):  
Sai Manoj Marepalli ◽  
Razia Sultana ◽  
Andreas Christ

Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).


Author(s):  
Rajkumar Rajavel ◽  
Sathish Kumar Ravichandran ◽  
G. R. Kanagachidambaresan

Challenges and issues in the field of cloud service negotiation framework optimization have been an active area of research. During service level agreement, the probability of negotiation conflict between the service consumers and providers is high. This may arise due to aggressive behavior, selfish misperception, vague preferences and uncertain goals of the negotiating participants. One of the key challenges identified in negotiation framework is optimizing the negotiation conflict among the negotiators. In order to minimize such conflicts, existing frameworks group the negotiation pairs that contain similar and non-aggressive behavioral patterns by exploiting the distance, binary, context dependent and fuzzy similarity approaches. These approaches get better success rate only if the dimensionality of negotiator attributes is low. As emerging real-time cloud service negotiation applications are characterized by negotiation attributes of high dimensionality, the existing approaches are inappropriate for these applications. In addition, the existing approaches group the negotiation pairs using distances based measure in two-dimensional negotiation attribute, whose value will vary for high-dimensional attributes. In this work, an Angle-based Similarity Grouping (ASG) approach is proposed that appropriately groups the highly cooperative negotiation pairs and thereby increases the success rate and decreases communication overhead.


Proceedings ◽  
2019 ◽  
Vol 30 (1) ◽  
pp. 38
Author(s):  
Vithlani ◽  
Marcel ◽  
Melville ◽  
Prüm ◽  
Lam ◽  
...  

The acquisition, storage, and processing of huge amounts of data and their fast analysis to generate information is not a new approach, but it becomes challenging through smart decision-making on the choice of hardware and software improvements. In the specific cases of environment protection, nature conservation, and precision farming, where fast and accurate reactions are required, drone technologies with imaging sensors are of interest in many research groups. However, post-processing of the images acquired by drone-based sensors such as the generation of orthomosaics from aerial images and superimposing the orthomosaics on a global map to identify the exact locations of the interested area is computationally intensive and sometimes takes hours or even days to achieve desired results. Initial tests have shown that photogrammetry software takes less time to generate an orthomosaic by running them on a workstation with higher CPU, RAM and GPU configurations. Tasks like setting up the application environment with dependencies, making this setup portable and manage installed services can be challenging, especially for small-and-medium-sized enterprises that have limited resources in exploring different architectures. To enhance the competitiveness of the small and medium-sized enterprises and research institutions, the accessibility of the proposed solution includes the integration of open-source tools and frameworks such as Kubernetes (version v1.13.4, available online: https://kubernetes.io/) and OpenDroneMap (version 0.3, available online: https://github.com/OpenDroneMap/ODM) enabling a reference architecture that is as vendor-neutral as possible. Current work is based on an on-premise cluster computing approach for fast and efficient photogrammetry process using open source software such as OpenDroneMap combined with light-weight containerization techniques such as Docker (version 17.12.1, available online: https://www.docker.io/), orchestrated by Kubernetes. The services provided by OpenDroneMap enable microservice-based architecture. These container-based services can be administered easily by a container orchestrator like Kubernetes. After setting up the servers with core OpenDroneMap services on our container-based cluster with Kubernetes as the orchestrator engine, the plan is to use the advantages of Kubernetes' powerful management capabilities to help maximize resource efficiency as the basis for creating Service Level Agreements to provide a cloud service.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


Sign in / Sign up

Export Citation Format

Share Document