scholarly journals Service Level Agreements in Cloud Computing and Big Data

Author(s):  
K. Radha ◽  
B.Thirumala Rao ◽  
Shaik Masthan Babu ◽  
K.Thirupathi Rao ◽  
V.Krishna Reddy ◽  
...  

Now-a-days Most of the industries are having large volumes of data. Data has range of Tera bytes to Peta byte. Organizations are looking to handle the growth of data. Enterprises are using cloud deployments to address the big data and analytics with respect to the interaction between cloud and big data. This paper presents big data issues and research directions towards the ongoing work of processing of big data in the distributed environments.

Author(s):  
Mohamed M. Ould Deye ◽  
Mamadou Thiongane ◽  
Mbaye Sene

Auto-scaling is one of the most important features in Cloud computing. This feature promises cloud computing customers the ability to best adapt the capacity of their systems to the load they are facing while maintaining the Quality of Service (QoS). This adaptation will be done automatically by increasing or decreasing the amount of resources being leveraged against the workload’s resource demands. There are two types and several techniques of auto-scaling proposed in the literature. However, regardless the type or technique of auto-scaling used, over-provisioning or under-provisioning problem is often observed. In this paper, we model the auto-scaling mechanism with the Stochastic Well-formed coloured Nets (SWN). The simulation of the SWN model allows us to find the state of the system (the number of requests to be dispatched, the idle times of the started resources) from which the auto-scaling mechanism must be operated in order to minimize the amount of used resources without violating the service-level agreements (SLA).


2012 ◽  
pp. 185-202
Author(s):  
David Pym ◽  
Martin Sadler

Cloud computing ecosystems of service providers and consumers will become a significant part of the way information services are provided, allowing more agile coalitions, cost savings and improved service delivery. Existing approaches to information security do not readily extend to this complex multi-party world. The authors argue for a mathematical model-based framework for the analysis and management of information stewardship that makes explicit both the expectations and responsibilities of cloud stakeholders and the design assumptions of systems. Such a framework supports integrated economic, technology, and behavioural analyses, so providing a basis for a better understanding of the interplay between preferences, policies, system design, regulations, and Service Level Agreements. The authors suggest approaches to constructing economic, technology, and behavioural models and discuss the challenges in integrating them.


Author(s):  
Roland Kübert ◽  
Georgina Gallizo ◽  
Theodoros Polychniatis ◽  
Theodora Varvarigou ◽  
Eduardo Oliveros ◽  
...  

Service Level Agreements (SLAs) are nowadays used as a cornerstone for building service-oriented architectures. SLAs have been closely investigated in the scope of distributed and Grid computing and are now gaining uptake in cloud computing as well. However, most solutions have been developed for specific purposes and are not applicable generally, even though the most approaches propose a general usability. Only rarely have SLAs been applied to real-time systems. The purpose of this chapter is to analyze different fields where SLAs are used, examine the proposed solutions, and investigate how these can be improved in order to better support the creation of real-time service-oriented architectures.


Web Services ◽  
2019 ◽  
pp. 769-787
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document