Management of Service Level Agreement for Service-Oriented Content Adaptation Platform

Author(s):  
Mohd Farhan Md Fudzee ◽  
Jemal H. Abawajy

It is paramount to provide seamless and ubiquitous access to rich contents available online to interested users via a wide range of devices with varied characteristics. Recently, a service-oriented content adaptation scheme has emerged to address this content-device mismatch problem. In this scheme, content adaptation functions are provided as services by third-party providers. Clients pay for the consumed services and thus demand service quality. As such, negotiating for the QoS offers, assuring negotiated QoS levels and accuracy of adapted content version are essential. Any non-compliance should be handled and reported in real time. These issues elevate the management of service level agreement (SLA) as an important problem. This chapter presents prior work, important challenges, and a framework for managing SLA for service-oriented content adaptation platform.

Author(s):  
Elarbi Badidi ◽  
Mohamed El Koutbi

The services landscape is changing with the growing adoption by businesses of the Service Oriented Architecture (SOA), the migration of business solutions to the cloud, and the proliferation of smartphones and Internet-enabled handheld devices to consume services. To meet their business goals, organizations increasingly demand services, which can satisfy their functional and non-functional requirements. Service Level Agreements (SLAs) are seen as the means to guarantee the continuity in service provisioning and required levels of service. In this paper, we propose a framework for service provisioning, which aims at providing support for automated SLA negotiation and management. The Service Broker component carries out SLA negotiation with selected service-providers on behalf of service-consumers. Multi-rounds of negotiations are very often required to reach an agreement. In each round, the negotiating parties bargain on multiple SLA parameters by trying to maximize their global utility functions. The monitoring infrastructure is in charge of observing SLA compliance monitoring using measurements obtained from independent third party monitoring services.


2019 ◽  
Vol 9 (17) ◽  
pp. 3602 ◽  
Author(s):  
Lei Hang ◽  
Do-Hyeun Kim

Recently, technology startups have leveraged the potential of blockchain-based technologies to govern institutions or interpersonal trust by enforcing signed treaties among different individuals in a decentralized environment. However, it is going to be hard enough convincing that the blockchain technology could completely replace the trust among trading partners in the sharing economy as sharing services always operate in a highly dynamic environment. With the rapid expanding of the rental market, the sharing economy faces more and more severe challenges in the form of regulatory uncertainty and concerns about abuses. This paper proposes an enhanced decentralized sharing economy service using the service level agreement (SLA), which documents the services the provider will furnish and defines the service standards the provider is obligated to meet. The SLA specifications are defined as the smart contract, which facilitates multi-user collaboration and automates the process with no involvement of the third party. To demonstrate the usability of the proposed solution in the sharing economy, a notebook sharing case study is implemented using the Hyperledger Fabric. The functionalities of the smart contract are tested using the Hyperledger Composer. Moreover, the efficiency of the designed approach is demonstrated through a series of experimental tests using different performance metrics.


2021 ◽  
pp. 1-12
Author(s):  
Rajkumar Rajavel ◽  
Sathish Kumar Ravichandran ◽  
Partheeban Nagappan ◽  
Kanagachidambaresan Ramasubramanian Gobichettipalayam

A major demanding issue is developing a Service Level Agreement (SLA) based negotiation framework in the cloud. To provide personalized service access to consumers, a novel Automated Dynamic SLA Negotiation Framework (ADSLANF) is proposed using a dynamic SLA concept to negotiate on service terms and conditions. The existing frameworks exploit a direct negotiation mechanism where the provider and consumer can directly talk to each other, which may not be applicable in the future due to increasing demand on broker-based models. The proposed ADSLANF will take very less total negotiation time due to complicated negotiation mechanisms using a third-party broker agent. Also, a novel game theory decision system will suggest an optimal solution to the negotiating agent at the time of generating a proposal or counter proposal. This optimal suggestion will make the negotiating party aware of the optimal acceptance range of the proposal and avoid the negotiation break off by quickly reaching an agreement.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1434
Author(s):  
Yustus Eko Oktian ◽  
Sang-Gon Lee ◽  
Byung-Gook Lee

The state-of-the-art centralized Internet of Things (IoT) data flow pipeline has started aging since it cannot cope with the vast number of newly connected IoT devices. As a result, the community begins the transition to a decentralized pipeline to encourage data and resource sharing. However, the move is not trivial. With many instances allocating data or service arbitrarily, how can we guarantee the correctness of IoT data or processes that other parties offer. Furthermore, in case of dispute, how can the IoT data assist in determining which party is guilty of faulty behavior. Finally, the number of Service Level Agreement (SLA) increases as the number of sharing grows. The problem then becomes how we can provide a natural SLA generation and verification that we can automate instead of going through a manual and tedious legalization process through a trusted third party. In this paper, we explore blockchain solutions to answer those issues and propose continued data integrity services for IoT big data management. Specifically, we design five integrity protocols across three phases of IoT operations—during the transmission of IoT data (data in transit), when we physically store the data in the database (data at rest), and at the time of data processing (data in process). In each phase, we first lay out our motivations and survey the related blockchain solutions from the literature. We then use curated papers from our surveys as building blocks in designing the protocol. Using our proposal, we augment the overall value of IoT data and commands, generated in the IoT system, as they are now tamper-proof, verifiable, non-repudiable, and more robust.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Dependability ◽  
2017 ◽  
Vol 17 (4) ◽  
pp. 27-30
Author(s):  
V. A. Netes

The Service Level Agreement (SLA) is an efficient and proven tool for regulation of the relations between the supplier and the user of services that is designed to ensure their quality. Such agreements are well known and successfully used in the information and communication industry. They are also applicable in other areas. Essentially, SLA stipulates certain requirements for the service level of which the fulfilment is guaranteed by the provider. In case of SLA violation the service provider is usually financially liable. As a rule, in such cases the user is remunerated with a discount for services provided in the following accounting period. Dependability requirements are an important part of the SLA. The purpose of this paper is to familiarize a wide range of experts from various industries with the general matters of SLA application and the aspects related to the dependability requirements specification. The paper refers to the relevant documents of international standardization organizations (ITU, ISO/IEC, ETSI, TMForum) and the Russian standards. Recommendations are given for selecting the dependability indicators and standard values to be included in the SLA, as well as for defining the amounts of compensation payed by service providers to the customers in case of non-compliance with requirements for the availability factor. The availability factor is normally used in the SLA as the primary dependability indicator that defines the allowable total time of non-operability over the specified base period. Additionally, a client might be interested in restricting the duration of each individual downtime as well. For that purpose, the guaranteed recovery time can also be specified and exceeding this time would be deemed an SLA violation. The choice of the standard values for inclusion in the SLA is a search for a compromise between the intent to satisfy the user requirements and the wish to get ahead of the competition on the one hand and the requirement to ensure the feasibility of the assumed obligations and minimize the risk of SLA violation that involve financial and reputational losses on the other hand. Therefore, before proposing an SLA to a customer, a service provider must thoroughly analyze its actual ability to make sure that the probability of SLA requirements violation is sufficiently low. The computational or computational and experimental methods are suggested for its evaluation. The amount of compensation for a violation depends on its gravity, i.e. the achieved and the standard values of an indicator. In practice, this relation is usually expressed with a step (piecewise constant) function. A formula is proposed that expresses the theoretical relation between the relative amount of compensation for violation of the availability factor requirements and the severity of violation and the standard value of this indicator. It can be used in defining the technically substantiated reference for SLA conditions development and assessment, of which the value will be relevant to both the service providers and users.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Sign in / Sign up

Export Citation Format

Share Document