Ranking Model for SLA Resource Provisioning Management

2014 ◽  
Vol 4 (3) ◽  
pp. 68-80 ◽  
Author(s):  
C. S. Rajarajeswari ◽  
M. Aramudhan

Cloud computing is an amazing technology, which provides services to users on-demand. Since there are many providers in the cloud, users get confused in selecting the optimal cloud service provider. To overcome this limitation, federated cloud management architecture was proposed. There is no standard framework for ranking the cloud service providers in the existing federated cloud model. The proposed work provides a new federated cloud mechanism, in which Cloud Broker Manager (CBM) takes up the responsibility of resource provisioning and ranking. Differentiated Service Module (DSM) is projected in CBM that classifies the incoming users as SLA or non-SLA members. Dynamic Loose Priority Scheduling (DLPS) is proposed in CBM to manage the number of services. To reduce the overload of the CBM, a secondary CBM (sCBM) is proposed. Experimental results show that the proposed DLPS technique improves the resource provisioning and Quality of Service (QoS) to SLA members and improves the performance of federated cloud by 18% than the existing model.

2016 ◽  
Vol 9 (2) ◽  
pp. 78-88
Author(s):  
C. S. Rajarajeswari ◽  
M. Aramudhan

Cloud computing is an innovative technology which provides services to users on-demand and pay per use. Since there are many providers in cloud, users get confused in selecting the optimal service provider for their tasks. To overcome this limitation, federated cloud management architecture was proposed. The proposed work provides a new federated cloud mechanism, in which Broker Manager takes the responsibility of providing optimal and ranked service provider for user requirements. To rank the service providers in the federated cloud, Differentiated Priority based Ranking algorithm is implemented at the level of BM. Attributes are differentiated based on their weights assigned by a user. Service providers are discovered and ranked based on the differentiated attributes. The proposed algorithm chooses the cloud service provider for execution, not only based on the rank list generated by the BM; but also based on the suggestion given by the user. The experimental result shows that the proposed algorithm improves the performance of resource provisioning than the existing model by 13%.


Author(s):  
Narander Kumar ◽  
Surendra Kumar

Background: Cloud Computing can utilize processing and efficient resources on a metered premise. This feature is a significant research problem, like giving great Quality-of-Services (QoS) to the cloud clients. Objective: Quality of Services confirmation with minimum utilization of resource and their time/costs, cloud service providers ought to receive self-versatile of the resource provisioning at each level. Currently, various guidelines, as well as model-based methodologies, have been intended to the management of resources aspects in the cloud computing services. Method: In this Research article, manage resource allocations dependent optimization Salp Swarm Algorithm (SSA) areused to merge various numbers of VMs on lessening Data Centers to SLA as well as required Quality-of-Service (QoS) with most extreme data centers use. Result: We compared with the various approaches like the First fit (FF), greedy crow search (GCS), and hybrid crow search with the response time and resource utilization. Conclusion: The proposed mechanism is simulated on Cloudsim Simulator, the simulation results show less migration time that improves the QoS as well minimize the energy consumssion in a cloud computing and IoT environment.


Author(s):  
Arunambika T. ◽  
Senthil Vadivu P.

There are thousands of providers obtainable in the market, and more and more are being added to the service list every day. All of these providers claim that the services given to them are distinctive and hassle-free. To check their claim, the cloud service broker (CSB) verifies the quality of service (QoS) of the cloud service providers (CSPs) and the level of user needs. Depending on the requirements of the cloud consumer (CC), CSB allocates a CSP to it. This paper proposed optimal cloud service provider selection (OCSPS) based on QoS metrics. The CC would handovers the demand to the CSB for optimal CSP selection using QoS. Once the CSP selection process is complete, the outcomes would become back to the CC. Entire demands created to CCs are saved in the request buffer (RB) in the CSB. When a specific request is fulfilled, the subsequent demand would take from this RB. The experimental result shows that the proposed OCSPS algorithm takes less time for CSP ranking and optimal CSP selection.


2019 ◽  
Vol 8 (3) ◽  
pp. 5159-5163

The rapidly growing cloud-centric focuses among organizations and enterprises have thrown into sharp relief the pressing need to progressively upgrade security within a cloud infrastructure. While a significant portion of threat perception emanates from malicious software that can infiltrate a cloud computing infrastructure, the risk of unlicensed software deployments in infrastructure-as-a-service model can expose an affected cloud service provider to a host of legal and statutory issues. The task of managing software licenses and conducting license validation checks can be an intense activity. The onus of tracking and managing licenses of software that have been deployed on an infrastructure-as-a-service cloud model is on both cloud service provider as well as its customers. However, the business of effectively managing software licenses is contingent upon the ease and use of an effective license auditing management tool to which auditors can connect through a secure conduit. In this paper, we propose a model that would allow cloud service providers to securely track software deployments and tally corresponding usage of appropriate licenses within an infrastructure-as-a-service model. Using the proposed model a cloud service provider can match all software licenses that have been deployed by a customer within the IaaS cloud space allotted. Further, a license auditor can securely connect to cloud service provider’s console and generate reports on license usage and software deployments from any modern browser. At the core of our model, lies a secure loopback connection framework that prevents access to any other web site once a secure connection to the primary console for monitoring and tracking software deployments has been established.


Author(s):  
Durga S. ◽  
Mohan S. ◽  
Dinesh Peter J. ◽  
Martina Rebecca Nittala

Cloud users expect high Quality of service (QoS) levels within their budget and the cloud service providers (CSPs) to maximize their profits, always strive for the cost and energy minimization and better resource utilization. Any error in the management of resources causes Service Level Agreement (SLA) violations, high penalties, low customer satisfaction, and long-term losses. The objective of this article is to present a literature review on various resource provisioning strategies and also to present a novel cluster-based resource provisioning (CB-RP) technique that satisfies the needs of both cloud users and CSP. CB-RP employs a heart algorithm to cluster the arriving requests based on its characteristics. The CB-RP technique aims to analyze the requests and provision the resources according to the request category. Simulation results show that our technique produces significant improvements in terms of cost savings, resource utilization and turnaround time compared with state of art technique.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Author(s):  
Prerna Agarwal Et. al.

A comprehensive and functional approach is built in cloud computing, which can be used by cloud users to exchange information. Cloud service providers (CSPs) can transfer through server services through powerful data centres to cloud users. Data is protected through authentication of cloud users and CSPs can have outsourced data file sharing security assurance. The continuing change in cloud users, especially unauthenticated users or third parties poses a critical problem in ensuring privacy in data sharing. The multifunctional exchange of information while protecting information and personal protection from unauthorized or other third-party users remains a daunting challenge


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


Sign in / Sign up

Export Citation Format

Share Document