SLA Based Utility Analysis for Improving QoS in Cloud Computing

被引:1
|
作者
Sheshasaayee, Ananthi [1 ]
Margaret, T. A. Swetha [1 ]
机构
[1] Quaid E Millath Govt Coll Women, Dept Comp Sci, Madras 600002, Tamil Nadu, India
关键词
Cloud utility computing; Market-oriented slant; SaaS platform broker and agents; SLA treaty; QoS parameters;
D O I
10.1007/978-81-322-2757-1_56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A service rented or leased from cloud resource providers follows a systematic procedure on working with the resource and returning them in the same accordance. In relevant terms it can be stated like policies that a user need to adhere in order to utilize the resources. These polices are clearly declared on an agreement to define the service level policies to the cloud users. This agreement stances or acts as a legal document between the user and the resource provider. The most important role of an SLA treaty is to provide quality assured service to its users as stated on the agreement. Quality Agreement of negotiation among the contributors helps in defining the Quality of Service necessities of critical resource based progressions. Though, the negotiation process for users is a momentous job predominantly when there are frequent SaaS providers in the Cloud souk. Consequently, this paper proposes a novel briefing on negotiation agenda where a SaaS broker is employed as a resource provider for the customers to achieve the required service efficiently when negotiating with multiple providers. Negotiation framework simplifies intelligent mutual negotiating of SLAs between a SaaS agent and multiple providers to achieve different objectives for different participants. To capitalize on revenue and mend customer's contentment levels for the broker, the paper also proposes the design of strategies based counter generation techniques.
引用
收藏
页码:573 / 581
页数:9
相关论文
共 50 条
  • [31] A review of SLA specification languages in the Cloud Computing
    Maarouf, Adil
    Marzouk, Abderrahim
    Haqiq, Abdelkrim
    2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015,
  • [32] SLA in Cloud Computing Architectures: A Comprehensive Study
    Aljoumah, Eman
    Al-Mousawi, Fajer
    Ahmad, Imtiaz
    Al-Shammri, Maha
    Al-Jady, Zahraa
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 7 - 31
  • [33] The SLA security issues in cloud computing services
    Barbu, Dragos
    Sipica, Alexandru
    Candet, Ionut
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2019, 29 (03): : 31 - 40
  • [34] Automated SLA Negotiation Framework for Cloud Computing
    Wu, Linlin
    Garg, Saurabh Kumar
    Buyya, Rajkumar
    Chen, Chao
    Versteeg, Steve
    PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 235 - 244
  • [35] A Survey on SLA and Performance Measurement in Cloud Computing
    Alhamad, Mohammed
    Dillon, Tharam
    Chang, Elizabeth
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, PT II, 2011, 7045 : 469 - 477
  • [36] Automation of the SLA Life Cycle in Cloud Computing
    Ghumman, Waheed Aslam
    SERVICE-ORIENTED COMPUTING - ICSOC 2013 WORKSHOPS, 2014, 8377 : 557 - 562
  • [37] A fact based analysis of decision trees for improving reliability in cloud computing
    Shahid, Muhammad Asim
    Alam, Muhammad Mansoor
    Su'ud, Mazliham Mohd
    PLOS ONE, 2024, 19 (12):
  • [38] Design and analysis of an efficient QoS improvement policy in cloud computing
    Banerjee S.
    Adhikari M.
    Biswas U.
    Service Oriented Computing and Applications, 2017, 11 (1) : 65 - 73
  • [39] QoS Based Efficient Resource Allocation and Scheduling in Cloud Computing
    Chahal, Harvinder
    Bhasin, Anshu
    Kaveri, Parag Ravikant
    INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2019, 15 (04) : 13 - 29
  • [40] GreenCloud for Simulating QoS-based NaaS in Cloud Computing
    Jiang Zhihua
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 766 - 770