DocumentCode :
1972467
Title :
Verifying cloud Service Level Agreement
Author :
Lin Ye ; Hongli Zhang ; Jiantao Shi ; Xiaojiang Du
Author_Institution :
Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China
fYear :
2012
fDate :
3-7 Dec. 2012
Firstpage :
777
Lastpage :
782
Abstract :
In this paper we study the important issue of verifying Service Level Agreement (SLA) in a semi-trusted (or untrusted) cloud. Cloud computing services promise elastic computing and storage resources in a pay-as-you-go way. A SLA between a cloud service provider (CSP) and a user is a contract which specifies the resources and performances that the cloud should offer. However, the CSP has the incentive to cheat on SLA, e.g., providing users with less CPU and memory resources than that specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can disrupt the existing SLA monitoring/verification techniques by interfering the monitoring/measurement process. Therefore, we present a SLA verification framework that leverages a third party auditor (TPA). Under the TPA framework, we propose an effective testing algorithm that can detect SLA violations of physical memory size in virtual machine (VM). Using real experiments, we show that the algorithm can detect cloud cheating on VM memory size (i.e., SLA violations). Furthermore, our algorithm can defend various attacks from a malicious CSP, which tries to hide a SLA violation.
Keywords :
cloud computing; contracts; storage management; trusted computing; virtual machines; SLA monitoring technique; SLA verification framework; SLA verification technique; SLA violation detection; TPA framework; VM memory size; cloud cheating detect; cloud computing services; cloud service level agreement verification framework; cloud service provider; contract; elastic computing; malicious CSP; measurement process; monitoring process; pay-as-you-go services; physical memory size; semitrusted cloud; storage resources; testing algorithm; third party auditor; untrusted cloud; virtual machine; Cloud Computing; Monitoring; Service Level Agreement; Testing; Verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2012 IEEE
Conference_Location :
Anaheim, CA
ISSN :
1930-529X
Print_ISBN :
978-1-4673-0920-2
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2012.6503207
Filename :
6503207
Link To Document :
بازگشت