contribution is the meta-model MonitorQoS4CS
which defines concepts related to the monitoring of
composite web services in order to detect potential
violations of the SLA contract.
The remainder of this paper is organized as
follows: Section 2 overviews works related to
monitoring Web services in the Cloud. Section 3
presents the meta-model for Composite Web Service
in the cloud (CompositeWSinTheCloud) regrouping
all three meta-models. Finally, Section 4
summarizes the presented work and highlights its
future directions.
2 RELATED WORK
Most of the ongoing research efforts dealing with
cloud monitoring, cf. (Shao et al., 2010), (Cao et al.,
2009) and (Clayman et al., 2010), tackled the
technical aspects and neglected the conceptual side
of monitoring.
Shao et al. (Shao et al., 2010) propose a Runtime
Model for Cloud Monitoring (RMCM). RMCM uses
interceptors (as filters in Apache Tomcat and
handlers in Axis) for service monitoring. It collects
all Cloud layer performance parameters. In the SaaS
layer, RMCM monitors applications while taking
into account their required constraints and design
models. To do so, it converts the constraints to a
corresponding instrumented code and deploys the
resulting code at the appropriate location of the
monitored applications. In other words, RMCM
modifies the source code of the applications being
monitored. In this work, Shao et al. (Shao et al.,
2010) do not propose any formalism for specifying
the constraints, which represent certain QoS
requirements to be monitored.
Cao et al. (Cao et al., 2009) propose a monitoring
architecture for Cloud computing. In this not-yet-
implemented architecture, cost is the only SLA
monitoring requirements.
Clayman et al. (Clayman et al., 2010) propose
the Lattice framework for Cloud service monitoring
in the RESERVOIR EU project. Lattice is capable of
monitoring physical resources, virtual machines and
customized applications. This approach addresses
some requirements and functionality of the service
cloud environment such as QoS, elasticity,
scalability, etc. Unlike our approach (Grati et al.,
2012), the Lattice framework does not explain how
the QoS requirements are specified.
Rak et al. (Rak et al., 2011) propose Cloud
application monitoring using the mOSAIC approach.
To benefit from mOSAIC, the application to be
monitored must be first customized using mOSAIC
API. Once customized, an application can be
monitored by gathering low-level information used
to perform manual or automatic load-balancing,
increase/decrease the number of virtual machines, or
calculate the total cost of the application execution.
Besides being intrusive on the application code, the
mOSAIC approach does not offer any formalism for
specifying QoS requirements.
Boniface et al. (Boniface et al., 2010) propose a
monitoring module that collects QoS parameters of
Cloud Computing. They use a monitoring
application component (AC) that must be first
described and registered in the application
repository. The AC collects QoS parameters at both
the application and technical levels. This approach is
complicated and hard to install due to the description
and registration of AC. In addition, similar to the
above approaches, this approach offers no means to
describe the QoS requirements.
Patel et al. (Patel and anabahu, 2009) propose a
mechanism for managing SLAs in a cloud
computing environment using the Web Service
Level Agreement (WSLA) framework. WSLA was
developed for SLA monitoring and enforcement in a
Service Oriented Architecture (SOA). This approach
uses the third party support feature of WSLA to
delegate monitoring and enforcement tasks to other
entities in order to solve the trust issues.
Wenzel et al. (Wenzel et al., 2012) develop an
approach to examine whether outsourcing of a
business process in a cloud environment is possible
while keeping all security and compliance
requirements. The first pillar of their approach is a
security risk analysis of the business process that are
to be outsourced into a cloud. The second pillar of
their approach is a compliance check that verifies
the legal regulations constraints are still kept. In
order to formulate such constraints, the meta model
of the business process model is extended with a set
of OCL expressions. The third pillar of their
approach is the automated analysis of security
properties. In their approach Wenzel et al. present
how they specify the constraints, which represent
certain security requirements but not in the context
of monitoring QoS for composite web service
deployed in the cloud to avoid SLA violations.
To the best of our knowledge, none of the
examined approaches deals with the conceptual
aspect for monitoring services in the Cloud. The
exception is the work of (Patel and Ranabahu, 2009)
who proposed an extension of WSLA to be adapted
to the Cloud environment; the extension lacks
however several concepts needed to link the SLA to
ICEIS2013-15thInternationalConferenceonEnterpriseInformationSystems
224