OPTIMIS approach.
Most of the SLA monitoring approaches discussed
in the above focus on the QoS aspect of services.
Nonetheless, PAEAN4CLOUD is able to detect the
QoS as well as security constraint violations in the
cloud environment. To the best of our knowledge, ex-
isting SLA monitoring solutions do not address the
security constraint violations. The SLA monitor of
the PAEAN4CLOUD relies on the category-based
violation detection approach that enhance the capa-
bility of the monitoring system for identifying vio-
lations efficiently. Additionally, the category-based
violation detection approach assists in deciding the
most suitable reconfiguration strategy for avoiding
the violation of SLAs. None of the SLA monitor-
ing approaches discussed in the above deals with the
category-based violation detection of cloud services.
7 CONCLUSION AND FUTURE
WORKS
In this paper, we have highlighted the challenges
of monitoring and predicting of SLA violations in
cloud service based applications. Thus, we moti-
vated emerging requirements for the monitoring, de-
tection, and configuring of SLA violation in a real
world scenario. We argued that the specific nature
of cloud service based applications using a mixture of
SaaS, PaaS and IaaS solutions - possibly from var-
ious providers, makes classic approaches incapable
of meeting these requirements. Consequently, we
proposed a PAEAN4CLOUD, a generic framework
monitoring, detecting, and configuring SLA viola-
tions. The framework relies on components and al-
gorithms for automated reasoning with CSBA for de-
tecting SLA. Currently we are exploring the idea of
root cause analysis for preventing SLA violations in
such as way that monitoring can play a pivotal role to
predict violations of the QoS requirements as stipu-
lated in the SLA and to suggest (manually or automat-
ically) some adjustment to enforce the running appli-
cation to comply with the agreed-on SLA. The adjust-
ment could be (1) to change the service infrastructure
in such way, that the application will be processed and
respect the SLA. Another possibility is to (2) apply
self-scaling (up/out) techniques to enable/enforce the
application to comply with the SLA of the application
as a whole.
REFERENCES
Boniface, M. J., Phillips, S., Perez, A. S.-M., and Surridge,
M. (2007). Dynamic service provisioning using gria
slas. In NFPSLA-SOC’07. Event Dates: 17th Septem-
ber 2007.
Chandrasekar, A., Chandrasekar, K., Mahadevan, M., and
Varalakshmi, P. (2012).
Comuzzi, M., Kotsokalis, C., Spanoudakis, G., and
Yahyapour, R. (2009). Establishing and monitoring
slas in complex service based systems. In ICWS, pages
783–790.
DeveloperWorks (2010). Review and summary of cloud ser-
vice level agreement.
Emeakaroha, V. C., Ferreto, T. C., Netto, M. A. S., Brandic,
I., and Rose, C. A. F. D. (2012a). Casvid: Application
level monitoring for sla violation detection in clouds.
In COMPSAC, pages 499–508.
Emeakaroha, V. C., Netto, M. A. S., Calheiros, R. N.,
Brandic, I., Buyya, R., and Rose, C. A. F. D. (2012b).
Towards autonomic detection of sla violations in
cloud infrastructures. Future Generation Comp. Syst.,
28(7):1017–1029.
European Comission: Information & Communication Tech-
nologies Unit (2010). 4CaaSt: Building the PaaS
Cloud of the Future. Project Objectives Document.
Ferrer, A. J., Hernndez, F., Tordsson, J., Elmroth, E., Ali-
Eldin, A., Zsigri, C., Sirvent, R., Guitart, J., Badia,
R. M., Djemame, K., Ziegler, W., Dimitrakos, T., Nair,
S. K., Kousiouris, G., Konstanteli, K., Varvarigou, T.,
Hudzia, B., Kipp, A., Wesner, S., Corrales, M., Forg,
N., Sharif, T., and Sheridan, C. (2012). Optimis: A
holistic approach to cloud service provisioning. Fu-
ture Generation Computer Systems, 28(1):66 – 77.
Fu, W. and Huang, Q. (2006). Grideye: A service-oriented
grid monitoring system with improved forecasting al-
gorithm. In GCC Workshops, pages 5–12.
Hammadi, A. M. and Hussain, O. (2012). A framework
for sla assurance in cloud computing. In AINA Work-
shops, pages 393–398.
Koller, B. and Schubert, L. (2007). Towards autonomous sla
management using a proxy-like approach. Multiagent
and Grid Systems, 3(3):313–325.
Nguyen, D. K., Lelli, F., Papazoglou, M. P., and van den
Heuvel, W.-J. (2012a). Blueprinting approach in sup-
port of cloud computing. Future Internet, 4(1):322–
346.
Nguyen, D. K., Lelli, F., Papazoglou, M. P., and van den
Heuvel, W.-J. (2012b). Issue in automatic combina-
tion of cloud services. In ISPA, pages 487–493.
Sukwong, O., Sangpetch, A., and Kim, H. S. (2012).
Sageshift: Managing slas for highly consolidated
cloud. In INFOCOM, pages 208–216.
Wood, T., Shenoy, P. J., Venkataramani, A., and Yousif,
M. S. (2009). Sandpiper: Black-box and gray-box re-
source management for virtual machines. Computer
Networks, 53(17):2923–2938.
Wu, L. and Buyya, R. (2010). Service level agreement (sla)
in utility computing systems. CoRR, abs/1010.2881.
PAEAN4CLOUD-AFrameworkforMonitoringandManagingtheSLAViolationofCloudService-basedApplications
371