Verifying Cloud Service Level Agreement

被引:0
作者
Ye, Lin [1 ]
Zhang, Hongli [1 ]
Shi, Jiantao [1 ]
Du, Xiaojiang
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150006, Peoples R China
来源
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2012年
关键词
Cloud Computing; Service Level Agreement; Verification; Monitoring; Testing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we study the important issue of verifying Service Level Agreement (SLA) in a semi-trusted (or untrusted) cloud. Cloud computing services promise elastic computing and storage resources in a pay-as-you-go way. A SLA between a cloud service provider (CSP) and a user is a contract which specifies the resources and performances that the cloud should offer. However, the CSP has the incentive to cheat on SLA, e.g., providing users with less CPU and memory resources than that specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can disrupt the existing SLA monitoring/verification techniques by interfering the monitoring/measurement process. Therefore, we present a SLA verification framework that leverages a third party auditor (TPA). Under the TPA framework, we propose an effective testing algorithm that can detect SLA violations of physical memory size in virtual machine (VM). Using real experiments, we show that the algorithm can detect cloud cheating on VM memory size (i.e., SLA violations). Furthermore, our algorithm can defend various attacks from a malicious CSP, which tries to hide a SLA violation.
引用
收藏
页码:777 / 782
页数:6
相关论文
共 12 条
[1]  
Akoush Sherif, 2010, Proceedings 18th IEEE/ACM International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2010), P37, DOI 10.1109/MASCOTS.2010.13
[2]  
[Anonymous], 2010, INTERNET MEASUREMENT, DOI DOI 10.1145/1879141.1879143
[3]   HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity [J].
Azab, Ahmed M. ;
Ning, Peng ;
Wang, Zhi ;
Jiang, Xuxian ;
Zhang, Xiaolan ;
Skalsky, Nathan C. .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :38-49
[4]  
Brandic I., 2010, P 34 ANN IEEE COMP S, P366
[5]  
Goldberg S, 2008, PERF E R SI, V36, P193, DOI 10.1145/1384529.1375480
[6]  
Martin J, 2002, IEEE INFOCOM SER, P855, DOI 10.1109/INFCOM.2002.1019332
[7]  
Mell P., 2011, NIST DEFINITION CLOU, P7
[8]   An efficient and lightweight method for Service Level Agreement assessment [J].
Serral-Gracia, Rene ;
Yannuzzi, Marcelo ;
Labit, Yann ;
Owezarski, Philippe ;
Masip-Bruin, Xavi .
COMPUTER NETWORKS, 2010, 54 (17) :3144-3158
[9]  
SHAIKH A, 2005, ACM SIGCOMM TUT SESS
[10]   Multiobjective Monitoring for SLA Compliance [J].
Sommers, Joel ;
Barford, Paul ;
Duffield, Nick ;
Ron, Amos .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (02) :652-665