Publication | Open Access
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures
54
Citations
15
References
2010
Year
Unknown Venue
Cluster ComputingProvisioning (Technology)Self-manageable Cloud InfrastructuresEngineeringInformation SecurityCloud Computing ArchitectureSla ViolationSoftware EngineeringSoftware AnalysisCloud Resource ManagementLayered ApproachLayered Cloud ArchitectureHardware SecuritySla-violation PropagationCloud ContinuumSystems EngineeringDistributed CloudCloud Computing SecurityComputer ScienceCloud Service AdaptationData SecurityEdge ComputingCloud ComputingCloud InfrastructureMulticloud
Cloud computing represents a promising computing paradigm where computing resources have to be allocated to software for their execution. Self-manageable Cloud infrastructures are required to achieve that level of flexibility on one hand, and to comply to users' requirements specified by means of Service Level Agreements (SLAs) on the other. Such infrastructures should automatically respond to changing component, workload, and environmental conditions minimizing user interactions with the system and preventing violations of agreed SLAs. However, identification of sources responsible for the possible SLA violation and the decision about the reactive actions necessary to prevent SLA violation is far from trivial. First, in this paper we present a novel approach for mapping low-level resource metrics to SLA parameters necessary for the identification of failure sources. Second, we devise a layered Cloud architecture for the bottom-up propagation of failures to the layer, which can react to sensed SLA violation threats. Moreover, we present a communication model for the propagation of SLA violation threats to the appropriate layer of the Cloud infrastructure, which includes negotiators, brokers, and automatic service deployer.
| Year | Citations | |
|---|---|---|
Page 1
Page 1