Current Issue : October - December Volume : 2015 Issue Number : 4 Articles : 5 Articles
This paper does a systematic review of the possible design space for cloud-hosted applications that may have\nchanging resource requirements that need to be supported through dynamic service level agreements (SLAs). The\nfundamental SLA functions are reviewed: Admission Control, Monitoring, SLA Evaluation, and SLA Enforcement ââ?¬â?? a\nclassic autonomic control cycle. This is followed by an investigation into possible application requirements and SLA\nenforcement mechanisms. We then identify five basic Load Types that a dynamic SLA system must manage: Best\nEffort, Throttled, Load Migration, Preemption and Spare Capacity. The key to meeting application SLA requirements\nunder changing surge conditions is to also manage the spare surge capacity. The use of this surge capacity could be\nmanaged by one of several identified load migration policies. A more detailed SLA architecture is presented that\ndiscusses specific SLA components. This is done in the context of the OpenStack since it is open source with a known\narchitecture. Based on this SLA architecture, a research and development plan is presented wherein fundamental\nissues are identified that need to be resolved through research and experimentation. Based on successful outcomes,\nfurther developments are considered in the plan to produce a complete, end-to-end dynamic SLA capability.\nExecuting on this plan will take significant resources and organization. The NSF Center for Cloud and Autonomic\nComputing is one possible avenue for pursuing these efforts. Given the growing importance of cloud performance\nmanagement in the wider marketplace, the cloud community would be well-served to coordinate cloud SLA\ndevelopment across organizations such as the IEEE, Open Grid Forum, and the TeleManagement Forum....
Cloud computing offers various computational resources via convenient on-demand service provision. Currently,\nheterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This\nsignificantly limits the effectiveness and efficiency for tasks implementation. Fundamentally, it is due to the lack\nof adequate specifications for service concepts, operations and interfaces from diverse cloud service models and\ntypes. This paper proposes a service management operation semantic description framework for comprehensive\ncloud service operation specification. Relying on ontological modelling techniques, cloud service operations are\nspecified via entity classification, attribute assertion, relationship assertion and annotation assertion. Further, the\nproposed framework benefits from operation reasoning application. It enables intelligent assistance for multiple\noperation preparation and remote execution tasks. Based on the approach, a cloud service operation ontology\nand a unified service access and manipulation system prototype are implemented. Extensive experiments are\nconducted over different cloud service providers and for distinct service models. Obtained results demonstrate\nthat the approach outperforms existing practices by facilitating reliable and effective service access, manipulation\nand interaction tasks....
This paper studies the preemption between programs running in different virtual machines on the same computer.\nOne of the current monitoring methods consist of updating the average steal time through collaboration with the\nhypervisor. However, the average is insufficient to diagnose abnormal latencies in time-sensitive applications.\nMoreover, the added latency is not directly visible from the virtual machine point of view. The main challenge is to\nrecover the cause of preemption of a task running in a virtual machine, whether it is a task on the host computer or in\nanother virtual machine.\nWe propose a new method to study thread preemption crossing virtual machines boundaries using kernel tracing.\nThe host computer and each monitored virtual machine are traced simultaneously. We developed an efficient and\nportable trace synchronization method, which is required to account for time offset and drift that occur within each\nvirtual machine. We then devised an algorithm to recover the root cause of preemption between threads at every\nlevel. The algorithm successfully detected interactions between multiple competing threads in distinct virtual\nmachines on a multi-core machine....
Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages\nthey have to offer and especially the economic advantages in the era of an economic crisis. In addition to this\nrevolution, several security matters emerged and especially the confrontation of malicious insiders. This paper proposes\na methodology for detecting the co-residency and network stressing attacks in the kernel layer of a Kvm-based cloud\nenvironment, using an implementation of the Smith-Waterman genetic algorithm. The proposed approach has been\nexplored in a test bed environment, producing results that verify its effectiveness....
Efficient storage as a service feature provided by the cloud storage providers has exploited the way data is stored by\nmost of the users. Cloud storage providers offer a space on server that can be utilized by cloud users. Data grows at an\nimpressive rate per year but point to be focused is out of that most of data is copy. Although keeping multiple copies of data\nhelps to provide higher availability and long term durability of data, at this point of time the data redundancy is immoderate.\nData deduplication is a solution to tackle this redundancy of data. By keeping single copy of repeated data, data deduplication is\nconsidered a promising solution. This reduces the storage cost by eliminating duplicate data. Improve users experience by\nreducing upload time and saving network bandwidth. This paper presents method to deduplicate files in cloud storage at file\nlevel deduplication. This also presents possible threat of uncontrolled deletion of files by clients in previous approach and it\nsolution....
Loading....