2018
DOI: 10.1093/comjnl/bxx118
|View full text |Cite
|
Sign up to set email alerts
|

Risk-based framework for SLA violation abatement from the cloud service provider’s perspective

Abstract: The constant increase in the growth of the cloud market creates new challenges for cloud service providers. One such challenge is the need to avoid possible SLA violations and their consequences through good SLA management. Researchers have proposed various frameworks and have made significant advances in managing SLAs from the perspective of both cloud users and providers. However, none of these approaches guides the service provider on the necessary steps to take for SLA violation abatement; that is, the pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 43 publications
0
18
0
Order By: Relevance
“…Cloud computing seems to be a technical phenomenon for contracting as a company that manages the flexible and adaptable IT resources. One of the important aspects of this model is the assured on-demand accessibility over the Internet of distributed resources to address problems with high-performance computing (HPC) (Hussain et al 2018b). The resources are distributed all over the world to provide services rapidly to the consumers.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing seems to be a technical phenomenon for contracting as a company that manages the flexible and adaptable IT resources. One of the important aspects of this model is the assured on-demand accessibility over the Internet of distributed resources to address problems with high-performance computing (HPC) (Hussain et al 2018b). The resources are distributed all over the world to provide services rapidly to the consumers.…”
Section: Introductionmentioning
confidence: 99%
“…These parameters can be highly dynamic especially under unexpected variation of the workload. Moreover, the characteristics of task also play an important role on the system performance [24]. In our work, the state space S contains all of environment states, and each state includes three parameters: server states, network states and tasks characteristic.…”
Section: State Spacementioning
confidence: 99%
“…When the system finds that the value of QoSPM exceeds the threshold value, then the risk management module (RMM) is activated to determine the risk of possible SLA violation and take the appropriate action to mitigate it. The detail on the risk management module is presented in [49].…”
Section: Viable Sla Management Framework (2phased-vslam)mentioning
confidence: 99%