2010 IEEE/IFIP Network Operations and Management Symposium Workshops 2010
DOI: 10.1109/nomsw.2010.5486528
|View full text |Cite
|
Sign up to set email alerts
|

Towards holistic multi-tenant monitoring for virtual data centers

Abstract: Cloud computing becomes increasingly prevalent for outsourcing IT functions. The basic feature of offering virtual data center slices to customers has been in use for some time now. So far, customers only get the raw resources, with only little insight and control of their resources. But to let customers build reliable services on top of the rented infrastructure, they need adequate monitoring and control capabilities. In the future, we expect operators to offer such functions to their customers. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…A monitoring system is comprehensive if it supports different types of resources (physical and virtualised) and is multiple tenants [11]. The latter requires:…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A monitoring system is comprehensive if it supports different types of resources (physical and virtualised) and is multiple tenants [11]. The latter requires:…”
Section: Related Workmentioning
confidence: 99%
“…To improve Intrusiveness and Comprehensiveness, [11] proposes an architecture based on agents that monitor directly the flow of information through the same workflow system. They are connected with adapters, which abstract from data of a specific technology.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A monitoring system is comprehensive if it supports different types of resources, several kinds of monitoring data, and multiple tenants [29]; it is extensible if such support can easily be extended; it is intrusive if its adoption requires significant modification to the Cloud [30]. Most non-Cloudspecific monitoring systems were already designed to provide extensibility and low intrusiveness.…”
Section: Definitions Properties and Issues And Platformsmentioning
confidence: 99%
“…Further, Lee et al [5] propose that multi-level IDS (Intrusion detection system) is required for protecting cloud computing environments from various security threats and attack patterns. Today major cloud service providers include capacity and resources for their services and QoS guarantees in their SLAs, specified in service level specification (SLS) including SLO (service level objective) [11], [12]. Logging can provide insights into Key Performance Indicators (KPI) about cloud provider SLA and QoS based on analysis.…”
Section: Introductionmentioning
confidence: 99%