SlideShare uma empresa Scribd logo
1 de 12
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
DOI : 10.5121/ijcnc.2013.5314 189
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE
SELECTION AND PROVISIONING
Elarbi Badidi
College of Information Technology,
United Arab Emirates University, Al-Ain, United Arab Emirates
ebadidi@uaeu.ac.ae
ABSTRACT
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring.
KEYWORDS
Cloud Computing; Cloud Services; Quality-of-Service; Service Level Agreement, Cloud Service Broker
1. INTRODUCTION
Cloud computing permits a service-provisioning model, which typically involves the provisioning
over the Internet of dynamically scalable and virtualized services. Applications or services
offered by means of cloud computing are called cloud services. The three main models of cloud
services are: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-
a-Service (SaaS)[1]
The advent of cloud computing has led to many repercussions on end-users and organizations.
For end-users, a user using the cloud through a web-based application can access her documents
and files whenever she wants and wherever she is, rather than having to remain at her desk. She
can store more data in the cloud than on private computer systems. Documents and files stored in
the cloud permanently exist, no matter what happens to the user’s computer systems. In addition
to this, cloud computing opens the door to group collaboration as the users from different
physical locations can collaborate by sharing documents and files efficiently and at lower
costs.For organizations, in addition to the above benefits, small and medium sized businesses can
immediately take advantage of the enormous infrastructure of the cloud without having to
implement and administer it directly. They can access multiple data centers from anywhere on the
globe. This means that they can store more data than on their premises computer systems. It also
means that their computing personnel no longer need to worry about keeping software up-to-date,
but they will be free to concentrate more on innovation. If they need more processing power and
more storage, it is always available in the cloud and accessible in a cost effective manner.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
190
We believe that the success of cloud-based infrastructures will greatly depend on the level of
satisfaction of customers in terms of performance and quality-of service (QoS) they get from
cloud services providers. QoS refers to a collection of qualities or characteristics of a service,
such as availability, security, response-time, throughput, latency, reliability, and reputation for
the SaaS provisioning model. Such qualities are of interest to service providers and service
consumers alike. They are of interest to service providers when implementing multiple service
levels and priority-based admission mechanisms. The agreement between the customer and the
service provider is referred to as the Service Level Agreement (SLA). An SLA describes agreed
service functionality, cost, and qualities [2]. It is an agreement regarding the guarantees of the
service provided by the cloud service provider. It defines mutual understandings and expectations
of a service between the cloud service provider and service consumers. As of today, SLA-based
service provisioning is being used in IaaS and PaaS service delivery models. However, its
adoption in the SaaS service delivery model is still at its beginning. Cloud service providers
typically use a resources’ overprovision policy in their attempt to meet the SLA requirements
from various customers, in terms of availability and performance [3]. Resources are statistically
allocated to customers based on their requirements in the worst-case scenario. As a result of this
policy, cloud provider servers may be sub-optimally used, as numerous allocated resources may
be idle at run-time.
As the number of service customers is expected to grow in the coming years, it is vital for cloud
service providers to overcome this situation by being able to allocate resources on an as-needed
basis. Therefore, they should have the means to monitor resources’ usage and evaluate various
QoS metrics to be able to honor customers’ SLA requirements. Given the limited number of
solutions for SLA-based SaaS selection and provisioning and the heterogeneity of the APIs
provided by each SaaS provider, we set out to develop a framework that will:
 Allow service consumers to express their functional and nonfunctional requirements.
 Hide the heterogeneity of SaaS providers’ APIs from service consumers.
 Allow implementing QoS-driven selection of SaaS providers.
 Allow implementing SLA negotiation on behalf of the service consumer.
 Permit monitoring and assessment of SLAs execution.
The main component of the proposed framework is the Cloud Service Broker (CSB), which
mediates between service consumers and SaaS providers in order to reach SLAs, and implements
the above management operations.
The remainder of this paper is organized as follows. The next section describes related work.
Section 3 briefly describes background information on the concepts of cloud services and cloud
service brokerage. Section 4 highlights the issues that organizations and businesses need to
consider for the selection of potential SaaS offerings. Section 5 presents an overview of the
proposed framework and describes the activities of its components. Section 6 describes the
proposed algorithm for SaaS offerings’ selection. Finally, Section 7 concludes the paper and
describes future work.
2. RELATED WORK
Cloud service brokerage and the issues of SLA management, SLA negotiation in particular, are
the subject of several research efforts over the last few years.
In the European project mOSAIC (www.mosaic-cloud.eu), an essential component is the Cloud
Agency, which aims to allow cloud service consumers to delegate to the agency all SLA
management tasks, the monitoring of resource utilization, and in some circumstances re-
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
191
negotiation of SLA terms as the requirements of consumers may change [4]. The Cloud Agency
system comprises several agents that collaborate to manage cloud resources and services offered
by diverse cloud providers.
The SLA@SOI project is an ambitious project whose goal is defining a comprehensive view for
the management of SLAs and developing a framework for SLA management that a service-
oriented infrastructure (SOI) can incorporate[5]. Within this project, Theilmann et al. developed a
reference architecture for multi-Level SLA management [6]. This architecture aims to offer a
generic solution for SLA management that can: (1) support SLA management across multiple
layers of a service-oriented infrastructure; (2) cover the complete SLA and service life cycle; and
(3) be used in various industrial domains and use cases.
OPTIMIS [7] is a toolkit, which aims at optimizing the whole cloud service life cycle, including
service creation, deployment, configuration, and operation, by considering non-functional issues
such as trust, risk, eco-efficiency and cost. The toolkit targets mainly service providers and
infrastructure providers and may also impact other actors such as brokers, and service consumers.
The fundamental process during deployment is the negotiation of SLA terms between service
providers and infrastructure providers.
Only few works, however, have investigated the issue of cloud services selection. Garg et al. [8]
proposed the SMICloud framework for comparing and ranking cloud services by defining a set of
attributes for the comparison of mainly IaaS cloud offerings. The ranking mechanism relies on the
Analytical Hierarchical Process (AHP), which allows assigning weights to attributes in view of
the interdependencies among them.Wang et al. [9] proposed a cloud model for the selection of
Web services. This model relies on computing what the authors called QoS uncertainty and
identifies the most appropriate Web services using mixed integer programming.Hussain et al. [10]
proposed a multi-criteria decision making methodology for the selection of cloud services. To
rank services, they match the user requirements against each service offering for each criterion.
They also use the weighted difference or the exponential weighted difference methods to decide
on the most suitable service.Similarly, Li et al. [11][12][13] developed CloudCmp a promising
system for comparing offers from cloud providers in terms of performance and cost. CloudCmp
uses ten metrics to compare the common services of cloud providers, mainly elastic computing
cluster, persistent storage, intra-cloud and wide area network services. Results of the system will
enable cloud users to predict the performance and cost of their applications before they deploy
them on the cloud.Rehman et al. [14] proposed a system that relies on information collected by
existing cloud users to make selection of cloud offerings. We think that this approach is not
feasible in practice as many users will be reluctant to divulge information about the usage of their
applications deployed in the cloud.
Our work shares with some of these efforts the common goal of mediating between service
consumers and cloud service providers and providing support for automated SLA negotiation and
management. We are focusing as a first step on the SaaS provisioning model. Finding the right
SaaS provider is not an easy task for service consumers given the abundance and the variety of
service offerings. Dealing with a SaaS provider requires knowledge of its operating environment,
the availability of management tools, its security levels and data recovery approaches, and the
service terms and conditions. Collecting this information for multiple service providers is likely
to be a fastidious task that is costly and time consuming. The CSB with its know-how and value-
added services will assist service consumers in: (a) finding appropriate SaaS offerings, (b)
negotiating SLA terms, and (c) monitoring and assessing the implementation of SLAs.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
192
3. BACKGROUND
3.1. Cloud Services
Applications or services offered by means of cloud computing are called cloud services. Typical
examples of cloud services include office applications (word processing, spreadsheets, and
presentations) that are traditionally desktop applications. Google Docs and Microsoft office Web
Apps are cloud services of this category. Other examples include storage services, calendar, and
notebooks’ applications and many more. Many of these cloud-based applications are now
available in the Chrome Web Store. Nearly, all large software corporations, such as Google,
Microsoft, Amazon, IBM, and Oracle, are providing various kinds of cloud services. Besides,
many small businesses have launched their own Web-based services, mainly to take advantage of
the collaborative nature of cloud services.
The user of a cloud service has access to the service through a Web interface or via an API. Once
started, the cloud service application acts as if it is a normal desktop application. The difference is
that working documents are on the cloud servers. Cloud services offer all the benefits we have
already mentioned. Cloud computing today is witnessing considerable interest from both
academia and the computing industry. Many leading computing companies, such as Google,
Amazon, Oracle, and Microsoft, are devoting resources for promoting cloud computing through
the development of cloud services development tools. As we mentioned earlier in the
introduction, Cloud services models are IaaS, PaaS, and SaaS.
One of the underlying advantages of the deployment of services in the cloud is the economy of
scale. By making the most of the cloud infrastructure provided by a cloud vendor, a service
provider can offer better, cheaper, and more reliable services than is possible within its premises.
The cloud service can utilize the full processing and storage resources of the cloud infrastructure
if needed. Another advantage is scalability in terms of computing resources. Service providers
can scale up when additional resources are required as a result of a rise in the demand for their
services. Conversely, they can scale down when the demand for service is decreasing. Another
benefit of the approach is that it enables clients getting service on a pay-as-you-go basis and
selecting cloud services based on the price and other criteria such as QoS. The net benefit for
consumers and mobile users, in particular, is the ability to receive better services tailored to their
current needs.
SaaS represents the trend of the future and the most common form of cloud service development.
With SaaS, software is deployed over the Internet and delivered to thousands of customers. Using
this model, the cloud service provider may license its service to customers through a subscription
or a pay-as-you-go model. The service is then accessible using an API.
3.2. Cloud Service Brokerage
As cloud computing technology matures, cloud services offers are proliferating at an
unprecedented pace. As in every business with a delivery model, such as real estate and
insurance, cloud services’ brokerage will emerge in order to enable organizations to procure
cloud services efficiently. Indeed, finding the right cloud service is not an easy task for service
consumers given the plethora and the variety of cloud services offerings. Dealing with a cloud
service provider requires knowledge of its operating environment, the availability of management
tools, its security levels and data recovery approaches, and the service terms and conditions.
Collecting this information for multiple cloud service providers is likely to be a demanding task
that is expensive and time consuming. Cloud service brokers (CSBs) with their know-how and
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
193
value-added services will assist service consumers in finding appropriate cloud service offerings,
carrying out the SLA negotiation process, monitoring and assessing the implementation of SLAs.
Gartner predicts that in parallel with the growing adoption of cloud services CSBs will emerge.
They will mainly be in charge of the management of the utilization, performance, and delivery of
cloud services. CSBs will broker relationships between service consumer and multiple cloud
providers [8].
"The future of cloud computing will be permeated with the notion of brokers negotiating
relationships between providers of cloud services and the service customers. In this context, a
broker might be software, appliances, platforms or suites of technologies that enhance the base
services available through the cloud. Enhancement will include managing access to these
services, providing greater security or even creating completely new services, "[15].
The NIST identified in its Cloud Computing Reference Model the Cloud Broker actor, which is in
charge of service intermediation, service aggregation, and service arbitrage [16].
The concept of brokerage service is not new in IT; telecommunication and traditional distributed
systems have used brokers in order to manage quality-of-service. Recently, several SOA-based
systems have used brokers to mediate between clients and service providers [17][18][19]. The
broker’s goal is to facilitate the transactions between service requesters and providers, create a
seamlessly trusted environment, and make recommendations as accurate as possible. The
functions of the service broker typically include monitoring and collecting QoS information of
Web services, making selection decisions on-behalf of clients, and negotiating SLAs and QoS
assurances with Web services.
Moore et al. [20] designed and implemented a Web service broker to help manage the interactions
and data exchange between clients looking up for services and SaaS providers interested in
promoting their services in a trusted environment. The service broker acts as a container for
publishing heterogeneous SaaS applications from various SaaS providers. It manages trust issues
between the provider and the client, and thus allows providers to lower their own trust policies.
4. ISSUES TO CONSIDER FOR SAAS PROVIDERS’ SELECTION
Organizations and consumers who choose to use SaaS services need to consider several issues
before relying on SaaS provisioning. These issues concern essentially service functionality,
integration with on-premises services, SLA negotiation and compliance monitoring, software
change management, data access, and data security.
Service functionality - The organization has to make sure that the SaaS offering has almost all the
features of the on-site, internally deployed service in the case of an existing on-premises service
and all the necessary features in the case of a new service that will integrate with existing
services. Moreover, the organization should check whether the SaaS offering is about a
differentiated service with, for example, platinum, gold, and silver service levels.
Integration with on-premises services – The organization should be aware of any requirements
for the integration of the SaaS offering with its existing, internal, on-site applications. For
instance, the conformity of the data format used internally with the format used by the SaaS
offering and network security requirements for the integration should be assessed.
SLA negotiation and compliance monitoring - The organization has to make sure that: (1) an
SLA governs the service provisioning; (2) the two parties need to negotiate the terms of the SLA;
(3) it has the necessary information on the SLA options available from the SaaS offering; (4) the
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
194
SLA meets its business needs; (5) the SaaS provider monitors its service provisioning and
evaluates its compliance with the SLA; (6) it can rely on third parties, such as
keynote(keynote.com), for SLA compliance monitoring; and (7) the SLA includes penalty and
compensation sections for SLA noncompliance.
Software change management – Software change management is part of any SaaS offering as
new versions of software are developed and deployed to meet emerging business needs. Since the
need to document, track and manage software doesn’t change, the organization needs to realize in
advance whether: (1) the SaaS provider will handle patches, service level releases and other
upgrades consistently with its expectations; (2) the SaaS provider will carry out any change to the
SaaS offering’s environment in a similar test environment before its promotion to production; and
(3) the organization will contribute to any upgrade and testing of new versions of the software.
Data storage and access - Data storage and access are critical issues for enterprises. Therefore, it
is extremely vital for the organization to know in advance: (1) how the SaaS provider is going to
use the organization data; (2) whether the SaaS provider’s privacy policy is consistent with the
expectations of the organization regarding the utilization of its data; (3) whether the SaaS
provider allows importing from and exporting data to the SaaS solution; (4) whether it has full
access to its data within the SaaS offering; (5) whether its data is totally isolated from any other
client of the SaaS offering; and (6) whether the SaaS provider will destroy from its storage the
organization’s data if it terminates the agreement with the SaaS provider.
Data security – Data security is also a critical matter for the organization. Indeed, it is crucial for
the organization to know in advance whether: (1) the SaaS provider has in place anti-theft
mechanisms; (2) it conducts security tests and third party audit on a regular basis; (3) it offers
legal commitments concerning their security measures; and (4) the SaaS provider’s country offers
necessary legal protection of the organization’s data.
5. FRAMEWORK OVERVIEW
Figure 1 depicts our framework for SLA-based service provisioning. The main components of the
framework are: Service consumers (SCs), Cloud Service Broker (CSB), Measurement Services,
and SaaS Providers (CSPs).
As we mentioned earlier, the Cloud Service Broker (CSB) is a mediator service that decouples
service consumers from SaaS providers. It is in charge of handling subscriptions of service
consumers in which they express their interest to obtain some kinds of service, and registration of
SaaS providers that are willing to provide some types of service. Given that service consumers do
not normally have the capabilities to negotiate, manage, and monitor QoS, they delegate
management tasks, such as SaaS providers’ selection and SLA negotiation, to the Cloud Service
Broker. The Cloud Service Broker can be typically used in the following scenario: A University
has a number of graduate students and Colleges’ employees that want to use an external public
cloud service, e.g. a grammar checker or bibliographic references and abstracts provider. The
CSB acts as a secure gateway that translates the Ids of the students and colleges’ staff to the
credentials used to access the external cloud service. It actively monitors the implementation of
the SLA and generates reports on the service usage by each college.
The Cloud Service Broker performs several management operations to deliver personalized
services to consumers. These operations are: Identity and Access Management (IAM), Policies
Management (PM), SLA Management (SLAM), and Service Provisioning (SP). They are under
the control of a Coordinator component. The back-end databases maintain information about
services’ policies, consumers’ profiles and preferences, SLAs, and dynamic QoS information.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
195
Figure 1. Framework for SaaS selection and provisioning
Several competing SaaS providers may provide the same service type. Therefore, potential
service consumers should be able to select SaaS providers on the basis of the QoS they can assure
and on their commitment to negotiated SLA. The Selection Manager that implements SP
management operations is in charge of implementing different policies for the selection of
suitable SaaS providers, based on the consumer’s QoS requirements and the SaaS providers’ QoS
offerings.
The SLA Manager, which implements SLAM management operations, is in charge of carrying
out the negotiation process between a consumer and a selected SaaS provider in order to reach an
agreement as to the service terms and conditions. It approaches this SaaS provider to determine
whether it can ensure the required level of service given its current conditions. Then, the
consumer and the SaaS provider sign a contract. The contract specifies the service that the
provider should offer, the level of service to ensure, the cost of service, and actions to take when
several violations of the agreement occur. If the selected SaaS provider is unable to deliver the
required level of service, the CSB selects another SaaS provider and reiterates the negotiation
process.
The Profile Manager,which implements IAM management operations, is responsible for
managing clients’ profiles, including their preferences in terms of personalized services and
required QoS. The Policy Manager, which implements PM management operations, is
responsible for managing different kinds of policies such as authorization policies and QoS-aware
selection policies of service providers.
SaaS providers typically offer several types of services using Web services. These Web services
can be simple or composite Web services. Composite Web services are the result of the
composition of many simple or composite services. In order to estimate their current QoS for
each service type they offer, service providers should use monitoring techniques to collect
measurement data at selected observation points. By aggregating collected data, the SaaS
provider can determine the value of each QoS indicator and checks its compliance with the SLA.
If there is a significant drop in the actual QoS offering, the SaaS provider might take appropriate
actions such as adding more resources to avoid any complaint from the service consumer. Figure
4 shows a typical architecture of a SaaS Provider, which includes several management functions
that cooperate in order to deliver personalized services to consumers. These functions are:
Identity and Access Management (IAM), Policies Management (PM), SLA Management (SLAM),
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
196
Service Provisioning (SP), and Measurements and QoS Evaluation (MQE). The back-end
databases maintain information about services’ policies, consumers’ profiles, SLA templates,
Committed SLAs, and dynamic QoS information.The Measurements and QoS Evaluation
subsystem collects data on QoS indicators at various observation points and estimates current
QoS offerings. The SLA Manager component is responsible for negotiating with the Cloud
Service Broker, or directly with service consumers, the terms of service and the QoS level to be
delivered.
Figure 2. Typical architecture of a SaaS provider infrastructure
Measurement services, as depicted in figure 1, are third parties actors that have become new
players in the cloud ecosystem as they allow service providers to have independent monitoring of
their offerings and allow service consumers to make sure that they are getting the level of service
that the service provider promised. Examples of measurement and monitoring services are
keynote (keynote.com), Monitis (monitis.com), and Uptrends (uptrends.com). Measurement
services are in charge of mapping resource metrics into SLA parameters and monitoring current
service levels and their compliance with SLA. Plugins to these measurement services may be
added to the framework as service consumers and SaaS providers might prefer specific
monitoring companies.
6. A SAAS SELECTION ALGORITHM
As we mentioned earlier in the related work section, a limited number of works have investigated
the issue of cloud services selection. In this section, we describe an algorithm for the selection of
SaaS providers that can fulfill the service consumer request. The algorithm considers only non-
functional (mainly QoS) issues in the selection process. The other issues we discussed in section
3 are negotiated during the SLA negotiation process once the CSB has selected a potential SaaS
provider.
A service consumer may have her own preferences in terms of QoS, for the service she would
like to obtain. Similarly, SaaS providers may have different QoS offerings for each service they
are providing. We assume that QoS indicators are in normalized form with values between 0 and
1. A value of 1 means highest quality and 0 means lowest quality. The Cloud Service Broker,
upon reception of a SLA request, maps the service consumer expectations into normalized QoS
values.
Let , , … , be the vector of QoS parameters considered in the system. Let
, , … , , with 0 1, be the vector of minimum quality requirements that the
service consumer tolerates for the required type of service. These values are obtained by mapping
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
197
the quality expectations (platinum, gold, silver) of the service consumer into normalized form.
Let , , … , be the set of SaaS providers that can provide the service requested by
the service consumer. Let , , … , , with 0 1, be the QoS offering of the SaaS
provider .
The CSB’s Selection Manager evaluates an aggregate utility function and determines whether the
offer of a SaaS provider is acceptable or not. If we assume that the QoS attributes are
independent, the linear aggregate utility function can be defined by:
(1)
with ∑1 1.
Ui represents the individual utility function associated with the QoS attribute Xi, and wi is the
weight that the service consumer assigns to that attribute. The service provider offer is acceptable
to the CSB if the aggregate utility function exceeds a predefined threshold, which is calculated
from the service consumer expectations.
Various functions may be used to express the service consumer utility of an attribute Xi. We
borrow the function used in [21] to express that utility function as:
(2)
is a measure of the service consumer sensitivity to the QoS attribute . When 0, the
service consumer is indifferent to QoS attribute . When 1, the service consumer is
moderately sensitive to QoS attribute (the relationship is linear). When 1, the service
consumer is increasingly sensitive to QoS attribute . As increases, the service consumer is
expressing increasing concern about . For 1, as decreases to approach 0, the service
consumer is expressing increasing indifference to having .
Equation (1) becomes:
(3)
As a proof of concept, we consider a scenario where the QoS parameters considered in the system
are: availability, 1/response-time, reliability, and throughput. Table 1 depicts normalized
minimum QoS requirements of the service consumer, the weight and the sensitivity value
associated to each quality parameter.
Table1.Minimum QoS requirements of the service consumer
Availability 1/RT Reliability Throughput
ωi 0.35 0.15 0.35 0.15
mi 0.98 0.65 0.95 0.90
βi 1 1 1 1
Assume that four SaaS providers, as shown in Table 2, have submitted their QoS offerings to the
CSB. Theses providers are: SP1, SP2,SP3,and SP4.
Int
By com
from h
The va
the ser
the Qo
consum
Figure
SaaS o
sensitiv
has the
consum
expecta
7. CO
Given
provide
provide
In this
framew
consum
selectio
parame
quality
ternational Jou
SP1
SP2
SP3
SP4
mputing the a
highest offer to
alue between p
rvice consume
oS offerings o
mer.
Fig
3 shows the
offerings as
vity paramete
e most promi
mer.SP3 offer
ations.
ONCLUSION
the wide ad
ers, service c
ers that can sa
s paper, we
work relies on
mers and Saa
on algorithm
eters are inde
y requirement
urnal of Compu
Table2. Q
Availabilit
0.94
0.98
0.97
0.98
aggregate utili
o lowest:
SP4 (0
parentheses c
er computed
of SP1 and S
gure 3. Evoluti
variation in th
a function o
er is the same
ising offering
ing is very cl
N AND FUTU
doption of cl
consumers w
atisfy their fu
have presen
n a Cloud Se
aS providers
uses a linear
ependent, to r
ts of the servi
uter Networks
QoS offering o
ty
ity function f
0.92), SP3 (0.9
corresponds to
from the min
SP2 do not m
ion of the aggr
he aggregate
of the sensitiv
for all qualit
g as its aggre
lose to these
URE WORK
loud computi
will increasing
unctional and
nted a frame
ervice Broker
and negotiat
r aggregate u
rank the pote
ice consumer
& Communica
of four potentia
1/RT
0.70
0.60
0.80
0.85
for each SaaS
91), SP1 (0.88
o the compute
nimum quality
meet the minim
regate utility w
utility functio
vity paramet
ty parameters
egate utility e
expectations
K
ing technolog
gly face the
non-function
ework for S
r, which is in
ing the SLA
utility function
ential SaaS o
. We describe
ations (IJCNC)
al SaaS provide
Reliabilit
0.98
0.97
0.96
0.98
provider, we
8), SP2 (0.87)
ed aggregate
y requiremen
mum QoS re
with the sensitiv
on of the serv
er. To make
. In this scena
exceeds the e
.SP2 and SP1
gy and the g
challenge of
nal requiremen
SaaS selectio
n charge of m
terms. The
n, which assu
offerings by m
e in another a
) Vol.5, No.3, M
ers
ty Th
e get the follo
utility. The u
ts is 0.91. Th
equirements o
vity parameter
vice consume
e the scenario
ario, the SaaS
expectations o
offerings are
growing num
f finding appr
nts.
on and provi
mediating bet
proposed Saa
umes that the
matching them
article the int
May 2013
198
hroughput
0.70
0.65
0.75
0.70
owing ranking
utility value of
his means that
of the service
r and the four
o simple, the
S provider SP4
of the service
e below these
mber of SaaS
ropriate SaaS
isioning. The
tween service
aS providers
e various QoS
m against the
erfaces of the
8
g
f
t
e
r
e
4
e
e
S
S
e
e
’
S
e
e
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
199
various components of the Cloud Service Broker, the SLA negotiation process, and SLA
compliance monitoring. As a future work, we intend to define a common ontology for QoS
representation and the mapping from the diverse representations used by SaaS providers to that
common ontology; and build a prototype of the framework together with some real scenarios for
SLA-based service selection and provisioning.
REFERENCES
[1] P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of
Standards and Technology, Special Publication 800-145, 2011.
[2] A. Dan, et al., "Web services on demand: WSLA-driven automated management," IBM Systems
Journal, Vol. 43(1), pp. 136-158, 2004.
[3] S. Ferretti, et al., "Qos–aware clouds," In Proc. of the IEEE 3rd International Conference on Cloud
Computing (CLOUD 2010), pp. 321-328, 2010.
[4] S. Venticinque, R. Aversa, B. Di Martino, M. Rak, and D. Petcu, “A Cloud Agency for SLA
Negotiation and Management,” Euro-Par 2010 Parallel Processing Workshops, Lecture Notes in
Computer Science, Vol. 6586, pp. 587–594, 2011.
[5] SLA@SOI project. Empowering the Service Economy with SLA-aware Infrastructures,
http://www.sla-at-soi.eu/
[6] W. Theilmann, J. Happe, C. Kotsokalis, A. Edmonds, K. Kearney, J. Lambea, “A Reference
Architecture for Multi-Level SLA Management,” Journal of Internet Engineering, Vol. 4(1), pp.
289–298, 2010.
[7] A. J. Ferrer, F. Hernández, J. Tordsson, E. Elmroth, A. Ali-Eldin, C. Zsigri, R. Sirvent, J. Guitart,
R. M. Badia, and K. Djemame, “OPTIMIS: A holistic approach to cloud service provisioning,”
Future Generation Computer Systems, Vol. 28 (1), pp. 66–77, 2012.
[8] S. K. Garg, et al., "Smicloud: A framework for comparing and ranking cloud services," In proc. of
the 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 210-
218, 2011.
[9] S. WANG, et al., "Cloud model for service selection," In Proc. of the 2011 IEEE Conference on
Computer Communications Workshops (INFOCOM WKSHPS), pp. 666-671, 2011.
[10] F. K. Hussain and O. K. Hussain, "Towards Multi-Criteria Cloud Service Selection," In Proc. of
the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous
Computing (IMIS), pp. 44-48, 2011.
[11] A. Li, et al., "CloudCmp: comparing public cloud providers," In Proc. of the 10th annual
conference on Internet measurement, pp. 1-14, 2010.
[12] A. Li, et al., "CloudCmp: shopping for a cloud made easy," USENIX HotCloud, 2010.
[13] A. Li, et al., "Comparing public-cloud providers," Internet Computing, IEEE, Vol. 15, pp. 50-53,
2011.
[14] Z. ur Rehman, et al., "A Framework for User Feedback Based Cloud Service Monitoring,"
presented at the 2012 Sixth International Conference on Complex,Intelligent and Software
Intensive Systems (CISIS), 2012.
[15] Gartner, "Gartner Says Cloud Consumers Need Brokerages to Unlock the Potential of Cloud
Services,"2009. http://www.gartner.com/newsroom/id/1064712
[16] R. Bohn, J. Messina, F. Liu, and J. Tong, “NIST Cloud Computing Reference Architecture,” In
Proc. of the 2011 IEEE World Congress on Services (SERVICES 2011), pp. 594-596, 2011.
[17] G. Yeom and D. Min, "Design and Implementation of Web Services QoS Broker," In Proc. of the
2005 International Conference on Next Generation Web Services Practices (NWeSP 200), 2005.
[18] T. Yu and K. J. Lin, "A Broker-based Framework for QoS-aware Web Service Composition," In
Proc. of the 2005 IEEE International Conference on E-Technology, e-Commerce and e-Service,
(EEE’05), pp. 22-29, 2005.
[19] T. Yu and K. J. Lin, "The Design of QoS Broker Algorithms for QoS-Capable Web Services," In
Proc. of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service,
2004. EEE’04., pp. 17-24, 2004.
[20] B. Moore and Q. H. Mahmoud, "A service broker and business model for saas applications," In
Proc. of the IEEE/ACS International Conference on Computer Systems and Applications(AICCSA
2009), pp. 322-329, 2009.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
200
[21] A. AuYoung, L. Grit, J. Wiener, and J. Wilkes, “Service contracts and aggregate utility functions,”
In Proc. of the IEEE Symposium on High Performance Distributed Computing, pp. 119–131,
2006.
Authors
Dr. Elarbi Badidi received a Ph.D. degree in computer science in 2000 from Université de
Montréal, Québec (Canada). He joined the College of Information Technology (CIT) atthe
UAE University in Fall 2004 where he is currently an associate professor of computer
science. Before joining the CIT, Dr. Badidi worked at the ENSIAS school of engineering in
Rabat (Morocco) and Université de Montréal. Dr. Badidi has been conducting research in
the areas of object-based distributed systems, bioinformatics, and Web services. He served
on the technical program committees of many international conferences. His research interests include Web
services and Service Oriented Architectures, cloud computing, context-aware services, bioinformatics, and
middleware.

Mais conteúdo relacionado

Mais procurados

QOS Aware Formalized Model for Semantic Web Service Selection
QOS Aware Formalized Model for Semantic Web Service SelectionQOS Aware Formalized Model for Semantic Web Service Selection
QOS Aware Formalized Model for Semantic Web Service SelectionIJwest
 
Pricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyPricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyEditor IJCATR
 
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service SelectionMMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service SelectionIJAEMSJORNAL
 
market oriented cloud
market oriented cloudmarket oriented cloud
market oriented cloudACMBangalore
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
 
Pilot Texas Cloud Offering
Pilot Texas Cloud OfferingPilot Texas Cloud Offering
Pilot Texas Cloud OfferingGovCloud Network
 
Adaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle ManagementAdaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle Managementwhite paper
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
 
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...csandit
 
IBM --Enterprise messaging in the cloud
IBM --Enterprise messaging in the cloudIBM --Enterprise messaging in the cloud
IBM --Enterprise messaging in the cloudAbhishek Sood
 
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationA Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationIRJET Journal
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGovCloud Network
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commercer_arorabms
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
 
Service-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityService-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityYazd University
 

Mais procurados (18)

QOS Aware Formalized Model for Semantic Web Service Selection
QOS Aware Formalized Model for Semantic Web Service SelectionQOS Aware Formalized Model for Semantic Web Service Selection
QOS Aware Formalized Model for Semantic Web Service Selection
 
Pricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a SurveyPricing Models for Cloud Computing Services, a Survey
Pricing Models for Cloud Computing Services, a Survey
 
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service SelectionMMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
 
market oriented cloud
market oriented cloudmarket oriented cloud
market oriented cloud
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
 
Pricing model
Pricing modelPricing model
Pricing model
 
Plastic
PlasticPlastic
Plastic
 
Pilot Texas Cloud Offering
Pilot Texas Cloud OfferingPilot Texas Cloud Offering
Pilot Texas Cloud Offering
 
Adaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle ManagementAdaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle Management
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2
 
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
 
IBM --Enterprise messaging in the cloud
IBM --Enterprise messaging in the cloudIBM --Enterprise messaging in the cloud
IBM --Enterprise messaging in the cloud
 
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationA Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal Govt
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
 
Service-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to ReusabilityService-oriented Architecture with Respect to Reusability
Service-oriented Architecture with Respect to Reusability
 
Soa chapter 5
Soa chapter 5Soa chapter 5
Soa chapter 5
 

Destaque

A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesIJCNCJournal
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsIJCNCJournal
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
 

Destaque (19)

A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast trees
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
 

Semelhante a A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING

A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudTracy Drey
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computingneirew J
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...hemanthbbc
 
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...cscpconf
 
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docx
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docxRUNNING HEAD Intersession 6 Final Project Projection1Interse.docx
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docxjeanettehully
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesEswar Publications
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Levelcsandit
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingINFOGAIN PUBLICATION
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service brokerIJECEIAES
 

Semelhante a A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING (20)

A Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In CloudA Study On Service Level Agreement Management Techniques In Cloud
A Study On Service Level Agreement Management Techniques In Cloud
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
 
20150113
2015011320150113
20150113
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computing
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
 
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docx
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docxRUNNING HEAD Intersession 6 Final Project Projection1Interse.docx
RUNNING HEAD Intersession 6 Final Project Projection1Interse.docx
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment Services
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
T04503113118
T04503113118T04503113118
T04503113118
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud Computing
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service broker
 

Mais de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

Mais de IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 DOI : 10.5121/ijcnc.2013.5314 189 A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING Elarbi Badidi College of Information Technology, United Arab Emirates University, Al-Ain, United Arab Emirates ebadidi@uaeu.ac.ae ABSTRACT As cloud computing is increasingly transforming the information technology landscape, organizations and businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them increase business agility and reduce their operational costs. They increasingly demand services that can meet their functional and non-functional requirements. Given the plethora and the variety of SaaS offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB) helps service consumers find the right SaaS providers that can fulfil their functional and non-functional requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers, and performing SLA compliance monitoring. KEYWORDS Cloud Computing; Cloud Services; Quality-of-Service; Service Level Agreement, Cloud Service Broker 1. INTRODUCTION Cloud computing permits a service-provisioning model, which typically involves the provisioning over the Internet of dynamically scalable and virtualized services. Applications or services offered by means of cloud computing are called cloud services. The three main models of cloud services are: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as- a-Service (SaaS)[1] The advent of cloud computing has led to many repercussions on end-users and organizations. For end-users, a user using the cloud through a web-based application can access her documents and files whenever she wants and wherever she is, rather than having to remain at her desk. She can store more data in the cloud than on private computer systems. Documents and files stored in the cloud permanently exist, no matter what happens to the user’s computer systems. In addition to this, cloud computing opens the door to group collaboration as the users from different physical locations can collaborate by sharing documents and files efficiently and at lower costs.For organizations, in addition to the above benefits, small and medium sized businesses can immediately take advantage of the enormous infrastructure of the cloud without having to implement and administer it directly. They can access multiple data centers from anywhere on the globe. This means that they can store more data than on their premises computer systems. It also means that their computing personnel no longer need to worry about keeping software up-to-date, but they will be free to concentrate more on innovation. If they need more processing power and more storage, it is always available in the cloud and accessible in a cost effective manner.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 190 We believe that the success of cloud-based infrastructures will greatly depend on the level of satisfaction of customers in terms of performance and quality-of service (QoS) they get from cloud services providers. QoS refers to a collection of qualities or characteristics of a service, such as availability, security, response-time, throughput, latency, reliability, and reputation for the SaaS provisioning model. Such qualities are of interest to service providers and service consumers alike. They are of interest to service providers when implementing multiple service levels and priority-based admission mechanisms. The agreement between the customer and the service provider is referred to as the Service Level Agreement (SLA). An SLA describes agreed service functionality, cost, and qualities [2]. It is an agreement regarding the guarantees of the service provided by the cloud service provider. It defines mutual understandings and expectations of a service between the cloud service provider and service consumers. As of today, SLA-based service provisioning is being used in IaaS and PaaS service delivery models. However, its adoption in the SaaS service delivery model is still at its beginning. Cloud service providers typically use a resources’ overprovision policy in their attempt to meet the SLA requirements from various customers, in terms of availability and performance [3]. Resources are statistically allocated to customers based on their requirements in the worst-case scenario. As a result of this policy, cloud provider servers may be sub-optimally used, as numerous allocated resources may be idle at run-time. As the number of service customers is expected to grow in the coming years, it is vital for cloud service providers to overcome this situation by being able to allocate resources on an as-needed basis. Therefore, they should have the means to monitor resources’ usage and evaluate various QoS metrics to be able to honor customers’ SLA requirements. Given the limited number of solutions for SLA-based SaaS selection and provisioning and the heterogeneity of the APIs provided by each SaaS provider, we set out to develop a framework that will:  Allow service consumers to express their functional and nonfunctional requirements.  Hide the heterogeneity of SaaS providers’ APIs from service consumers.  Allow implementing QoS-driven selection of SaaS providers.  Allow implementing SLA negotiation on behalf of the service consumer.  Permit monitoring and assessment of SLAs execution. The main component of the proposed framework is the Cloud Service Broker (CSB), which mediates between service consumers and SaaS providers in order to reach SLAs, and implements the above management operations. The remainder of this paper is organized as follows. The next section describes related work. Section 3 briefly describes background information on the concepts of cloud services and cloud service brokerage. Section 4 highlights the issues that organizations and businesses need to consider for the selection of potential SaaS offerings. Section 5 presents an overview of the proposed framework and describes the activities of its components. Section 6 describes the proposed algorithm for SaaS offerings’ selection. Finally, Section 7 concludes the paper and describes future work. 2. RELATED WORK Cloud service brokerage and the issues of SLA management, SLA negotiation in particular, are the subject of several research efforts over the last few years. In the European project mOSAIC (www.mosaic-cloud.eu), an essential component is the Cloud Agency, which aims to allow cloud service consumers to delegate to the agency all SLA management tasks, the monitoring of resource utilization, and in some circumstances re-
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 191 negotiation of SLA terms as the requirements of consumers may change [4]. The Cloud Agency system comprises several agents that collaborate to manage cloud resources and services offered by diverse cloud providers. The SLA@SOI project is an ambitious project whose goal is defining a comprehensive view for the management of SLAs and developing a framework for SLA management that a service- oriented infrastructure (SOI) can incorporate[5]. Within this project, Theilmann et al. developed a reference architecture for multi-Level SLA management [6]. This architecture aims to offer a generic solution for SLA management that can: (1) support SLA management across multiple layers of a service-oriented infrastructure; (2) cover the complete SLA and service life cycle; and (3) be used in various industrial domains and use cases. OPTIMIS [7] is a toolkit, which aims at optimizing the whole cloud service life cycle, including service creation, deployment, configuration, and operation, by considering non-functional issues such as trust, risk, eco-efficiency and cost. The toolkit targets mainly service providers and infrastructure providers and may also impact other actors such as brokers, and service consumers. The fundamental process during deployment is the negotiation of SLA terms between service providers and infrastructure providers. Only few works, however, have investigated the issue of cloud services selection. Garg et al. [8] proposed the SMICloud framework for comparing and ranking cloud services by defining a set of attributes for the comparison of mainly IaaS cloud offerings. The ranking mechanism relies on the Analytical Hierarchical Process (AHP), which allows assigning weights to attributes in view of the interdependencies among them.Wang et al. [9] proposed a cloud model for the selection of Web services. This model relies on computing what the authors called QoS uncertainty and identifies the most appropriate Web services using mixed integer programming.Hussain et al. [10] proposed a multi-criteria decision making methodology for the selection of cloud services. To rank services, they match the user requirements against each service offering for each criterion. They also use the weighted difference or the exponential weighted difference methods to decide on the most suitable service.Similarly, Li et al. [11][12][13] developed CloudCmp a promising system for comparing offers from cloud providers in terms of performance and cost. CloudCmp uses ten metrics to compare the common services of cloud providers, mainly elastic computing cluster, persistent storage, intra-cloud and wide area network services. Results of the system will enable cloud users to predict the performance and cost of their applications before they deploy them on the cloud.Rehman et al. [14] proposed a system that relies on information collected by existing cloud users to make selection of cloud offerings. We think that this approach is not feasible in practice as many users will be reluctant to divulge information about the usage of their applications deployed in the cloud. Our work shares with some of these efforts the common goal of mediating between service consumers and cloud service providers and providing support for automated SLA negotiation and management. We are focusing as a first step on the SaaS provisioning model. Finding the right SaaS provider is not an easy task for service consumers given the abundance and the variety of service offerings. Dealing with a SaaS provider requires knowledge of its operating environment, the availability of management tools, its security levels and data recovery approaches, and the service terms and conditions. Collecting this information for multiple service providers is likely to be a fastidious task that is costly and time consuming. The CSB with its know-how and value- added services will assist service consumers in: (a) finding appropriate SaaS offerings, (b) negotiating SLA terms, and (c) monitoring and assessing the implementation of SLAs.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 192 3. BACKGROUND 3.1. Cloud Services Applications or services offered by means of cloud computing are called cloud services. Typical examples of cloud services include office applications (word processing, spreadsheets, and presentations) that are traditionally desktop applications. Google Docs and Microsoft office Web Apps are cloud services of this category. Other examples include storage services, calendar, and notebooks’ applications and many more. Many of these cloud-based applications are now available in the Chrome Web Store. Nearly, all large software corporations, such as Google, Microsoft, Amazon, IBM, and Oracle, are providing various kinds of cloud services. Besides, many small businesses have launched their own Web-based services, mainly to take advantage of the collaborative nature of cloud services. The user of a cloud service has access to the service through a Web interface or via an API. Once started, the cloud service application acts as if it is a normal desktop application. The difference is that working documents are on the cloud servers. Cloud services offer all the benefits we have already mentioned. Cloud computing today is witnessing considerable interest from both academia and the computing industry. Many leading computing companies, such as Google, Amazon, Oracle, and Microsoft, are devoting resources for promoting cloud computing through the development of cloud services development tools. As we mentioned earlier in the introduction, Cloud services models are IaaS, PaaS, and SaaS. One of the underlying advantages of the deployment of services in the cloud is the economy of scale. By making the most of the cloud infrastructure provided by a cloud vendor, a service provider can offer better, cheaper, and more reliable services than is possible within its premises. The cloud service can utilize the full processing and storage resources of the cloud infrastructure if needed. Another advantage is scalability in terms of computing resources. Service providers can scale up when additional resources are required as a result of a rise in the demand for their services. Conversely, they can scale down when the demand for service is decreasing. Another benefit of the approach is that it enables clients getting service on a pay-as-you-go basis and selecting cloud services based on the price and other criteria such as QoS. The net benefit for consumers and mobile users, in particular, is the ability to receive better services tailored to their current needs. SaaS represents the trend of the future and the most common form of cloud service development. With SaaS, software is deployed over the Internet and delivered to thousands of customers. Using this model, the cloud service provider may license its service to customers through a subscription or a pay-as-you-go model. The service is then accessible using an API. 3.2. Cloud Service Brokerage As cloud computing technology matures, cloud services offers are proliferating at an unprecedented pace. As in every business with a delivery model, such as real estate and insurance, cloud services’ brokerage will emerge in order to enable organizations to procure cloud services efficiently. Indeed, finding the right cloud service is not an easy task for service consumers given the plethora and the variety of cloud services offerings. Dealing with a cloud service provider requires knowledge of its operating environment, the availability of management tools, its security levels and data recovery approaches, and the service terms and conditions. Collecting this information for multiple cloud service providers is likely to be a demanding task that is expensive and time consuming. Cloud service brokers (CSBs) with their know-how and
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 193 value-added services will assist service consumers in finding appropriate cloud service offerings, carrying out the SLA negotiation process, monitoring and assessing the implementation of SLAs. Gartner predicts that in parallel with the growing adoption of cloud services CSBs will emerge. They will mainly be in charge of the management of the utilization, performance, and delivery of cloud services. CSBs will broker relationships between service consumer and multiple cloud providers [8]. "The future of cloud computing will be permeated with the notion of brokers negotiating relationships between providers of cloud services and the service customers. In this context, a broker might be software, appliances, platforms or suites of technologies that enhance the base services available through the cloud. Enhancement will include managing access to these services, providing greater security or even creating completely new services, "[15]. The NIST identified in its Cloud Computing Reference Model the Cloud Broker actor, which is in charge of service intermediation, service aggregation, and service arbitrage [16]. The concept of brokerage service is not new in IT; telecommunication and traditional distributed systems have used brokers in order to manage quality-of-service. Recently, several SOA-based systems have used brokers to mediate between clients and service providers [17][18][19]. The broker’s goal is to facilitate the transactions between service requesters and providers, create a seamlessly trusted environment, and make recommendations as accurate as possible. The functions of the service broker typically include monitoring and collecting QoS information of Web services, making selection decisions on-behalf of clients, and negotiating SLAs and QoS assurances with Web services. Moore et al. [20] designed and implemented a Web service broker to help manage the interactions and data exchange between clients looking up for services and SaaS providers interested in promoting their services in a trusted environment. The service broker acts as a container for publishing heterogeneous SaaS applications from various SaaS providers. It manages trust issues between the provider and the client, and thus allows providers to lower their own trust policies. 4. ISSUES TO CONSIDER FOR SAAS PROVIDERS’ SELECTION Organizations and consumers who choose to use SaaS services need to consider several issues before relying on SaaS provisioning. These issues concern essentially service functionality, integration with on-premises services, SLA negotiation and compliance monitoring, software change management, data access, and data security. Service functionality - The organization has to make sure that the SaaS offering has almost all the features of the on-site, internally deployed service in the case of an existing on-premises service and all the necessary features in the case of a new service that will integrate with existing services. Moreover, the organization should check whether the SaaS offering is about a differentiated service with, for example, platinum, gold, and silver service levels. Integration with on-premises services – The organization should be aware of any requirements for the integration of the SaaS offering with its existing, internal, on-site applications. For instance, the conformity of the data format used internally with the format used by the SaaS offering and network security requirements for the integration should be assessed. SLA negotiation and compliance monitoring - The organization has to make sure that: (1) an SLA governs the service provisioning; (2) the two parties need to negotiate the terms of the SLA; (3) it has the necessary information on the SLA options available from the SaaS offering; (4) the
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 194 SLA meets its business needs; (5) the SaaS provider monitors its service provisioning and evaluates its compliance with the SLA; (6) it can rely on third parties, such as keynote(keynote.com), for SLA compliance monitoring; and (7) the SLA includes penalty and compensation sections for SLA noncompliance. Software change management – Software change management is part of any SaaS offering as new versions of software are developed and deployed to meet emerging business needs. Since the need to document, track and manage software doesn’t change, the organization needs to realize in advance whether: (1) the SaaS provider will handle patches, service level releases and other upgrades consistently with its expectations; (2) the SaaS provider will carry out any change to the SaaS offering’s environment in a similar test environment before its promotion to production; and (3) the organization will contribute to any upgrade and testing of new versions of the software. Data storage and access - Data storage and access are critical issues for enterprises. Therefore, it is extremely vital for the organization to know in advance: (1) how the SaaS provider is going to use the organization data; (2) whether the SaaS provider’s privacy policy is consistent with the expectations of the organization regarding the utilization of its data; (3) whether the SaaS provider allows importing from and exporting data to the SaaS solution; (4) whether it has full access to its data within the SaaS offering; (5) whether its data is totally isolated from any other client of the SaaS offering; and (6) whether the SaaS provider will destroy from its storage the organization’s data if it terminates the agreement with the SaaS provider. Data security – Data security is also a critical matter for the organization. Indeed, it is crucial for the organization to know in advance whether: (1) the SaaS provider has in place anti-theft mechanisms; (2) it conducts security tests and third party audit on a regular basis; (3) it offers legal commitments concerning their security measures; and (4) the SaaS provider’s country offers necessary legal protection of the organization’s data. 5. FRAMEWORK OVERVIEW Figure 1 depicts our framework for SLA-based service provisioning. The main components of the framework are: Service consumers (SCs), Cloud Service Broker (CSB), Measurement Services, and SaaS Providers (CSPs). As we mentioned earlier, the Cloud Service Broker (CSB) is a mediator service that decouples service consumers from SaaS providers. It is in charge of handling subscriptions of service consumers in which they express their interest to obtain some kinds of service, and registration of SaaS providers that are willing to provide some types of service. Given that service consumers do not normally have the capabilities to negotiate, manage, and monitor QoS, they delegate management tasks, such as SaaS providers’ selection and SLA negotiation, to the Cloud Service Broker. The Cloud Service Broker can be typically used in the following scenario: A University has a number of graduate students and Colleges’ employees that want to use an external public cloud service, e.g. a grammar checker or bibliographic references and abstracts provider. The CSB acts as a secure gateway that translates the Ids of the students and colleges’ staff to the credentials used to access the external cloud service. It actively monitors the implementation of the SLA and generates reports on the service usage by each college. The Cloud Service Broker performs several management operations to deliver personalized services to consumers. These operations are: Identity and Access Management (IAM), Policies Management (PM), SLA Management (SLAM), and Service Provisioning (SP). They are under the control of a Coordinator component. The back-end databases maintain information about services’ policies, consumers’ profiles and preferences, SLAs, and dynamic QoS information.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 195 Figure 1. Framework for SaaS selection and provisioning Several competing SaaS providers may provide the same service type. Therefore, potential service consumers should be able to select SaaS providers on the basis of the QoS they can assure and on their commitment to negotiated SLA. The Selection Manager that implements SP management operations is in charge of implementing different policies for the selection of suitable SaaS providers, based on the consumer’s QoS requirements and the SaaS providers’ QoS offerings. The SLA Manager, which implements SLAM management operations, is in charge of carrying out the negotiation process between a consumer and a selected SaaS provider in order to reach an agreement as to the service terms and conditions. It approaches this SaaS provider to determine whether it can ensure the required level of service given its current conditions. Then, the consumer and the SaaS provider sign a contract. The contract specifies the service that the provider should offer, the level of service to ensure, the cost of service, and actions to take when several violations of the agreement occur. If the selected SaaS provider is unable to deliver the required level of service, the CSB selects another SaaS provider and reiterates the negotiation process. The Profile Manager,which implements IAM management operations, is responsible for managing clients’ profiles, including their preferences in terms of personalized services and required QoS. The Policy Manager, which implements PM management operations, is responsible for managing different kinds of policies such as authorization policies and QoS-aware selection policies of service providers. SaaS providers typically offer several types of services using Web services. These Web services can be simple or composite Web services. Composite Web services are the result of the composition of many simple or composite services. In order to estimate their current QoS for each service type they offer, service providers should use monitoring techniques to collect measurement data at selected observation points. By aggregating collected data, the SaaS provider can determine the value of each QoS indicator and checks its compliance with the SLA. If there is a significant drop in the actual QoS offering, the SaaS provider might take appropriate actions such as adding more resources to avoid any complaint from the service consumer. Figure 4 shows a typical architecture of a SaaS Provider, which includes several management functions that cooperate in order to deliver personalized services to consumers. These functions are: Identity and Access Management (IAM), Policies Management (PM), SLA Management (SLAM),
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 196 Service Provisioning (SP), and Measurements and QoS Evaluation (MQE). The back-end databases maintain information about services’ policies, consumers’ profiles, SLA templates, Committed SLAs, and dynamic QoS information.The Measurements and QoS Evaluation subsystem collects data on QoS indicators at various observation points and estimates current QoS offerings. The SLA Manager component is responsible for negotiating with the Cloud Service Broker, or directly with service consumers, the terms of service and the QoS level to be delivered. Figure 2. Typical architecture of a SaaS provider infrastructure Measurement services, as depicted in figure 1, are third parties actors that have become new players in the cloud ecosystem as they allow service providers to have independent monitoring of their offerings and allow service consumers to make sure that they are getting the level of service that the service provider promised. Examples of measurement and monitoring services are keynote (keynote.com), Monitis (monitis.com), and Uptrends (uptrends.com). Measurement services are in charge of mapping resource metrics into SLA parameters and monitoring current service levels and their compliance with SLA. Plugins to these measurement services may be added to the framework as service consumers and SaaS providers might prefer specific monitoring companies. 6. A SAAS SELECTION ALGORITHM As we mentioned earlier in the related work section, a limited number of works have investigated the issue of cloud services selection. In this section, we describe an algorithm for the selection of SaaS providers that can fulfill the service consumer request. The algorithm considers only non- functional (mainly QoS) issues in the selection process. The other issues we discussed in section 3 are negotiated during the SLA negotiation process once the CSB has selected a potential SaaS provider. A service consumer may have her own preferences in terms of QoS, for the service she would like to obtain. Similarly, SaaS providers may have different QoS offerings for each service they are providing. We assume that QoS indicators are in normalized form with values between 0 and 1. A value of 1 means highest quality and 0 means lowest quality. The Cloud Service Broker, upon reception of a SLA request, maps the service consumer expectations into normalized QoS values. Let , , … , be the vector of QoS parameters considered in the system. Let , , … , , with 0 1, be the vector of minimum quality requirements that the service consumer tolerates for the required type of service. These values are obtained by mapping
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 197 the quality expectations (platinum, gold, silver) of the service consumer into normalized form. Let , , … , be the set of SaaS providers that can provide the service requested by the service consumer. Let , , … , , with 0 1, be the QoS offering of the SaaS provider . The CSB’s Selection Manager evaluates an aggregate utility function and determines whether the offer of a SaaS provider is acceptable or not. If we assume that the QoS attributes are independent, the linear aggregate utility function can be defined by: (1) with ∑1 1. Ui represents the individual utility function associated with the QoS attribute Xi, and wi is the weight that the service consumer assigns to that attribute. The service provider offer is acceptable to the CSB if the aggregate utility function exceeds a predefined threshold, which is calculated from the service consumer expectations. Various functions may be used to express the service consumer utility of an attribute Xi. We borrow the function used in [21] to express that utility function as: (2) is a measure of the service consumer sensitivity to the QoS attribute . When 0, the service consumer is indifferent to QoS attribute . When 1, the service consumer is moderately sensitive to QoS attribute (the relationship is linear). When 1, the service consumer is increasingly sensitive to QoS attribute . As increases, the service consumer is expressing increasing concern about . For 1, as decreases to approach 0, the service consumer is expressing increasing indifference to having . Equation (1) becomes: (3) As a proof of concept, we consider a scenario where the QoS parameters considered in the system are: availability, 1/response-time, reliability, and throughput. Table 1 depicts normalized minimum QoS requirements of the service consumer, the weight and the sensitivity value associated to each quality parameter. Table1.Minimum QoS requirements of the service consumer Availability 1/RT Reliability Throughput ωi 0.35 0.15 0.35 0.15 mi 0.98 0.65 0.95 0.90 βi 1 1 1 1 Assume that four SaaS providers, as shown in Table 2, have submitted their QoS offerings to the CSB. Theses providers are: SP1, SP2,SP3,and SP4.
  • 10. Int By com from h The va the ser the Qo consum Figure SaaS o sensitiv has the consum expecta 7. CO Given provide provide In this framew consum selectio parame quality ternational Jou SP1 SP2 SP3 SP4 mputing the a highest offer to alue between p rvice consume oS offerings o mer. Fig 3 shows the offerings as vity paramete e most promi mer.SP3 offer ations. ONCLUSION the wide ad ers, service c ers that can sa s paper, we work relies on mers and Saa on algorithm eters are inde y requirement urnal of Compu Table2. Q Availabilit 0.94 0.98 0.97 0.98 aggregate utili o lowest: SP4 (0 parentheses c er computed of SP1 and S gure 3. Evoluti variation in th a function o er is the same ising offering ing is very cl N AND FUTU doption of cl consumers w atisfy their fu have presen n a Cloud Se aS providers uses a linear ependent, to r ts of the servi uter Networks QoS offering o ty ity function f 0.92), SP3 (0.9 corresponds to from the min SP2 do not m ion of the aggr he aggregate of the sensitiv for all qualit g as its aggre lose to these URE WORK loud computi will increasing unctional and nted a frame ervice Broker and negotiat r aggregate u rank the pote ice consumer & Communica of four potentia 1/RT 0.70 0.60 0.80 0.85 for each SaaS 91), SP1 (0.88 o the compute nimum quality meet the minim regate utility w utility functio vity paramet ty parameters egate utility e expectations K ing technolog gly face the non-function ework for S r, which is in ing the SLA utility function ential SaaS o . We describe ations (IJCNC) al SaaS provide Reliabilit 0.98 0.97 0.96 0.98 provider, we 8), SP2 (0.87) ed aggregate y requiremen mum QoS re with the sensitiv on of the serv er. To make . In this scena exceeds the e .SP2 and SP1 gy and the g challenge of nal requiremen SaaS selectio n charge of m terms. The n, which assu offerings by m e in another a ) Vol.5, No.3, M ers ty Th e get the follo utility. The u ts is 0.91. Th equirements o vity parameter vice consume e the scenario ario, the SaaS expectations o offerings are growing num f finding appr nts. on and provi mediating bet proposed Saa umes that the matching them article the int May 2013 198 hroughput 0.70 0.65 0.75 0.70 owing ranking utility value of his means that of the service r and the four o simple, the S provider SP4 of the service e below these mber of SaaS ropriate SaaS isioning. The tween service aS providers e various QoS m against the erfaces of the 8 g f t e r e 4 e e S S e e ’ S e e
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 199 various components of the Cloud Service Broker, the SLA negotiation process, and SLA compliance monitoring. As a future work, we intend to define a common ontology for QoS representation and the mapping from the diverse representations used by SaaS providers to that common ontology; and build a prototype of the framework together with some real scenarios for SLA-based service selection and provisioning. REFERENCES [1] P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Special Publication 800-145, 2011. [2] A. Dan, et al., "Web services on demand: WSLA-driven automated management," IBM Systems Journal, Vol. 43(1), pp. 136-158, 2004. [3] S. Ferretti, et al., "Qos–aware clouds," In Proc. of the IEEE 3rd International Conference on Cloud Computing (CLOUD 2010), pp. 321-328, 2010. [4] S. Venticinque, R. Aversa, B. Di Martino, M. Rak, and D. Petcu, “A Cloud Agency for SLA Negotiation and Management,” Euro-Par 2010 Parallel Processing Workshops, Lecture Notes in Computer Science, Vol. 6586, pp. 587–594, 2011. [5] SLA@SOI project. Empowering the Service Economy with SLA-aware Infrastructures, http://www.sla-at-soi.eu/ [6] W. Theilmann, J. Happe, C. Kotsokalis, A. Edmonds, K. Kearney, J. Lambea, “A Reference Architecture for Multi-Level SLA Management,” Journal of Internet Engineering, Vol. 4(1), pp. 289–298, 2010. [7] A. J. Ferrer, F. Hernández, J. Tordsson, E. Elmroth, A. Ali-Eldin, C. Zsigri, R. Sirvent, J. Guitart, R. M. Badia, and K. Djemame, “OPTIMIS: A holistic approach to cloud service provisioning,” Future Generation Computer Systems, Vol. 28 (1), pp. 66–77, 2012. [8] S. K. Garg, et al., "Smicloud: A framework for comparing and ranking cloud services," In proc. of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 210- 218, 2011. [9] S. WANG, et al., "Cloud model for service selection," In Proc. of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 666-671, 2011. [10] F. K. Hussain and O. K. Hussain, "Towards Multi-Criteria Cloud Service Selection," In Proc. of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 44-48, 2011. [11] A. Li, et al., "CloudCmp: comparing public cloud providers," In Proc. of the 10th annual conference on Internet measurement, pp. 1-14, 2010. [12] A. Li, et al., "CloudCmp: shopping for a cloud made easy," USENIX HotCloud, 2010. [13] A. Li, et al., "Comparing public-cloud providers," Internet Computing, IEEE, Vol. 15, pp. 50-53, 2011. [14] Z. ur Rehman, et al., "A Framework for User Feedback Based Cloud Service Monitoring," presented at the 2012 Sixth International Conference on Complex,Intelligent and Software Intensive Systems (CISIS), 2012. [15] Gartner, "Gartner Says Cloud Consumers Need Brokerages to Unlock the Potential of Cloud Services,"2009. http://www.gartner.com/newsroom/id/1064712 [16] R. Bohn, J. Messina, F. Liu, and J. Tong, “NIST Cloud Computing Reference Architecture,” In Proc. of the 2011 IEEE World Congress on Services (SERVICES 2011), pp. 594-596, 2011. [17] G. Yeom and D. Min, "Design and Implementation of Web Services QoS Broker," In Proc. of the 2005 International Conference on Next Generation Web Services Practices (NWeSP 200), 2005. [18] T. Yu and K. J. Lin, "A Broker-based Framework for QoS-aware Web Service Composition," In Proc. of the 2005 IEEE International Conference on E-Technology, e-Commerce and e-Service, (EEE’05), pp. 22-29, 2005. [19] T. Yu and K. J. Lin, "The Design of QoS Broker Algorithms for QoS-Capable Web Services," In Proc. of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE’04., pp. 17-24, 2004. [20] B. Moore and Q. H. Mahmoud, "A service broker and business model for saas applications," In Proc. of the IEEE/ACS International Conference on Computer Systems and Applications(AICCSA 2009), pp. 322-329, 2009.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 200 [21] A. AuYoung, L. Grit, J. Wiener, and J. Wilkes, “Service contracts and aggregate utility functions,” In Proc. of the IEEE Symposium on High Performance Distributed Computing, pp. 119–131, 2006. Authors Dr. Elarbi Badidi received a Ph.D. degree in computer science in 2000 from Université de Montréal, Québec (Canada). He joined the College of Information Technology (CIT) atthe UAE University in Fall 2004 where he is currently an associate professor of computer science. Before joining the CIT, Dr. Badidi worked at the ENSIAS school of engineering in Rabat (Morocco) and Université de Montréal. Dr. Badidi has been conducting research in the areas of object-based distributed systems, bioinformatics, and Web services. He served on the technical program committees of many international conferences. His research interests include Web services and Service Oriented Architectures, cloud computing, context-aware services, bioinformatics, and middleware.