SlideShare uma empresa Scribd logo
1 de 16
SLA INFORMATION MANAGEMENT THROUGH
DEPENDENCY DIGRAPHS: THE CASE OF
CLOUD DATA SERVICES

Katerina Stamou, Verena Kantere, Jean-Henry
Morin
Institute of Services Science, University of Geneva,
Switzerland

and Michael Georgiou
Cyprus University of Technology, Cyprus
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA
In a nutshell..
2


The term SLA data management encloses data operations that may take
place before, during or after the service level agreement (SLA) and service
execution.



The systematic management of SLA data is required for the automation of
SLAs and of service management processes (e.g. auditing, monitoring) that
generate a new cloud computing market and add business value in a
service-oriented economy.



We propose that the systematic management of SLAs can be efficiently
achieved using a digraph data model that perceives SLA elements and
their data relations as operational pipelines.



Service Level Agreements
dependency graphs.



A dependency graph is defined as a directed graph that contains
properties.- Secure Cloud edges security mini-track, Hawaii,
Graph computing denote dependencies among connected
HICSS 47
1/10/2014
component pairs.
USA

can

be

formalized

and

processed

as
Agenda
3

Definitions, problem description
 SLA
formalization:
anatomy,
service
dependencies
 SLA data management requirements
 SLA digraph data model: WSLA [1] into a
property digraph
 Data service provisioning scenario: service
properties, SLA template
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
 Ongoing work: SLA representation as a triple1/10/2014


USA
Definitions, problem description
4



Service Level Agreements (SLAs) express mutually agreed service
levels between providers and customers [1]. SLAs define quality of
service (QoS) criteria, along with functional service properties.



The definition and structure of SLAs for cloud computing services
are not yet standardized.





The term “systematic SLA data management” describes the
process of automated SLA formulation, storage and processing
according to a dynamic, adaptable data-schema and by one or more
backend supporting data-stores or DBMS.
SLA data management through graph data structures allows for
numerous traversal and filtering options that support the service and
SLA management over distributed virtual resources that are
dominated by availability and demand.
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
SLA anatomy:
Web Service Level Agreement (WSLA), IBM [1]
5

Signatories, third parties: customerprovider pair and their connections to third
party support for the service execution.

Service
description:
decomposition and hierarchical
classification of service objects or
operations, whose accumulation
and/or combination constitutes the
service definition.
Guarantees: obligations, typically from the provider part, to fulfill agreed and
promised levels or service provisioning. IBM distinguishes between
measureable targets (objectives) and predefined actions that occur during the
serviceHICSS 47 - Secure Cloud computing security mini-track, Hawaii,
up-time.
USA

1/10/2014
SLA formalization: service
dependencies

6









According to Keller et al [2], service dependencies represent
customer/provider relationships that are reflected to cooperating
components in a distributed service management system.
The term "dependency"defines the relationship between a
dependent service component that requires an operation
performed by an antecedent component in order for the former
to execute its function.
Service dependencies between internal SLA components can
be translated as actions (rules) that are fired when a predefined
condition is triggered.
Service dependencies are reflected in the SLA by:



Identified relationships between SLA components of the same service
HICSS 47 Identified Secure Cloud computing security mini-track, Hawaii, subsets within service
hierarchies of services and service 1/10/2014
USA
networks
7

SLA data management
requirements

Data criteria/ SLA
components

SLA
paramet
er

Metrics

SLOs

Action
guarantee
s

SLA
doc

exampleSLA mgt
operations

accessibility,
integrity

✖

✖

✖

✖

✖

measurement,
auditing

velocity rate

high

high

high

low

na

real-time monitoring

replication, staging

✖

✖

na

na

✖

real-time value
evaluation

dependencies

✖

na

✖

✖

✖

alerts, actions

cleanness

✖

✖

✖

✖

✖

auditing,
guaranteeevaluation

accuracy

✖

✖

✖

✖

✖

real-time monitoring,
auditing

ownership,
authenticity

✖

✖

✖

✖

✖

auditing, guarantee
definition

✖

function definition,
metric evaluation

heterogeneity - Secure ✖ computing security mini-track, ✖
✖
✖
HICSS 47
Cloud
Hawaii,
USA

1/10/2014
SLA digraph formalization skeleton
8

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
Data Service scenario (& next 3
slides)
9








A service provider offers deployed relational databases. The
scenario assumes alternative provisioning configurations
according to:
 Database isolation, data sharing
 DB/Schema administration
 Storage partitioning
Exercise goal: data service profiling and provisioning metrics.
Method: a data service representation as a collection of
attributes; map attributes to service provisioning semantics;
generate SLA template(s).
Scenario example, 3 service types:
 Separate DB, Separate schema (ST1)
 Shared DB, Separate schema (ST2)
 Shared - DB, Shared schemamini-track, Hawaii,
HICSS 47 Secure Cloud computing security (ST3)
USA

1/10/2014
10

Data Service scenario
infrastructure

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
11

Data service properties
(scenario)

Resource/System
characteristics

ST ST
1
2

OS platform:
Windows, Unix, Linux
(32/64)

✔

CPU (family
type/frequency)

ST
3

✔

ST
1

ST
2

DB instance/Schema nr.

✔

✔

DB memory (MB)

Processor
✔
•Classification by service
(nr/frequency) generate
type to
SLA

Database/Schema criteria

✔
✔

DB memory per connection
(MB)

ST
3

✔

DB/Schema size (MB/GB)

✔

✔

DB/Schema operations
DB/Schema growing ratio

ST
✔
1

ST
✔
2

ST
3

✔
✔
✔

✔
✔

✔

✔

✔

✔

template(s).
DB shutdown/start-up
•The three service types DB/Schema administration
On-demand
represent three service DB/schema/table backups
description branches that DB/schema/table restores
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
1/10/2014
belong to the same SLA
USA
Separate DB, Separate schema
SLA template example (scenario)
12

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
Ongoing work
13

SLA model representation in triple format.
 Advantages from SLA data management
through graphs: traversal and filtering
opportunities through RDF triple stores.
 AllegroGraph [3] servers on Amazon WS
[4] resources to evaluate the SLA graph
model for identified use cases that are
positioned in the cloud computing setting.


HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
On-going work: SLA graph model in
the Allegro triple store
14

Our current experimentation
uses:
•AllegroGraph server instances
on Amazon WS to simulate the
selection and exchange of
service
offers
through
distributed
RDF
graph
repositories.
•Synthetic data taken from real
service offers as advertised in
Amazon WS to compose SLA
data repositories for the cloud
simulation.
•The tests aim to evaluate the
efficiency, expressiveness and
usability of the proposed SLA
data model by experimenting
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
on service data management
USA
use
case
over
virtual

1/10/2014
Thank you!
15

SLA template as a property digraph can be reached at:
http://thinkcloud.unige.ch/SLAgraph/ (using the
NetworkX [5] programming library
Q&A: aikaterini.stamou@unige.ch

HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014
References
16

1.

2.

3.

4.
5.

H. Ludwig et al., “Web Service Level Agreement
(WSLA) Language Specification,” IBM Corporation,
2003.
A. Keller, U. Blumenthal, and G. Kar, “Classification
and Computation of Dependencies for Distributed
Management,” in Proc. of the Fifth IEEE Symposium
on Computers and Communications (ISCC 2000),
ser. ISCC ’00. IEEE Computer Society, 2000.
AllegroGraph 4.12.2,
http://www.franz.com/agraph/allegrograph/
Amazon Web Services, http://aws.amazon.com/
NetworkX: High-productivity software for complex
networks, http://networkx.github.io/
HICSS 47 - Secure Cloud computing security mini-track, Hawaii,
USA

1/10/2014

Mais conteúdo relacionado

Mais procurados

Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computingvimalraman
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Whitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureWhitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureNewt Global Consulting LLC
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo
 
Dimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesDimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesImran Khan
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG Bob Marcus
 
Dqs mds-matching 15042015
Dqs mds-matching 15042015Dqs mds-matching 15042015
Dqs mds-matching 15042015Neil Hambly
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopCitiusTech
 
Amplitude wave architecture - Test
Amplitude wave architecture - TestAmplitude wave architecture - Test
Amplitude wave architecture - TestKiran Naiga
 
Introduction to RAGLD
Introduction to RAGLDIntroduction to RAGLD
Introduction to RAGLDragld
 
Tutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxTutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxSubandi Wahyudi
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesPvrtechnologies Nellore
 
(More) Transparency Transformation
(More) Transparency Transformation(More) Transparency Transformation
(More) Transparency TransformationGeorge Thomas
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid ithman10010
 
Changing Landscape of Data Centers
Changing Landscape of Data CentersChanging Landscape of Data Centers
Changing Landscape of Data CentersSuhas Kelkar
 
Master Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachMaster Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachJeff Prom
 
Building Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaBuilding Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaGuido Schmutz
 

Mais procurados (20)

Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computing
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Whitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices ArchitectureWhitepaper : Building an Efficient Microservices Architecture
Whitepaper : Building an Efficient Microservices Architecture
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
 
Dimension of quality in Cloud Database Services
Dimension of quality in Cloud Database ServicesDimension of quality in Cloud Database Services
Dimension of quality in Cloud Database Services
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
 
Dqs mds-matching 15042015
Dqs mds-matching 15042015Dqs mds-matching 15042015
Dqs mds-matching 15042015
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
 
Data Quality Services
Data Quality ServicesData Quality Services
Data Quality Services
 
Amplitude wave architecture - Test
Amplitude wave architecture - TestAmplitude wave architecture - Test
Amplitude wave architecture - Test
 
Introduction to RAGLD
Introduction to RAGLDIntroduction to RAGLD
Introduction to RAGLD
 
Tutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdxTutorial 22 mastering olap reporting drilling through using mdx
Tutorial 22 mastering olap reporting drilling through using mdx
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
(More) Transparency Transformation
(More) Transparency Transformation(More) Transparency Transformation
(More) Transparency Transformation
 
Using power bi in hybrid it
Using power bi in hybrid itUsing power bi in hybrid it
Using power bi in hybrid it
 
Changing Landscape of Data Centers
Changing Landscape of Data CentersChanging Landscape of Data Centers
Changing Landscape of Data Centers
 
Ogsa
OgsaOgsa
Ogsa
 
Master Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington BeachMaster Data Services - 2016 - Huntington Beach
Master Data Services - 2016 - Huntington Beach
 
Building Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache KafkaBuilding Event-Driven (Micro) Services with Apache Kafka
Building Event-Driven (Micro) Services with Apache Kafka
 
The Social Data Web
The Social Data WebThe Social Data Web
The Social Data Web
 

Semelhante a SLA information management through dependency digraphs: the case of cloud data services

Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecturemeenalkakkar
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...riyak40
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureJohnny Le
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 

Semelhante a SLA information management through dependency digraphs: the case of cloud data services (20)

Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecture
 
20150113
2015011320150113
20150113
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
saas
saassaas
saas
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
M 94 4
M 94 4M 94 4
M 94 4
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architecture
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
V04405122126
V04405122126V04405122126
V04405122126
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 

Último

Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfAgusHalim9
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Associationseri bangash
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerAlejandro Cremades
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...srcw2322l101
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Alejandro Cremades
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckHajeJanKamps
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product DiscoveryDesmond Leo
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfomnme1
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)Norah Medlin
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfMont Surfaces
 
Making Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly GuideMaking Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly GuideEminent Tactiles
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfprchbhandari
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsStefan Wolpers
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettJacobBadgett
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxOs Hillman
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE
 

Último (20)

Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
Making Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly GuideMaking Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly Guide
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptx
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 

SLA information management through dependency digraphs: the case of cloud data services

  • 1. SLA INFORMATION MANAGEMENT THROUGH DEPENDENCY DIGRAPHS: THE CASE OF CLOUD DATA SERVICES Katerina Stamou, Verena Kantere, Jean-Henry Morin Institute of Services Science, University of Geneva, Switzerland and Michael Georgiou Cyprus University of Technology, Cyprus HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA
  • 2. In a nutshell.. 2  The term SLA data management encloses data operations that may take place before, during or after the service level agreement (SLA) and service execution.  The systematic management of SLA data is required for the automation of SLAs and of service management processes (e.g. auditing, monitoring) that generate a new cloud computing market and add business value in a service-oriented economy.  We propose that the systematic management of SLAs can be efficiently achieved using a digraph data model that perceives SLA elements and their data relations as operational pipelines.  Service Level Agreements dependency graphs.  A dependency graph is defined as a directed graph that contains properties.- Secure Cloud edges security mini-track, Hawaii, Graph computing denote dependencies among connected HICSS 47 1/10/2014 component pairs. USA can be formalized and processed as
  • 3. Agenda 3 Definitions, problem description  SLA formalization: anatomy, service dependencies  SLA data management requirements  SLA digraph data model: WSLA [1] into a property digraph  Data service provisioning scenario: service properties, SLA template HICSS 47 - Secure Cloud computing security mini-track, Hawaii,  Ongoing work: SLA representation as a triple1/10/2014  USA
  • 4. Definitions, problem description 4  Service Level Agreements (SLAs) express mutually agreed service levels between providers and customers [1]. SLAs define quality of service (QoS) criteria, along with functional service properties.  The definition and structure of SLAs for cloud computing services are not yet standardized.   The term “systematic SLA data management” describes the process of automated SLA formulation, storage and processing according to a dynamic, adaptable data-schema and by one or more backend supporting data-stores or DBMS. SLA data management through graph data structures allows for numerous traversal and filtering options that support the service and SLA management over distributed virtual resources that are dominated by availability and demand. HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 5. SLA anatomy: Web Service Level Agreement (WSLA), IBM [1] 5 Signatories, third parties: customerprovider pair and their connections to third party support for the service execution. Service description: decomposition and hierarchical classification of service objects or operations, whose accumulation and/or combination constitutes the service definition. Guarantees: obligations, typically from the provider part, to fulfill agreed and promised levels or service provisioning. IBM distinguishes between measureable targets (objectives) and predefined actions that occur during the serviceHICSS 47 - Secure Cloud computing security mini-track, Hawaii, up-time. USA 1/10/2014
  • 6. SLA formalization: service dependencies 6     According to Keller et al [2], service dependencies represent customer/provider relationships that are reflected to cooperating components in a distributed service management system. The term "dependency"defines the relationship between a dependent service component that requires an operation performed by an antecedent component in order for the former to execute its function. Service dependencies between internal SLA components can be translated as actions (rules) that are fired when a predefined condition is triggered. Service dependencies are reflected in the SLA by:   Identified relationships between SLA components of the same service HICSS 47 Identified Secure Cloud computing security mini-track, Hawaii, subsets within service hierarchies of services and service 1/10/2014 USA networks
  • 7. 7 SLA data management requirements Data criteria/ SLA components SLA paramet er Metrics SLOs Action guarantee s SLA doc exampleSLA mgt operations accessibility, integrity ✖ ✖ ✖ ✖ ✖ measurement, auditing velocity rate high high high low na real-time monitoring replication, staging ✖ ✖ na na ✖ real-time value evaluation dependencies ✖ na ✖ ✖ ✖ alerts, actions cleanness ✖ ✖ ✖ ✖ ✖ auditing, guaranteeevaluation accuracy ✖ ✖ ✖ ✖ ✖ real-time monitoring, auditing ownership, authenticity ✖ ✖ ✖ ✖ ✖ auditing, guarantee definition ✖ function definition, metric evaluation heterogeneity - Secure ✖ computing security mini-track, ✖ ✖ ✖ HICSS 47 Cloud Hawaii, USA 1/10/2014
  • 8. SLA digraph formalization skeleton 8 HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 9. Data Service scenario (& next 3 slides) 9     A service provider offers deployed relational databases. The scenario assumes alternative provisioning configurations according to:  Database isolation, data sharing  DB/Schema administration  Storage partitioning Exercise goal: data service profiling and provisioning metrics. Method: a data service representation as a collection of attributes; map attributes to service provisioning semantics; generate SLA template(s). Scenario example, 3 service types:  Separate DB, Separate schema (ST1)  Shared DB, Separate schema (ST2)  Shared - DB, Shared schemamini-track, Hawaii, HICSS 47 Secure Cloud computing security (ST3) USA 1/10/2014
  • 10. 10 Data Service scenario infrastructure HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 11. 11 Data service properties (scenario) Resource/System characteristics ST ST 1 2 OS platform: Windows, Unix, Linux (32/64) ✔ CPU (family type/frequency) ST 3 ✔ ST 1 ST 2 DB instance/Schema nr. ✔ ✔ DB memory (MB) Processor ✔ •Classification by service (nr/frequency) generate type to SLA Database/Schema criteria ✔ ✔ DB memory per connection (MB) ST 3 ✔ DB/Schema size (MB/GB) ✔ ✔ DB/Schema operations DB/Schema growing ratio ST ✔ 1 ST ✔ 2 ST 3 ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ template(s). DB shutdown/start-up •The three service types DB/Schema administration On-demand represent three service DB/schema/table backups description branches that DB/schema/table restores HICSS 47 - Secure Cloud computing security mini-track, Hawaii, 1/10/2014 belong to the same SLA USA
  • 12. Separate DB, Separate schema SLA template example (scenario) 12 HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 13. Ongoing work 13 SLA model representation in triple format.  Advantages from SLA data management through graphs: traversal and filtering opportunities through RDF triple stores.  AllegroGraph [3] servers on Amazon WS [4] resources to evaluate the SLA graph model for identified use cases that are positioned in the cloud computing setting.  HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 14. On-going work: SLA graph model in the Allegro triple store 14 Our current experimentation uses: •AllegroGraph server instances on Amazon WS to simulate the selection and exchange of service offers through distributed RDF graph repositories. •Synthetic data taken from real service offers as advertised in Amazon WS to compose SLA data repositories for the cloud simulation. •The tests aim to evaluate the efficiency, expressiveness and usability of the proposed SLA data model by experimenting HICSS 47 - Secure Cloud computing security mini-track, Hawaii, on service data management USA use case over virtual 1/10/2014
  • 15. Thank you! 15 SLA template as a property digraph can be reached at: http://thinkcloud.unige.ch/SLAgraph/ (using the NetworkX [5] programming library Q&A: aikaterini.stamou@unige.ch HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014
  • 16. References 16 1. 2. 3. 4. 5. H. Ludwig et al., “Web Service Level Agreement (WSLA) Language Specification,” IBM Corporation, 2003. A. Keller, U. Blumenthal, and G. Kar, “Classification and Computation of Dependencies for Distributed Management,” in Proc. of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), ser. ISCC ’00. IEEE Computer Society, 2000. AllegroGraph 4.12.2, http://www.franz.com/agraph/allegrograph/ Amazon Web Services, http://aws.amazon.com/ NetworkX: High-productivity software for complex networks, http://networkx.github.io/ HICSS 47 - Secure Cloud computing security mini-track, Hawaii, USA 1/10/2014