A Study of SLA Violation Compensation Mechanism in Complex Cloud Computing Environment

被引:2
|
作者
Gu, Yonggen [1 ]
Zhang, Wei [1 ]
Gu, Yonggen [1 ]
Tao, Jie
机构
[1] Hangzhou Dianzi Univ, Inst Comp Applicat Technol, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
SLA violation compensation; cloud computing; incentive compatible; individual rationality; mechanism design;
D O I
10.1109/IMCCC.2012.339
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
SLA is an important guarantee for carrying out cloud services in complex cloud computing environment and the rule of SLA violation compensation can restrict the behaviors of service providers. A variety of possible SLA violation compensation forms are analyzed and the form of mechanism in which service providers report the compensation will is studied in this paper. Based on mechanism design theory, a violation compensation mechanism in which providers would report their real compensation will is designed. The way of choosing service provider, compensation value and decision of service provider is confirmed in this mechanism. The property of incentive compatibility and ex-post individual rationality of the mechanism is also proved in this paper.
引用
收藏
页码:1448 / 1451
页数:4
相关论文
共 50 条
  • [1] Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
    Kumar, Surendra
    Kumar, Narander
    BAGHDAD SCIENCE JOURNAL, 2021, 18 (02) : 1020 - 1029
  • [2] Taxonomy of SLA violation minimization techniques in cloud computing.
    Shivani
    Singh, Ajmer
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1845 - 1850
  • [3] Leveraging Graph Neural Networks for SLA Violation Prediction in Cloud Computing
    Maroudis, Angelos-Christos
    Theodoropoulos, Theodoros
    Violos, John
    Leivadeas, Aris
    Tserpes, Konstantinos
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (01): : 605 - 620
  • [4] Implementation of a hybrid adaptive system for SLA violation prediction in cloud computing
    Pandita A.
    Upadhyay P.K.
    Joshi N.
    International Journal of Cloud Computing, 2022, 11 (04) : 389 - 406
  • [5] An Approach to Security-SLA in Cloud Computing Environment
    da Silva, Carlos Alberto
    de Geus, Paulo Licio
    2014 IEEE LATIN-AMERICA CONFERENCE ON COMMUNICATIONS (LATINCOM), 2014,
  • [6] A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing
    Shengli Zhou
    Lifa Wu
    Canghong Jin
    中国通信, 2017, 14 (09) : 155 - 165
  • [7] Scaled Conjugate Gradient Backpropagation based SLA Violation Prediction in Cloud Computing
    Upadhyay, Prabhat Kumar
    Pandita, Archana
    Joshi, Nisheeth
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 203 - 208
  • [8] A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing
    Zhou, Shengli
    Wu, Lifa
    Jin, Canghong
    CHINA COMMUNICATIONS, 2017, 14 (09) : 155 - 165
  • [9] SLA in Cloud Computing Architectures: A Comprehensive Study
    Aljoumah, Eman
    Al-Mousawi, Fajer
    Ahmad, Imtiaz
    Al-Shammri, Maha
    Al-Jady, Zahraa
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 7 - 31
  • [10] Resource Management Mechanism for SLA Provisioning on Cloud Computing for IoT
    Choi, Yeongho
    Lim, Yujin
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 500 - 502