Skip to main content
Erschienen in: Wireless Personal Communications 2/2021

02.01.2021

Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network

verfasst von: P. Pradeepa, R. PushpaLakshmi

Erschienen in: Wireless Personal Communications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the cloud service system, the expectation between the customer and the cloud provider for the delivered services like, responsibilities and penalties of the violation arise in the cloud parties are specifically designed in a document named as Service Level Agreement (SLA). However, violation in the Service Level Agreement is a major challenge in the research community of SaaS cloud providers. Hence, an effective violation detection method named Chicken Spider Monkey Optimization-based Deep Belief Network (ChicSMO-based DBN) is proposed in this research to perform the violation detection mechanism in the cloud environment. The proposed Chicken Spider Monkey Optimization-based Deep Belief Network effectively computes the scores, like User Privacy Score (UPS), Service Level Agreement score (SLA), and Cloud Service Provider score (CSP) based on the fitness value. The spider monkeys forage the food by evaluating the distance from the food, and update their position towards the food source. The feature scores are computed by updating the position of local and global leader group members, and perform the violation detection process using the Deep Belief Network classifier. The performance enhancement attained by the proposed algorithm in terms of the evaluation metrics, like accuracy, coverage rate, and F-value which acquire with the values of 0.862, 0.944, and 0.889 with the transaction data of 1000, respectively. It increases the reliability to address the QoS guarantee issues and increase the confidence level of the prediction model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, L., Garg, S. K., Versteeg, S., & Buyya, R. (2013). “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments. IEEE Transactions on services computing, 7(3), 465–485.CrossRef Wu, L., Garg, S. K., Versteeg, S., & Buyya, R. (2013). “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments. IEEE Transactions on services computing, 7(3), 465–485.CrossRef
2.
Zurück zum Zitat Polepally, V., & Chatrapati, K. S. (2018). Exponential gravitational search algorithm-based VM migration strategy for load balancing in cloud computing. International Journal of Modeling, Simulation, and Scientific Computing, 9(1), 1850002.CrossRef Polepally, V., & Chatrapati, K. S. (2018). Exponential gravitational search algorithm-based VM migration strategy for load balancing in cloud computing. International Journal of Modeling, Simulation, and Scientific Computing, 9(1), 1850002.CrossRef
3.
Zurück zum Zitat Zhao, L., Sakr, S., & Liu, A. (2013). A framework for consumer-centric SLA management of cloud-hosted databases. IEEE Transactions on Services Computing, 8(4), 534–549.CrossRef Zhao, L., Sakr, S., & Liu, A. (2013). A framework for consumer-centric SLA management of cloud-hosted databases. IEEE Transactions on Services Computing, 8(4), 534–549.CrossRef
4.
Zurück zum Zitat Mustafa, S., Bilal, K., Malik, S. U. R., & Madani, S. A. (2018). SLA-aware energy efficient resource management for cloud environments. IEEE Access, 6, 15004–15020.CrossRef Mustafa, S., Bilal, K., Malik, S. U. R., & Madani, S. A. (2018). SLA-aware energy efficient resource management for cloud environments. IEEE Access, 6, 15004–15020.CrossRef
5.
Zurück zum Zitat Rimal, B.P., Choi, E. & Lumb, I. (August 2009). A taxonomy and survey of cloud computing systems. In IEEE International Joint Conference on INC, IMS and IDC (pp. 44–51). Rimal, B.P., Choi, E. & Lumb, I. (August 2009). A taxonomy and survey of cloud computing systems. In IEEE International Joint Conference on INC, IMS and IDC (pp. 44–51).
6.
Zurück zum Zitat Grit, L., Irwin, D., Yumerefendi, A. & Chase, J. (2006). Virtual machine hosting for networked clusters: Building the foundations for autonomic orchestration. In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, Computer Society, (p. 7), IEEE . Grit, L., Irwin, D., Yumerefendi, A. & Chase, J. (2006). Virtual machine hosting for networked clusters: Building the foundations for autonomic orchestration. In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, Computer Society, (p. 7), IEEE .
7.
Zurück zum Zitat Schad, J., Dittrich, J., & Quiané-Ruiz, J. A. (2010). Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proceedings of the VLDB Endowment, 3(1–2), 460–471.CrossRef Schad, J., Dittrich, J., & Quiané-Ruiz, J. A. (2010). Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proceedings of the VLDB Endowment, 3(1–2), 460–471.CrossRef
8.
Zurück zum Zitat Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R. & Sears, R. (2010). Benchmarking cloud serving systems with YCSB. In ACM symposium on Cloud computing (pp. 143–154). Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R. & Sears, R. (2010). Benchmarking cloud serving systems with YCSB. In ACM symposium on Cloud computing (pp. 143–154).
9.
Zurück zum Zitat Valsalan, P., & Sankaranarayanan, K. (2012) Analysis of low power submicron circuits. International Journal of Computer Applications. Valsalan, P., & Sankaranarayanan, K. (2012) Analysis of low power submicron circuits. International Journal of Computer Applications.
10.
Zurück zum Zitat Son, J., Dastjerdi, A. V., Calheiros, R. N., & Buyya, R. (2017). SLA-aware and energy-efficient dynamic overbooking in SDN-based cloud data centers. IEEE Transactions on Sustainable Computing, 2(2), 76–89.CrossRef Son, J., Dastjerdi, A. V., Calheiros, R. N., & Buyya, R. (2017). SLA-aware and energy-efficient dynamic overbooking in SDN-based cloud data centers. IEEE Transactions on Sustainable Computing, 2(2), 76–89.CrossRef
11.
Zurück zum Zitat VhatkarKapilNetaji, & Bhole G. P. (2020). Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture. Multimedia Research, 3(1), 11–20. VhatkarKapilNetaji, & Bhole G. P. (2020). Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture. Multimedia Research, 3(1), 11–20.
12.
Zurück zum Zitat Yadav, R., Zhang, W., Kaiwartya, O., Singh, P. R., Elgendy, I. A., & Tian, Y. C. (2018). Adaptive energy-aware algorithms for minimizing energy consumption and SLA violation in cloud computing. IEEE Access, 6, 55923–55936.CrossRef Yadav, R., Zhang, W., Kaiwartya, O., Singh, P. R., Elgendy, I. A., & Tian, Y. C. (2018). Adaptive energy-aware algorithms for minimizing energy consumption and SLA violation in cloud computing. IEEE Access, 6, 55923–55936.CrossRef
13.
Zurück zum Zitat Xie, X., Wang, W., & Qin, T. (2015) Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines. In Proceedings of 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA. Xie, X., Wang, W., & Qin, T. (2015) Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines. In Proceedings of 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA.
14.
Zurück zum Zitat Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S., & Leymann, F. (2009) Runtime Prediction of Service Level Agreement Violations for Composite Services. Service-Oriented Computing, ICSOC/ServiceWave 2009 Workshops ( pp. 176–186). Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S., & Leymann, F. (2009) Runtime Prediction of Service Level Agreement Violations for Composite Services. Service-Oriented Computing, ICSOC/ServiceWave 2009 Workshops ( pp. 176–186).
15.
Zurück zum Zitat Li, L., Dong, J., Zuo, D., & Wu. J. (2017). SLA-aware and energy-efficient VM consolidation in cloud data centers using robust linear regression prediction model. IEEE Access, 7, 9490–9500CrossRef Li, L., Dong, J., Zuo, D., & Wu. J. (2017). SLA-aware and energy-efficient VM consolidation in cloud data centers using robust linear regression prediction model. IEEE Access, 7, 9490–9500CrossRef
16.
Zurück zum Zitat Paputungan, I. V., Hani, A. F. M., Hassan, M. F., & Asirvadam, V. S. (2018). Real-time and proactive SLA renegotiation for a cloud-based system. IEEE Systems Journal, 13(1), 400–411.CrossRef Paputungan, I. V., Hani, A. F. M., Hassan, M. F., & Asirvadam, V. S. (2018). Real-time and proactive SLA renegotiation for a cloud-based system. IEEE Systems Journal, 13(1), 400–411.CrossRef
17.
Zurück zum Zitat Begnum, K., Burgess, M., Jonassen, T. M., & Fagernes, S. (2006). On the stability of adaptive service level agreements. IEEE Transactions on Network and Service Management, 3(1), 13–21.CrossRef Begnum, K., Burgess, M., Jonassen, T. M., & Fagernes, S. (2006). On the stability of adaptive service level agreements. IEEE Transactions on Network and Service Management, 3(1), 13–21.CrossRef
18.
Zurück zum Zitat Greenwood, D., Vitaglione, G., Keller, L. & Calisti, M. (2006) Service level agreement management with adaptive coordination. In IEEE International conference on Networking and Services (ICNS'06) (pp. 45–45), July 2006. Greenwood, D., Vitaglione, G., Keller, L. & Calisti, M. (2006) Service level agreement management with adaptive coordination. In IEEE International conference on Networking and Services (ICNS'06) (pp. 45–45), July 2006.
19.
Zurück zum Zitat Wu, L., Garg, S. K. & Buyya, R. (2011) SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Computer Society (pp. 195-204) Wu, L., Garg, S. K. & Buyya, R. (2011) SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Computer Society (pp. 195-204)
20.
Zurück zum Zitat Goudarzi, H., & Pedram, M. (2015). Hierarchical SLA-driven resource management for peak power-aware and energy-efficient operation of a cloud datacenter. IEEE Transactions on Cloud Computing, 4(2), 222–236.CrossRef Goudarzi, H., & Pedram, M. (2015). Hierarchical SLA-driven resource management for peak power-aware and energy-efficient operation of a cloud datacenter. IEEE Transactions on Cloud Computing, 4(2), 222–236.CrossRef
21.
Zurück zum Zitat Swamy, S. M., Rajakumar, B. R., & Valarmathi, I. R. (2013) Design of Hybrid Wind and Photovoltaic Power System using Opposition-based Genetic Algorithm with Cauchy Mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), Chennai, India. Swamy, S. M., Rajakumar, B. R., & Valarmathi, I. R. (2013) Design of Hybrid Wind and Photovoltaic Power System using Opposition-based Genetic Algorithm with Cauchy Mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), Chennai, India.
22.
Zurück zum Zitat Agarkhed, J. & Ashalatha, R. (2017). A privacy preservation scheme in cloud environment. In IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 549–552). Agarkhed, J. & Ashalatha, R. (2017). A privacy preservation scheme in cloud environment. In IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 549–552).
23.
Zurück zum Zitat Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364–368.CrossRef Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364–368.CrossRef
24.
Zurück zum Zitat Zhang, G., Yang, Y., Zhang, X., Liu, C. and Chen, J. (2012) Key research issues for privacy protection and preservation in cloud computing. In: IEEE Second International Conference on Cloud and Green Computing (pp. 47–54). Zhang, G., Yang, Y., Zhang, X., Liu, C. and Chen, J. (2012) Key research issues for privacy protection and preservation in cloud computing. In: IEEE Second International Conference on Cloud and Green Computing (pp. 47–54).
25.
Zurück zum Zitat Wenge, O., Lampe, U., Müller, A. & Schaarschmidt, R. (2014) Data Privacy in cloud computing–an empirical study in the financial industry. Americas Conference on Information Systems, 1-9. Wenge, O., Lampe, U., Müller, A. & Schaarschmidt, R. (2014) Data Privacy in cloud computing–an empirical study in the financial industry. Americas Conference on Information Systems, 1-9.
26.
Zurück zum Zitat Li, C., Xu, Z. & Zhang, Z. (2012) A trusted information sharing skeleton for privacy preservation. In IEEE International Conference on Cloud Computing and Intelligence Systems (Vol. 3, pp. 1372-1376) Li, C., Xu, Z. & Zhang, Z. (2012) A trusted information sharing skeleton for privacy preservation. In IEEE International Conference on Cloud Computing and Intelligence Systems (Vol. 3, pp. 1372-1376)
27.
Zurück zum Zitat Meng, X., Liu, Y., Gao, X. and Zhang, H. (2014). A new bio-inspired algorithm: Chicken swarm optimization. In International conference in swarm intelligence (pp. 86-94), Cham: Springer Meng, X., Liu, Y., Gao, X. and Zhang, H. (2014). A new bio-inspired algorithm: Chicken swarm optimization. In International conference in swarm intelligence (pp. 86-94), Cham: Springer
28.
Zurück zum Zitat Bansal, J. C., Sharma, H., Jadon, S. S., & Clerc, M. (2014). Spider monkey optimization algorithm for numerical optimization. Memetic computing, 6(1), 31–47.CrossRef Bansal, J. C., Sharma, H., Jadon, S. S., & Clerc, M. (2014). Spider monkey optimization algorithm for numerical optimization. Memetic computing, 6(1), 31–47.CrossRef
29.
Zurück zum Zitat Zhou, S., Wu, L., & Jin, C. (2017). A privacy-based SLA violation detection model for the security of cloud computing. China Communications, 14(9), 155–165.CrossRef Zhou, S., Wu, L., & Jin, C. (2017). A privacy-based SLA violation detection model for the security of cloud computing. China Communications, 14(9), 155–165.CrossRef
30.
Zurück zum Zitat Al-Aloussi, S., (2013) Neural network solution for service level agreement. International Journal of Advanced Computer Science and Applications, (IJACSA), 4(2),72–80. Al-Aloussi, S., (2013) Neural network solution for service level agreement. International Journal of Advanced Computer Science and Applications, (IJACSA), 4(2),72–80.
31.
Zurück zum Zitat Qiu, F., Zhang, B., & Guo, J. (2016) A deep learning approach for VM workload prediction in the cloud. In IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp 319–324). Qiu, F., Zhang, B., & Guo, J. (2016) A deep learning approach for VM workload prediction in the cloud. In IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp 319–324).
Metadaten
Titel
Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network
verfasst von
P. Pradeepa
R. PushpaLakshmi
Publikationsdatum
02.01.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07940-9

Weitere Artikel der Ausgabe 2/2021

Wireless Personal Communications 2/2021 Zur Ausgabe

Neuer Inhalt