Role-based Templates for Cloud Monitoring
Key: ASHS14-1
Author: The An Binh Nguyen, Melanie Siebenhaar, Ronny Hans, Ralf Steinmetz
Date: December 2014
Kind: In proceedings
Publisher: IEEE Computer Society Conference Publishing Services
Book title: Proceedings 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC 2014)
Keywords: Cloud Computing, Adaptive Monitoring, Architectural Model
Abstract: Cloud computing has evolved in the recent years to a well established computing paradigm. With this evolution, the complexity and requirements for monitoring cloud-based services have also increased. Without a doubt, monitoring for cloud computing is a crucial task which has been addressed in a number of research works. However, monitoring for cloud computing is often designed to be carried out by cloud providers. Monitoring by cloud providers on the one hand offers the flexibility and full control required for monitoring; on the other hand, the trustworthiness of the cloud provider is often questioned. In this work, we present a generic approach that can harmonize both of the aforementioned issues. Our solution abstracts from the complexity by using role-based templates for monitoring in combination with autonomous agents; thus, this approach can be used by both, cloud consumers and cloud providers. With a proof of concept prototype, we show that our approach can be adapted for large scale cloud monitoring scenarios. Furthermore, we discuss the possibility that our monitoring solution can be extended to be applicable for different domains.
View Full paper (PDF) | Download Full paper (PDF)

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, not withstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.