Volume 13 | Issue 4
Volume 13 | Issue 4
Volume 13 | Issue 4
Volume 13 | Issue 4
Volume 13 | Issue 4
The cloud offers intriguing possibilities for relocating company applications, and the corporate security manager may rest easy knowing that no on-premises hardware requires monitoring or protection. Providers of cloud services and the ecosystems that support them are constantly innovating to keep up with the growing demand for cloud computing. This includes new types of services, new ways of delivering those services, and new ways of working together. SLA management's benefits include being able to negotiate appropriate service parameters, putting in place mechanisms to assure that service execution in the external cloud is in line with agreed SLAs, and monitoring to verify compliance by the cloud provider. Despite rapid advancements in both theory and practice, the legal/contractual, economic, service quality, interoperability, security, and privacy challenges still provide considerable obstacles to the widespread use of cloud computing. Several models for deploying cloud services are described. In order to make cloud storage more effective, we present a SLA-aware resource method in this work. Our approach maximizes both storage space usage and I/O throughput at the backend nodes. Customers are offered the present Cloud setup on a best-effort basis. Rather than making any guarantees, a statistical uptime expectation is shared with the user, and minor compensations are offered in the event of any unscheduled downtime.