{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:35:11Z","timestamp":1771576511207,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T00:00:00Z","timestamp":1515456000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1657-y","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T16:22:43Z","timestamp":1515514963000},"page":"12459-12471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Monitoring IaaS using various cloud monitors"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8109-7865","authenticated-orcid":false,"given":"Absa","family":"Stephen","sequence":"first","affiliation":[]},{"given":"Shajulin","family":"Benedict","sequence":"additional","affiliation":[]},{"given":"R. P. Anto","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,9]]},"reference":[{"key":"1657_CR1","doi-asserted-by":"publisher","unstructured":"Montesa, J., S\u00e1nchez, A., Memishi, B., P\u00e9rez, M.S., Antoniu, G.: GMonE: a complete approach to cloud monitoring. Futur. Gener. Comput. Syst. 29(8), 2026\u20132040 (2013). \nhttps:\/\/doi.org\/10.1016\/j.future.2013.02.011","DOI":"10.1016\/j.future.2013.02.011"},{"issue":"1","key":"1657_CR2","first-page":"1","volume":"11","author":"S Absa","year":"2016","unstructured":"Absa, S., Benedict, S.: A survey on SLA based cloud architectures. J. Converg. Inf. Technol. 11(1), 1\u201312 (2016)","journal-title":"J. Converg. Inf. Technol."},{"key":"1657_CR3","doi-asserted-by":"publisher","unstructured":"Kertesz, A., Kecskemeti, G., Brandic, I.: An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous cloud environments. Futur. Gener. Comput. Syst. 32, 54\u201368 (2014). \nhttps:\/\/doi.org\/10.1016\/j.future.2012.05.016","DOI":"10.1016\/j.future.2012.05.016"},{"key":"1657_CR4","unstructured":"http:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/concepts.htm"},{"key":"1657_CR5","unstructured":"Cloud computing management. \nhttp:\/\/www.channelfutures.com\/private-cloud"},{"key":"1657_CR6","doi-asserted-by":"publisher","unstructured":"Da Cunha Rodrigues, G., Calheiros, R.N.: Monitoring of cloud computing environments: concepts, solutions, trends, and future directions. ACM 2016, SAC 2016 (2016). \nhttps:\/\/doi.org\/10.1145\/2851613.2851619","DOI":"10.1145\/2851613.2851619"},{"key":"1657_CR7","doi-asserted-by":"publisher","unstructured":"Weing\u00e4rtner, R., Br\u00e4scher, G.B., Westphall, C.B.: Cloud resource management: a survey on forecasting and profiling models. J. Netw. Comput. Appl. 47, 99\u2013106 (2015). \nhttps:\/\/doi.org\/10.1016\/j.jnca.2014.09.018","DOI":"10.1016\/j.jnca.2014.09.018"},{"key":"1657_CR8","doi-asserted-by":"publisher","unstructured":"Alecsandru, P., Patriciu, V.V.: Digital forensics in Cloud computing. Adv. Electr. Comput. Eng. 14(2), 101\u2013108 (2014). \nhttps:\/\/doi.org\/10.4316\/AECE.2014.02017","DOI":"10.4316\/AECE.2014.02017"},{"key":"1657_CR9","doi-asserted-by":"publisher","unstructured":"Aceto, G., Botta, A., de Donato, W., Pescap\u00e8, A.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093\u20132115 (2013). \nhttps:\/\/doi.org\/10.1016\/j.comnet.2013.04.001","DOI":"10.1016\/j.comnet.2013.04.001"},{"issue":"4","key":"1657_CR10","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s00607-014-0398-5","volume":"97","author":"K Alhamazani","year":"2015","unstructured":"Alhamazani, K.: An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art. Computing 97(4), 357\u2013377 (2015)","journal-title":"Computing"},{"key":"1657_CR11","doi-asserted-by":"publisher","unstructured":"Computing Performance issues and performance analysis tools for HPC cloud applications: a survey. 95(2), 89\u2013108 (2013). \nhttps:\/\/doi.org\/10.1007\/s00607-012-0213-0","DOI":"10.1007\/s00607-012-0213-0"},{"key":"1657_CR12","doi-asserted-by":"crossref","unstructured":"Giannakou, A., Rillingy, L., Pazatz, J.-L., Majorczyky, F., Morin, C.: Towards self adaptable security monitoring in IaaS clouds,\u201d15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CC-GRID 2015) (2015)","DOI":"10.1109\/CCGrid.2015.133"},{"issue":"12","key":"1657_CR13","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2011.6094017","volume":"49","author":"SA de Chaves","year":"2011","unstructured":"de Chaves, S.A., Uriarte, R.B., Westphall, C.B.: Toward an architecture for monitoring private clouds. IEEE Commun. Mag. 49(12), 130\u2013137 (2011)","journal-title":"IEEE Commun. Mag."},{"key":"1657_CR14","unstructured":"Petcu, D., Cr\n$${\\breve{{\\rm a}}}$$\n\n\n\n\na\n\u02d8\n\n\n\n\nciun, C.: Towards a security SLA-based cloud monitoring service. In: CLOSER 2014 - 4th International Conference on Cloud Computing and Services Science, pp. 593-603"},{"key":"1657_CR15","doi-asserted-by":"publisher","unstructured":"Trapero, R., Modic, J., Stopar, M., Taha, A., Suri, N.: A novel approach to manage cloud security SLA incidents. Futur. Gener. Comput. Syst. 72, 193\u2013205 (2017). \nhttps:\/\/doi.org\/10.1016\/j.future.2016.06.004","DOI":"10.1016\/j.future.2016.06.004"},{"key":"1657_CR16","doi-asserted-by":"publisher","unstructured":"Ghosha, R., Longo, F., Naik, V.K., Trivedi, K.S.: Modeling and performance analysis of large scale IaaS Clouds. Futur. Gener. Comput. Syst. 29(5), 1216\u20131234 (2013). \nhttps:\/\/doi.org\/10.1016\/j.future.2012.06.005","DOI":"10.1016\/j.future.2012.06.005"},{"key":"1657_CR17","doi-asserted-by":"crossref","unstructured":"Stantchev, V., Schr\u00f6pfer, C.: Negotiating and enforcing QoS and SLAs in grid and cloud computing. GPC 2009, LNCS 5529, 25\u201335 (2009)","DOI":"10.1007\/978-3-642-01671-4_3"},{"key":"1657_CR18","doi-asserted-by":"publisher","unstructured":"Casalicchio, E., Silvestri, L.: Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3), 795\u2013810 (2013). \nhttps:\/\/doi.org\/10.1016\/j.comnet.2012.10.020","DOI":"10.1016\/j.comnet.2012.10.020"},{"key":"1657_CR19","doi-asserted-by":"publisher","unstructured":"Vincent, C., Emeakaroha, V.C., Ferreto, T.C., Netto, M.A., Brandic, I., De Rose, C.A.: CASViD: application level monitoring for SLA violation detection in clouds. In: IEEE 36th Annual Conference on Computer Software and Applications (COMPSAC) (2012). \nhttps:\/\/doi.org\/10.1109\/COMPSAC.2012.68","DOI":"10.1109\/COMPSAC.2012.68"},{"key":"1657_CR20","doi-asserted-by":"publisher","unstructured":"Larsson, L., Henriksson, D., Elmroth, E.: Scheduling and monitoring of internally structured services in cloud federations. In: IEEE Symposium on Computers and communications (ISCC) (2011). \nhttps:\/\/doi.org\/10.1109\/ISCC.2011.5984012","DOI":"10.1109\/ISCC.2011.5984012"},{"key":"1657_CR21","doi-asserted-by":"publisher","unstructured":"Grati, R., Boukadi, K., Ben-Abdallah, H.: Overview of IaaS monitoring tools. In: IEEE\/ACS 12th International Conference on Computer Systems and Applications (AICCSA) (2015). \nhttps:\/\/doi.org\/10.1109\/AICCSA.2015.7507146","DOI":"10.1109\/AICCSA.2015.7507146"},{"key":"1657_CR22","doi-asserted-by":"publisher","unstructured":"Vijayakumar, K., Arun, C.: Automated risk identification using NLP in cloud based development environments. J. Ambient Intell. Hum. Comput., 1\u201313 (2017). \nhttps:\/\/doi.org\/10.1007\/s12652-017-0503-7","DOI":"10.1007\/s12652-017-0503-7"},{"key":"1657_CR23","doi-asserted-by":"publisher","unstructured":"Vijayakumar, K., Arun, C.: Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Clus. Comput. 1\u201312 (2017). \nhttps:\/\/doi.org\/10.1007\/s10586-017-1176-x","DOI":"10.1007\/s10586-017-1176-x"},{"key":"1657_CR24","unstructured":"Vijayakumar, K., Arun, C.: Analysis and selection of risk assessment frameworks for cloud based enterprise applications. Biomed Res ISSN: 0976-1683 (Electronic) (2017)"},{"key":"1657_CR25","unstructured":"Dawoud, W., Takouna, I., Meine, C.: Infrastructure as a service security: challenges and solutions. In: The 7th International Conference on Informatics and Systems (INFOS) (2010)"},{"key":"1657_CR26","doi-asserted-by":"publisher","unstructured":"Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clus. Comput. \nhttps:\/\/doi.org\/10.1007\/s10586-017-0977-2","DOI":"10.1007\/s10586-017-0977-2"},{"key":"1657_CR27","doi-asserted-by":"publisher","unstructured":"Varatharajan, R., Hariharan, N., Perumal, S., Sankar, A.: A Novel Method to Increase the coupling efficiency of laser to single mode fibre. Wirel. Pers. Commun. 87, 419\u2013430 (2016). \nhttps:\/\/doi.org\/10.1007\/s11277-015-3028-4","DOI":"10.1007\/s11277-015-3028-4"},{"issue":"5","key":"1657_CR28","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1016\/j.jss.2011.11.1043","volume":"85","author":"G Katsaros","year":"2012","unstructured":"Katsaros, G., et al.: A self-adaptive hierarchical monitoring mechanism for clouds. J. Syst. Softw. 85(5), 1029\u20131041 (2012)","journal-title":"J. Syst. Softw."},{"key":"1657_CR29","doi-asserted-by":"publisher","unstructured":"Fatema, K., Emeakaroha, V.C., Healy, P.D., Morrison, J.P., Lynn\u201d, T.: A survey of cloud monitoring tools: taxonomy, capabilities and objectives. J. Parallel Distrib. Comput. 74(10), 2918\u20132933 (2014). \nhttps:\/\/doi.org\/10.1016\/j.jpdc.2014.06.007","DOI":"10.1016\/j.jpdc.2014.06.007"},{"key":"1657_CR30","unstructured":"http:\/\/docs.aws.amazon.com"},{"key":"1657_CR31","unstructured":"https:\/\/en.wikipedia.org\/wiki\/CopperEgg"},{"key":"1657_CR32","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Idera_Software"},{"key":"1657_CR33","unstructured":"ManageEngine application manager user guide. \nwww.manageengine.com\/ServiceDeskPlus"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1657-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1657-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1657-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T18:02:44Z","timestamp":1574359364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1657-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,9]]},"references-count":33,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1657"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1657-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,9]]},"assertion":[{"value":"6 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}