scholarly journals Enhanced layered fog architecture for IoT sensing and actuation as a service

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Abdulsalam Alammari ◽  
Salman Abdul Moiz ◽  
Atul Negi

AbstractThe reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is evaluated using Yet Another Fog Simulator in different scenarios (numbers of users, sensors, actuators, and areas). A comparison was made for Sensing and Actuating as a Service (SAaaS) with/without layered fog, and layered fog with/without (failure reassignment, pre-specified cases in fog nodes, and offloading). The comparison was conducted in terms of computing/communication latencies and the number of missed messages for both observations and actuation commands. Results show that failure reassignment prevented losing messages and maintained network connectivity. Also, wisely selecting the monitoring fog node per end user pre-specified cases and the offloading scheme decreased actuation latency.

Author(s):  
Akashdeep Bhardwaj

With more and more organizations working on the cloud over unsecure internet, sharing files and emails and saving them on cloud storage imperative. Securing the end user sensitive data in transit has thus started to get maximum priority to protect it from Cloud company staff, hackers and data thieves. In this study, an attempt is made to review the research of end user data security. There is an urgent need for solutions for end users' data protection, privacy and during the times when migrating from one Cloud service provider to other. This chapter identifies end user data challenges and issues on cloud and presents use of Public Key Cryptography, Multi Factor Authentication and use of Cloud Aware applications as possible solutions.


2019 ◽  
pp. 1030-1046
Author(s):  
Akashdeep Bhardwaj

With more and more organizations working on the cloud over unsecure internet, sharing files and emails and saving them on cloud storage imperative. Securing the end user sensitive data in transit has thus started to get maximum priority to protect it from Cloud company staff, hackers and data thieves. In this study, an attempt is made to review the research of end user data security. There is an urgent need for solutions for end users' data protection, privacy and during the times when migrating from one Cloud service provider to other. This chapter identifies end user data challenges and issues on cloud and presents use of Public Key Cryptography, Multi Factor Authentication and use of Cloud Aware applications as possible solutions.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


Author(s):  
Ebin Deni Raj ◽  
L. D. Dhinesh Babu

Cloud computing is the most utilized and evolving technology in the past few years and has taken computing to a whole new level such that even common man is receiving the benefits. The end user in cloud computing always prefers a cloud service provider which is efficient, reliable and best quality of service at the lowest possible price. A cloud based gaming system relieves the player from the burden of possessing high end processing and graphic units. The storage of games hosted in clouds using the latest technologies in cloud has been discussed in detail. The Quality of service of games hosted in cloud is the main focus of this chapter and we have proposed a mathematical model for the same. The various factors in dealing with the quality of service on cloud based games have been analyzed in detail. The quality of experience of cloud based games and its relation with quality of service has been derived. This chapter focuses on the various storage techniques, quality of experience factors and correlates the same with QoS in cloud based games.


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2012 ◽  
Vol 2 (2) ◽  
pp. 31-40
Author(s):  
Siddesh G. M. ◽  
Srinivasa K. G.

With an advent of gaining popularity in cloud computing, there is a huge demand in ad-hoc services by the end users. These ad-hoc services cannot fully be provided by a service provider; hence Cloud mashup is a solution for this requirement. Cloud mashup is technology where end users can integrate different services of cloud service providers and create their own customized ad-hoc services. This paper proposes an efficient enterprise cloud mashup framework which supports dynamic composition of services to create a new service to the end users. The proposed framework is composed of an adapter, widgets, widget library and a mashup constructor module. Even a non technical end user can easily generate their own customized service on a cloud platform. Experiments reveal that the proposed framework is an efficient enterprise with cloud mashup service integration framework.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 248
Author(s):  
Devesh Lowe ◽  
Bhavna Galhotra

Emergence of Cloud computing in recent years has provided various options to end-users w.r.t. cloud services. Different end users have different requirements for cloud services such as IAAS, PAAS & SAAS, but these services can be availed using different pricing mechanisms such as PPU, PFR, leased based, subscription based and dynamic pricing based on factors such as initial cost, lease period, QoS, Age of resources and cost of maintenance. The authors work focusses on ‘pay-per-use’ model of cloud pricing by studying various aspects of this model and comparing the current pricing rates of leading cloud service provider. Through this paper, the authors try to analyse the pricing model used by provider by comparing similar pricing offered by competitors. Authors will also try to establish the fairness of pricing as basis for designing better model for such services. The idea of pay per use has emerged to counter the rampant software piracy, while capturing the marginal and heterogeneous users who have been often found to use pirated software, as the acquisition costs for perpetual usage are too high. The marginal usage does not justify the huge capital investment of perpetual license, thereby leading to software piracy. In this paper the authors have also discussed on the Pay per use SaaS model and how it is better than the perpetual licencing, Pay per use is primarily dependent upon certain market conditions, like higher potential for piracy, lower inconvenience costs, majority of marginal users, and strong cloud network presence. Whereas perpetual licensing is important for heavy users, a market having the above-mentioned conditions will always benefit the SaaS pay per use model. So while the developer finds advantages of increased authorized user network, lower costs of marketing, enhanced customer reliability, and lesser impact of piracy, the rewards for users are even greater as they get to use the licensed full & updated versions for a small fee, even for minor everyday usage without incurring the huge expenditure on acquisition.   


2015 ◽  
Vol 8 (1) ◽  
Author(s):  
Swati Ganeti ◽  
Rajat Agarwal ◽  
Murali Krishna Medudula ◽  
Mahim Sagar

Telecom industry is one of those industries which has changed dramatically during the past decade. With more and more players entering in this industry, competition is ever increasing. The war between these players is slowly shifting from the price to the augmentation. This paper aims at exploring such factors which influence a customers preference of one telecom service provider (TSP) over the other. It is a descriptive research where study has been conducted among the consumers of different telecom service providers (TSPs). By reviewing the existing literature in this domain, we explored different factors which affect the consumers decision to prefer one telecom service provider over the other. A consumer targeted questionnaire was designed where consumers were asked about the factors they consider (with their relative importance quantified using Likert scale), before buying a new network connection to know the relative importance of the various factors. Factor Analysis was performed to club various variables into distinct factors. Statistical techniques then helped in identifying the relative importance. From the Factor Loading matrix the following five factors were generated:- Overall service quality, Point of Purchase Differentiator, Promotion Measures, Tariff Plans and Size of the Network. Further study in the behavioural perceptions of consumer shows that the most important factor in influencing the customer buying behavior is Service Quality. The second most important factor is cost and various plans offered by the telecom service provider. Network connectivity was considered by almost all the respondents and consumers prefer the largest network player. The study also found that promotional measures dont influence the customers as expected.


Sign in / Sign up

Export Citation Format

Share Document