scholarly journals mCSQAM: Service Quality Assessment Model in Mobile Cloud Services Environment

2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Young-Rok Shin ◽  
Eui-Nam Huh

Cloud computing is high technology that extends existing IT capabilities and requirements. Recently, the cloud computing paradigm is towards mobile with advances of mobile network and personal devices. As concept of mobile cloud, the number of providers rapidly increases for various mobile cloud services. Despite development of cloud computing, most service providers used their own policies to deliver their services to user. In other words, quality criteria for mobile cloud service assessment are not clearly established yet. To solve the problem, there were some researches that proposed models for service quality assessment. However, they did not consider various metrics to assess service quality. Although existing research considers various metrics, they did not consider newly generated Service Level Agreement. In this paper, to solve the problem, we proposed a mobile cloud service assessment model called mCSQAM and verify our model through few case researches. To apply the mobile cloud, proposed assessment model is transformed from ISO/IEC 9126 which is an international standard for software quality assessment. mCSQAM can provide service quality assessment and determine raking of the service. Furthermore, if Cloud Service Broker includes mCSQAM, appropriate services can be recommended for service users using user and service conditions.

2015 ◽  
Vol 28 (1) ◽  
pp. 17-37 ◽  
Author(s):  
Noel Carroll

The globalised nature of cloud computing presents us with new challenges towards the development of effective business relationships across a dynamic service ecosystem. While availing of additional service capabilities, organisations are tasked with managing unfamiliar relationships with unfamiliar cloud service providers to generate increased business value. This calls for more attention towards the concept of trust within a cloud service environment. Cloud computing presents new economic and flexible business and technological models which supports the co-creation nature of service quality and ultimately business value. This research examined various methods to assess service quality and service capability assessment. During the course of this work, the author has identified the need to revisit the concept of ‘trust' within a cloud computing context and prescribe a method to model its complexity. The objective of this paper is to argue that, while cloud computing allows organisations to avail of increased service capabilities; it challenges the concept of trust. To support this argument the author presents the Cloud Services Trust Model to explain the dynamics of trust. In doing so, it introduces a notion of a distributed relational structure in service value co-creation. The paper also draws on theoretical developments to highlight the fundamental changes in the nature of service provision and how they impact on the assessment of service value and service quality. The author supports the need for greater transparency in the move towards greater accountability in the cloud ecosystem. The paper applies social network analysis (SNA) to model the trust relationships of a cloud brokerage environment.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2014 ◽  
Vol 1061-1062 ◽  
pp. 1079-1082
Author(s):  
Min Yao

Mobile cloud computing provides a deeper hierarchical tangibility for the construction and environment of digital library and mobile cloud services will certainly become the service mode of the future digital library. From three aspects: information resources integration, the expansion of mobile terminal device capability, information service innovation, this paper discusses upgrade of overall strength of mobile cloud design to digital library information service. At the same time, it also detailed introduces the main function of mobile computing platform layer, mobile cloud library platform layer and mobile terminal application layer.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


10.29007/j2nc ◽  
2019 ◽  
Author(s):  
Kenneth Ayong ◽  
Rennie Naidoo

The adoption of cloud computing among SMEs in developing countries, particularly South Africa, is still very low. The purpose of this study is to develop a conceptual model to assess the critical factors that influences South African SMEs to adopt cloud services. This paper proposes an integrated conceptual model that incorporates critical factors from the diffusion of innovation (DOI) theory, institutional theory, transaction cost theory, organisation theory, information security theory, and trust theories. Cloud computing adoption research dominated by the DOI perspective, can benefit from further cross- fertilization with different theories to explain and predict patterns of cloud services use in the SME context. This model is expected to offer deeper insights and practical value to SME decision makers, cloud service providers, regulatory agencies and government responsible for establishing cloud computing adoption strategies for SMEs in South Africa. We intend to apply this model to survey research in future studies.


2021 ◽  
Author(s):  
Md Ahsan Ullah

Cloud service broker (CSB) as an emerging technology intermediates heterogeneous multiple cloud services for both the providers and consumers. Recently, Cloud computing & mobile cloud computing applications (MCA) have gained an enormous popularity, which has led to an increasing need for the development of platform independent Middleware/CSB to support all types of cloud service consumer applications including x86*x64 based standard OS & ARM based mobile applications, web browsers, etc. Developing Platform Independent Hybrid CSB, however, is not an easy task. Developers have to deal with difficulties inherent from the different cloud controllers, cloud service providers environments, clients’ application types, network connection types (wired, wireless), GPS (Global Positioning Systems) information of cloud resources and clients’ etc. In this thesis, the proposed design of a middleware/CSB that abstracts the real-time resources of various clouds (private, public, home, Local) and stores the resources in its own Database. It will also store clients requests then analyzes the request to find the nearest available servers which is running the appropriate applications. Then the CSB will forward the destination servers information to the clients. Thesis goal is to achieve context awareness, location awareness, platform independence, portability, efficiency, and usability. Portability is achieved by following the J2ME platform specifications. The middleware has been implemented and tested on a real time Openstack cloud using by our newly designed Android Clients and platform independent Mozilla Firefox browser. The performance measurements of the middleware show that it achieves its efficiency requirements. Furthermore, the middleware’s database can be used for resource algorithm, pattern analysis, and for future requirements.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Sign in / Sign up

Export Citation Format

Share Document