scholarly journals Quality Evaluation Model for Smart City Social Sports Information Cloud Service

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Lan Zhang

With the continuous development of social economy, social sport is more and more valued and favored by the people as a universal and nationwide sport, but it should be noted that social sport involves a wide range of aspects, but due to its particularity, it is also constrained by economic development. In view of these needs and limitations, three technical methods of entropy method, RSR (rank-sum ratio), and TOPSIS are introduced, to sort out the development of social sports, national physical development, social sports guidance, and the number of people to be measured in various places based on the relevant technologies of smart cities in this paper, realize the application analysis of social sports in the public service level. This paper aims to provide a scientific evaluation and evaluation method for social sports information cloud services. The results of simulation experiments show that the evaluation of social sports information cloud service quality based on smart cities is effective, and the comprehensive application of methods can be implemented perfectly, and the further promotion and popularization of social sports services can be realized.

2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


2020 ◽  
Vol 17 (12) ◽  
pp. 5296-5306
Author(s):  
N. Keerthana ◽  
Viji Vinod ◽  
Sudhakar Sengan

Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories, and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.


2013 ◽  
Vol 4 (3) ◽  
pp. 38-52
Author(s):  
Sai Manoj Marepalli ◽  
Razia Sultana ◽  
Andreas Christ

Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).


2020 ◽  
Vol 12 ◽  
pp. 184797901989744 ◽  
Author(s):  
Panjun Sun

Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.


2020 ◽  
Vol 26 (12) ◽  
pp. 697-700
Author(s):  
V. I. Belovitskiy ◽  

The development of cloud services improving the interaction of banks, stores and customers becomes high-demanded by digitalized society, that is ready to use innovative software products. The Receipts & Promotions cloud service, developed at the concept level, allows to realize the idea of providing complete information of a receipt in electronic form along with printed receipt for the Mir plastic card holders through the "Privet, Mir!" mobile application. Information from electronic receipts accumulated in the Mir cloud will allow the customer to receive personalized bonus offers from the stores — partners of the program, as well as manage the family budget. The introduction of the service opens up the wide opportunities to the stores for communication with customers. The Receipts & Promotions service is able to become the first software product based on the collection and analysis of information from electronic receipts linked to a specific user. The system of flexible personalization of bonus offers and their assessment by customers is unique and not implemented in other software products. It will be possible to consider the display of electronic receipts in the "Privet, Mir!" mobile application in a user-friendly interface as the first fully automated option of providing electronic receipts to a wide range of users.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2021 ◽  
Author(s):  
Kashif Mehboob Khan ◽  
Junaid Arshad ◽  
Waheed Iqbal ◽  
Sidrah Abdullah ◽  
Hassan Zaib

AbstractCloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such as availability and response times. Service Level Agreements (SLAs) are a mechanism to communicate and enforce such guarantees typically represented as service level objectives (SLOs), and financial penalties are imposed on SLO violations. Due to delays and inaccuracies caused by manual processing, an automatic method to periodically verify SLA terms in a transparent and trustworthy manner is fundamental to effective SLA monitoring, leading to the acceptance and credibility of such service to the customers of cloud services. This paper presents a blockchain-based distributed infrastructure that leverages fundamental blockchain properties to achieve immutable and trustworthy SLA monitoring within cloud services. The paper carries out an in-depth empirical investigation for the scalability of the proposed system in order to address the challenge of transparently enforcing real-time monitoring of cloud-hosted services leveraging blockchain technology. This will enable all the stakeholders to enforce accurate execution of SLA without any imprecisions and delays by maintaining an immutable ledger publicly across blockchain network. The experimentation takes into consideration several attributes of blockchain which are critical in achieving optimum performance. The paper also investigates key characteristics of these factors and their impact to the behaviour of the system for further scaling it up under various cases for increased service utilization.


Author(s):  
Jin Cui ◽  
Lin Zhang

By enabling consumer products to be produced on demand and eliminating waste caused by excessive production and transportation, 3D Printing Cloud Services (3DPCSs) are increasingly welcomed by non-professional customers. With more and more 3D printers becoming available on various 3DPCS platforms, the evaluation and selection problem of 3DPCS has attracted much attention for both novices and experienced users. In this paper, we propose a probabilistic-based extendable quantitative evaluation method for 3DPCS evaluation. This method combines the advantages of the information transformation technique, the multinomial distribution probabilistic model, and the uncertainty based weighting method. Evaluation factors, the major attributes that significantly affect the performance of a 3DPCS, are modeled using probabilistic models. At the same time, historical service data is introduced to dynamically identify and update the evaluation factors. Based on these parameters, the proposed quantitative evaluation method can support the evaluation and comparison of 3DPCSs. Numerical simulation experiments are designed and implemented. The corresponding results verify the effectiveness of the proposed evaluation model. The presented evaluation method can serve as the basis of service evaluation and selection on a 3DPCS platform. Although the focus of this work is on 3DPCS, the idea can apply to other types of cloud manufacturing services.


2021 ◽  
Author(s):  
Sameer Singh Chauhan ◽  
Emmanuel S Pilli ◽  
R C Joshi

Abstract Federated Cloud is a multi-cloud platform that integrates various cloud providers either through standardization or an agreement. The services offered by different federation members possess different access patterns, similar characteristics, varied performance levels, different costs, etc. This heterogeneity creates a challenging task for users to decide a suitable service as per their application requirements. Cloud broker, an inter-mediator is required in service and federation management to help both service provider and users. Cloud broker has to store all the information related to services and feedback of users on those services in order to provide the best services to end-users. Brokering model for service selection (BSS) has been proposed which employs integrated weighting approach in cloud service selection. Subjective and objective weights of QoS attributes are combined to compute integrated total weight. Subjective weight is obtained from users’ feedback on QoS attributes of a cloud service while objective weight is computed from benchmark tested data of cloud services. Users' feedback and preferences given to QoS parameters are employed in subjective weight computation. Objective weight is computed using Shannon's Entropy method. Total weight is obtained by combining subjective and objective weights. BSS method is employed to rank cloud services. Simulation with a case study on real dataset has been done to validate the effectiveness of BSS. The obtained results demonstrate the consistency of model for handling rank reversal problem and provides better execution time than other state-of-the art solutions.


Sign in / Sign up

Export Citation Format

Share Document