scholarly journals A trust evaluation scheme of service providers in mobile edge computing

Author(s):  
Merrihan Badr Monir Mansour ◽  
Tamer Abdelkader ◽  
Mohammed Hashem AbdelAziz ◽  
El-Sayed Mohamed EI-Horbaty

Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network edge. Despite its great need in terms of computational services in daily life, service users may have several concerns while selecting a suitable service provider to fulfil their computational requirements. Such concerns are: with whom they are dealing with, where will their private data migrate to, service provider processing performance quality. Therefore, this paper presents a trust evaluation scheme that evaluates the processing performance of a service provider in the MEC environment. Processing performance of service providers is evaluated in terms of average processing success rate and processing throughput, thus allocating a service provider in a relevant trust status. Service provider processing incompliance and user termination ratio are also computed during provider’s interactions with users. This is in an attempt to help future service users to be acknowledged of service provider’s past interactions prior dealing with it. Thus, eliminating the probability of existing compromised service providers and raising the security and success of future interactions between service providers and users. Simulations results show service providers processing performance degree, processing incompliance and user termination ratio. A service provider is allocated to a trust status according to the evaluated processing performance trust degree.

2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


2020 ◽  
Vol 13 (5) ◽  
pp. 1744-1755
Author(s):  
Xiaoheng Deng ◽  
Jin Liu ◽  
Leilei Wang ◽  
Zhihui Zhao

2021 ◽  
Vol 2 (5) ◽  
pp. 1-12
Author(s):  
Benedetta Picano ◽  
Romano Fantacci ◽  
Tommaso Pecorella ◽  
Adnan Rashid

In accordance with the Internet of Everything (IoE) paradigm, millions of people and billions of devices are expected to be connected to each other, giving rise to an ever increasing demand for application services with a strict quality of service requirements. Therefore, service providers are dealing with the functional integration of the classical cloud computing architecture with edge computing networks. However, the intrinsic limited capacity of the edge computing nodes implies the need for proper virtual functions' allocations to improve user satisfaction and service fulfillment. In this sense, demand prediction is crucial in services management and exploitation. The main challenge here consists of the high variability of application requests that result in inaccurate forecasts. Federated learning has recently emerged as a solution to train mathematical learning models on the users' site. This paper investigates the application of federated learning to virtual functions demand prediction in IoE based edge cloud computing systems, to preserve the data security and maximise service provider revenue. Additionally, the paper proposes a virtual function placement based on the services demand prediction provided by the federated learning module. A matching based tasks allocation is proposed. Finally, numerical results validate the proposed approach, compared with a chaos theory prediction scheme.


2021 ◽  
Vol 5 (4) ◽  
pp. p29
Author(s):  
Kamil Oygur Yamak

Call center is the frontline of communicating with customers. This paper reports the findings of a survey on service effectiveness of call center operations of mobile communication service providers in Turkey that either use in-house or outsourcing method. The primary objective of this paper is to explore how the customers of mobile communications service provider companies perceive the inbound call center processes for speed, easiness of use, first call resolution, effective inquiry and in doing that what qualities they display. For this purpose a survey was conducted with the customers who use call centers either to make an inquiry or to complain about the services. The aims were: to specify the typical behavior of mobile communications service users; how the firms handle inquiries or complaints; if they solve the problems for good and in what time or how long it takes to get an answer practically useful; to reveal the speed and timeliness of the processes. The survey was conducted with the mobile phone users in a highly populated area of Istanbul.


2020 ◽  
Vol 31 (4) ◽  
pp. 411-424
Author(s):  
Han Lai ◽  
Huchang Liao ◽  
Zhi Wen ◽  
Edmundas Kazimieras Zavadskas ◽  
Abdullah Al-Barakati

With the rapid growth of available online cloud services and providers for customers, the selection of cloud service providers plays a crucial role in on-demand service selection on a subscription basis. Selecting a suitable cloud service provider requires a careful analysis and a reasonable ranking method. In this study, an improved combined compromise solution (CoCoSo) method is proposed to identify the ranking of cloud service providers. Based on the original CoCoSo method, we analyze the defects of the final aggregation operator in the original CoCoSo method which ignores the equal importance of the three subordinate compromise scores, and employ the operator of “Linear Sum Normalization” to normalize the three subordinate compromise scores so as to make the results reasonable. In addition, we introduce a maximum variance optimization model which can increase the discrimination degree of evaluation results and avoid inconsistent ordering. A numerical example of the trust evaluation of cloud service providers is given to demonstrate the applicability of the proposed method. Furthermore, we perform sensitivity analysis and comparative analysis to justify the accuracy of the decision outcomes derived by the proposed method. Besides, the results of discrimination test also indicate that the proposed method is more effective than the original CoCoSo method in identifying the subtle differences among alternatives.


2021 ◽  
Vol 2 (3) ◽  
pp. 476-482
Author(s):  
Dyah Merryani ◽  
I Nyoman Putu Budiartha ◽  
I Made Minggu Widyantara

Car driving courses are tutoring related to driving skills that aim to provide knowledge of how to drive a car to course service users. Course service users are accompanied and trained by the instructor during the driving course. However, users of course services with instructors will be faced with unexpected events, which often occur, namely traffic accidents. The purpose of this research is to uncover the legal relationship that occurs between car driving course service providers and instructors and also the course service users form the responsibility of the car driving course service provider if an accident occurs during the driving course. This research is an empirical legal research with a sociological juridical approach and a statutory approach. The data collection technique was done by interview. Sources of data used in this research are primary data sources and secondary data sources. After the data was collected, it was analyzed systematically. The results of this research indicate that there is a legal relationship between the parties involved, namely the working relationship that occurs between the instructor and the driving course service provider, and the agreement from the course service user through filling out the course registration form to the driving course service provider. The occurrence of a traffic accident during the driving course practice will be accounted for by the driving course service provider as the employer and the instructor as a companion or trainer for the course service user during the driving course.


2013 ◽  
Vol 22 (05) ◽  
pp. 1360003
Author(s):  
SINA HONARI ◽  
BRIGITTE JAUMARD ◽  
JAMAL BENTAHAR

Despite the widespread usage of the evaluation mediums for online services by the clients, there is a requirement for a trust evaluation tool that provides the clients with the degree of trustworthiness of the service providers. Such a tool can provide increased familiarity with unknown third party entities, e.g. service providers, especially when those entities neither project completely trustworthy nor totally untrustworthy behaviour. Indeed, developing some metrics for trust evaluation under uncertainty can come handy, e.g., for customers interested in evaluating the trustworthiness of an unknown service provider throughout queries to other customers of unknown reliability. In this research, we propose an evaluation metric to estimate the degree of trustworthiness of an unknown agent, say aD, through the information acquired through a group of agents who have interacted with agent aD. This group of agents is assumed to have an unknown degree of reliability. In order to tackle the uncertainty associated with the trust of these set of unknown agents, we suggest to use possibility distributions. Later, we introduce a new certainty metric to measure the degree of agreement in the information reported by the group of agents in A on agent aD. Fusion rules are then used to measure an estimation of the agent aD’s degree of trustworthiness. To the best of our knowledge, this is the first work that estimates trust, out of empirical data, subject to some uncertainty, in a discrete multi-valued trust domain. Finally, numerical experiments are presented to validate the proposed tools and metrics.


Sign in / Sign up

Export Citation Format

Share Document