scholarly journals W_SR: A QoS Based Ranking Approach for Cloud Computing Service

2014 ◽  
Vol 3 (2) ◽  
pp. 55-62 ◽  
Author(s):  
Arezoo Jahani ◽  
Leyli Mohammad Khanli ◽  
Seyed Naser Razavi

Cloud computing is a kind of computing model that promise accessing to information resources in request time and subscription basis. In this environment, there are different type of user’s application with different requirements. In addition, there are different cloud Service providers which present spate services with various qualitative traits. Therefore determining the best cloud computing service for users with specific applications is a serious problem. Service ranking system compares the different services based on quality of services (QoS), in order to select the most appropriate service. In this paper, we propose a W_SR (Weight Service Rank) approach for cloud service ranking that uses from QoS features. Comprehensive experiments are conducted employing real-world QoS dataset, including more than 2500 web services over the world. The experimental results show that execution time of our approach is less than other approaches and it is more flexible and scalable than the others with increase in services or users.

Author(s):  
Narander Kumar ◽  
Surendra Kumar

Background: Cloud Computing can utilize processing and efficient resources on a metered premise. This feature is a significant research problem, like giving great Quality-of-Services (QoS) to the cloud clients. Objective: Quality of Services confirmation with minimum utilization of resource and their time/costs, cloud service providers ought to receive self-versatile of the resource provisioning at each level. Currently, various guidelines, as well as model-based methodologies, have been intended to the management of resources aspects in the cloud computing services. Method: In this Research article, manage resource allocations dependent optimization Salp Swarm Algorithm (SSA) areused to merge various numbers of VMs on lessening Data Centers to SLA as well as required Quality-of-Service (QoS) with most extreme data centers use. Result: We compared with the various approaches like the First fit (FF), greedy crow search (GCS), and hybrid crow search with the response time and resource utilization. Conclusion: The proposed mechanism is simulated on Cloudsim Simulator, the simulation results show less migration time that improves the QoS as well minimize the energy consumssion in a cloud computing and IoT environment.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


2012 ◽  
Vol 44 (4) ◽  
pp. 995-1017 ◽  
Author(s):  
Souvik Ghosh ◽  
Soumyadip Ghosh

Cloud-computing shares a common pool of resources across customers at a scale that is orders of magnitude larger than traditional multiuser systems. Constituent physical compute servers are allocated multiple ‘virtual machines' (VMs) to serve simultaneously. Each VM user should ideally be unaffected by others’ demand. Naturally, this environment produces new challenges for the service providers in meeting customer expectations while extracting an efficient utilization from server resources. We study a new cloud service metric that measures prolonged latency or delay suffered by customers. We model the workload process of a cloud server and analyze the process as the customer population grows. The capacity required to ensure that the average workload does not exceed a threshold over long segments is characterized. This can be used by cloud operators to provide service guarantees on avoiding long durations of latency. As part of the analysis, we provide a uniform large deviation principle for collections of random variables that is of independent interest.


2018 ◽  
Author(s):  
Daisy Christiana Santoso

ABSTRACRestaurant or caffee is part of tourism industry that played a role as service providers food and beverage for people who were far from home. The customer’s need of value service pushing the service provider of food and beverage to get involved in the competition and won them all. Any activities of the restaurant must be focused on management efforts to provide the performances of service that exceed expectations of customers. These efforts can be done through the development of the quality of care with consists of reability, responsibility, assurance, empathy, and tangibles. Based on the above description, then done reseacrh on the strategy the development of the quality of services to the satisfaction of customers. Unit analysis of this research are the guests who has ever been and making purchases at Dave Kichen. Methods used in this study is the method of observation, interview and documentation. The analysis of data used is the analysis of qualitative to see the influence of a variable is independent of variable dependent. The analysis is shown by those independent states (in the world service) to variable dependent (reward customers). These other factors that arent pursuing.


2018 ◽  
Vol 2 (2) ◽  
pp. 51-54
Author(s):  
E.O. Opoku

Ghana has attained cloud readiness indices facilitating services adoption by local enterprises through brokerage firms. Accordingto Gartner group by 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages,rather than directly with service providers. It means enterprises must identify local cloud brokerage firms to intermediate for cloudclients and service providers. We aimed at surveying cloud service awareness among enterprises in Ghana. We performed fieldstudy using statistical tool to analyze data collected among 45-participants spread across 20 local enterprises, using purposivesampling in the selection of strategic enterprise managers located in the second largest city, Kumasi, Ghana. We employedDelphi technique involving three Information Technology experts to validate responses in reducing margin of error in the analysis.We found that 67% respondents are unaware of local cloud service brokerage firms. Alternatively, 33% respondents mentioned atleast one local cloud brokerage firm; although experts believed some did a chess guessing to have it correct. Our Delphi expertsattributed this alarming percentile to lack of policy stakeholders involvement in ensuring cloud adoption readiness. We concludedon effective sensitization of cloud computing service adoption in optimizing data center proliferation by enterprises in Ghana.Adopting cloud computing over data center helps in reducing global warming contributed by heat emissions from computingservers.


Author(s):  
Jun Zhao ◽  
Tingyu Sheng

Background: The Open Cloud Computing Alliance (OCCA) strives for more Cloud Computing Service Providers (CCSP) to join the alliance. OCCA only requires CCSP to provide virtual computing resources and does not care about the methods of the underlying implementation, which leads the open-source cloud computing to a larger scale and more efficient. Due to the differences in service modes and service categories, the cloud computing platforms formed by CCSP are heterogeneous. How to implement tasks across platforms and ensure the quality of migration are the key issue for sharing the OCCA platform. Methods: The Mobile Agent technology based on a domain is introduced. User tasks are encapsulated into Mobile agent packets by domain client, which realizes the migration of user tasks from one platform to another, and makes it possible to interoperate between OCCA virtual machines. To ensure the service quality of OCCA better, a five-layer logical model of R-OCCA with high commercial availability is proposed, which defines the service content of each layer and gives the setting of key parameters. This paper introduces the architectural composition and operational mechanism of the model, which carries out a qualitative analysis of the model, and establishes an experimental prototype to verify the feasibility of the model on the virtual machine platform. Results: Experiments show that it is feasible to implement Cloud Computing Alliance among cloud computing platforms through Mobile Agent under the existing technical conditions. Conclusion: To better guarantee the quality of OCCA service, a five-level R-OCCA logic model with strong commercial availability is proposed. The service content of each level is defined and the key parameters are given. From the CCSP income, the rationality of the model set is explained. The feasibility of the model was analyzed. The architectural composition and operational mechanisms of the model are introduced. The performance of the model was also analyzed.


2012 ◽  
Vol 44 (04) ◽  
pp. 995-1017
Author(s):  
Souvik Ghosh ◽  
Soumyadip Ghosh

Cloud-computing shares a common pool of resources across customers at a scale that is orders of magnitude larger than traditional multiuser systems. Constituent physical compute servers are allocated multiple ‘virtual machines' (VMs) to serve simultaneously. Each VM user should ideally be unaffected by others’ demand. Naturally, this environment produces new challenges for the service providers in meeting customer expectations while extracting an efficient utilization from server resources. We study a new cloud service metric that measures prolonged latency or delay suffered by customers. We model the workload process of a cloud server and analyze the process as the customer population grows. The capacity required to ensure that the average workload does not exceed a threshold over long segments is characterized. This can be used by cloud operators to provide service guarantees on avoiding long durations of latency. As part of the analysis, we provide a uniform large deviation principle for collections of random variables that is of independent interest.


2019 ◽  
Vol 8 (3) ◽  
pp. 3132-3143

In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing. It interrelates various applications like sales, purchase, banking, customer service, etc. and it behaves entirely as a service-oriented platform or environment. The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately. Though the energy is high, it cannot assure that the cloud computing, service providing, and customer maintenance are highly secured. Service providers in the cloud are not strictly public; it may be private, community and hybrid. Malicious activities can be created or occurred in the middle of the communication and it is difficult to predict a particular person in the middle becomes a malicious user, from where and how. Secured data transmission and discussion in cloud computing considered as the main problem, and various earlier research works focused on tightening the security. The primary objective of this paper is to discuss different security mechanisms applied to multiple malicious threats in the cloud to understand the various issues and challenges faced in earlier research works. It provides a summary of the risks, appropriate method and the limitations and it helps to understand the primary and main problems related to security.


T-Comm ◽  
2020 ◽  
Vol 14 (12) ◽  
pp. 72-79
Author(s):  
Aleksandr O. Volkov ◽  

For cloud service providers, one of the most relevant tasks is to maintain the required quality of service (QoS) at an acceptable level for customers. This condition complicates the work of providers, since now they need to not only manage their resources, but also provide the expected level of QoS for customers. All these factors require an accurate and well-adapted mechanism for analyzing the performance of the service provided. For the reasons stated above, the development of a model and algorithms for estimation the required resource is an urgent task that plays a significant role in cloud systems performance evaluation. In cloud systems, there is a serious variance in the requirements for the provided resource, as well as there is a need to quickly process incoming requests and maintain the proper level of quality of service – all of these factors cause difficulties for cloud providers. The proposed analytical model for processing requests for a cloud computing system in the Processor Sharing (PS) service mode allows us to solve emerging problems. In this work, the flow of service requests is described by the Poisson model, which is a special case of the Engset model. The proposed model and the results of its analysis can be used to evaluate the main characteristics of the performance of cloud systems.


Sign in / Sign up

Export Citation Format

Share Document