Intuitionistic Fuzzy Score Function Based Multi-Criteria Decision Making Method for Selection of Cloud Service Provider

Author(s):  
Sonal Agrawal ◽  
Pradeep Tripathi

Aims & Background: Cloud Computing (CC) has received great attention from the scholarly researchers and IT companies. CC is a standard that offers services through the Internet. The standard has been manipulated by existing skills (such as collect, peer-to-peer and grid computing) and currently accepted by approximately all major associations. Various associations like as Microsoft and Facebook have revealed momentous investments in CC and currently offer services with top levels of reliability. The well-organized and precise evaluation of cloud-based communication network is an essential step in assurance both the business constancy and the continuous open services. Objectives & Methods: To select and rank the CC service providers, we introduce an Improved Score Function (ISF) based Multi-Criteria Decision-Making (MCDM) approach. The proposed approach is developed to solve the MCDM problems with partly unknown weight. To do this, the criteria preferences are given in terms of Intuitionistic Fuzzy Sets (IFSs). Numerical example is illustrated to show the effectiveness of the proposed approach over the previous ones. Results: A decision making problem of cloud computing service provider has been considered for signifying the developed technique and finishes with the outcomes coincide with the already developed methods which confirms the solidity of the developed method. Conclusion: For future, we plan to implement the proposed technique on various decision making problems, clustering and multi-objective problems. Also, we plan to extend our method under different uncertain atmosphere by using other MCDM methods.

2021 ◽  
Vol 18 (2(Suppl.)) ◽  
pp. 1020
Author(s):  
Narander Kumar ◽  
Surendra Kumar

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this research article, a toolbox is proposed to help the procedure of exchanging of a SLA with the service providers that will enable the cloud client in indicating service quality demands and an algorithm as well as Negotiation model is also proposed to negotiate the request with the service providers to produce a better agreement between service provider and cloud service consumer. Subsequently, the discussed framework can reduce SLA violations as well as negotiation disappointments and have expanded cost-adequacy. Moreover, the suggested SLA toolkit is additionally productive to clients so clients can secure a sensible value repayment for diminished QoS or conceding time. This research shows the assurance level in the cloud service providers can be kept up by as yet conveying the services with no interruption from the client's perspective


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2022 ◽  
pp. 124-148
Author(s):  
Ignitia Motjolopane ◽  
Tshinakaho Relebogile Seaba

In a digital arena, information technology services provision is shifting to a cloud computing ecosystem. Cloud computing is an enabler for digital transformation with cloud computing service providers central to the digital transformation of both companies and higher education. As cloud computing service providers play the role of an ‘architect' for companies as supply chain is digitised and in supporting higher education institutions striving to deliver user-focused services in the face of increasing competition, an understanding of successful characteristics of cloud computing service provider business models is of main interest for providers and may also be of value for companies and higher education institutions when selecting cloud computing service providers. Despite the importance of cloud computing service providers' business models, information systems literature has provided limited analysis on the characteristics of successful business models. As such, the chapter aims to contribute to the emerging research on characteristics of successful business models.


2011 ◽  
Vol 2 (1) ◽  
pp. 43-49 ◽  
Author(s):  
Cui-Ping Wei ◽  
Xijin Tang

In this paper the ranking method for intuitionistic fuzzy numbers is studied. The authors first define a possibility degree formula to compare two intuitionistic fuzzy numbers. In comparison with Chen and Tan’s score function, the possibility degree formula provides additional information for the comparison of two intuitionistic fuzzy numbers. Based on the possibility degree formula, the authors give a possibility degree method to rank intuitionistic fuzzy numbers, which is used to rank the alternatives in multi-criteria decision making problems.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


2012 ◽  
Vol 44 (4) ◽  
pp. 995-1017 ◽  
Author(s):  
Souvik Ghosh ◽  
Soumyadip Ghosh

Cloud-computing shares a common pool of resources across customers at a scale that is orders of magnitude larger than traditional multiuser systems. Constituent physical compute servers are allocated multiple ‘virtual machines' (VMs) to serve simultaneously. Each VM user should ideally be unaffected by others’ demand. Naturally, this environment produces new challenges for the service providers in meeting customer expectations while extracting an efficient utilization from server resources. We study a new cloud service metric that measures prolonged latency or delay suffered by customers. We model the workload process of a cloud server and analyze the process as the customer population grows. The capacity required to ensure that the average workload does not exceed a threshold over long segments is characterized. This can be used by cloud operators to provide service guarantees on avoiding long durations of latency. As part of the analysis, we provide a uniform large deviation principle for collections of random variables that is of independent interest.


2018 ◽  
Vol 2 (2) ◽  
pp. 51-54
Author(s):  
E.O. Opoku

Ghana has attained cloud readiness indices facilitating services adoption by local enterprises through brokerage firms. Accordingto Gartner group by 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages,rather than directly with service providers. It means enterprises must identify local cloud brokerage firms to intermediate for cloudclients and service providers. We aimed at surveying cloud service awareness among enterprises in Ghana. We performed fieldstudy using statistical tool to analyze data collected among 45-participants spread across 20 local enterprises, using purposivesampling in the selection of strategic enterprise managers located in the second largest city, Kumasi, Ghana. We employedDelphi technique involving three Information Technology experts to validate responses in reducing margin of error in the analysis.We found that 67% respondents are unaware of local cloud service brokerage firms. Alternatively, 33% respondents mentioned atleast one local cloud brokerage firm; although experts believed some did a chess guessing to have it correct. Our Delphi expertsattributed this alarming percentile to lack of policy stakeholders involvement in ensuring cloud adoption readiness. We concludedon effective sensitization of cloud computing service adoption in optimizing data center proliferation by enterprises in Ghana.Adopting cloud computing over data center helps in reducing global warming contributed by heat emissions from computingservers.


Sign in / Sign up

Export Citation Format

Share Document