scholarly journals Collaboration of Smart Device in Cloud Manufacturing: A Case of Active Recommendation Model Based on Service Agent

Author(s):  
Chun Zhao ◽  
Mo Chen ◽  
Lihui Wang ◽  
Lin Zhang

By the developing and the application of cloud manufacturing, many new business modes based on the IoT, CPS, cloud computing are springing up. It is worthwhile to model a new business mode simulate it to verify the feasibility. In this paper, with a demand of smart devices from a fresh-mix drink company, service agents are used for modeling and a basic comparison model is proposed for the negotiation between service providers to vote for the service provider that best suits the consumer’s demand. A simulation platform that originates from cloud manufacturing is used to simulate the drink ordering, provider negotiation and provider recommendation. Simulation results show that consumers can obtain expected drinks after the negotiations and votes made by providers. Moreover, the system can recommend drinks with different freshness depending on the expiration parameter set by the company.

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2347
Author(s):  
Yanyan Wang ◽  
Lin Wang ◽  
Ruijuan Zheng ◽  
Xuhui Zhao ◽  
Muhua Liu

In smart homes, the computational offloading technology of edge cloud computing (ECC) can effectively deal with the large amount of computation generated by smart devices. In this paper, we propose a computational offloading strategy for minimizing delay based on the back-pressure algorithm (BMDCO) to get the offloading decision and the number of tasks that can be offloaded. Specifically, we first construct a system with multiple local smart device task queues and multiple edge processor task queues. Then, we formulate an offloading strategy to minimize the queue length of tasks in each time slot by minimizing the Lyapunov drift optimization problem, so as to realize the stability of queues and improve the offloading performance. In addition, we give a theoretical analysis on the stability of the BMDCO algorithm by deducing the upper bound of all queues in this system. The simulation results show the stability of the proposed algorithm, and demonstrate that the BMDCO algorithm is superior to other alternatives. Compared with other algorithms, this algorithm can effectively reduce the computation delay.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2022 ◽  
pp. 124-148
Author(s):  
Ignitia Motjolopane ◽  
Tshinakaho Relebogile Seaba

In a digital arena, information technology services provision is shifting to a cloud computing ecosystem. Cloud computing is an enabler for digital transformation with cloud computing service providers central to the digital transformation of both companies and higher education. As cloud computing service providers play the role of an ‘architect' for companies as supply chain is digitised and in supporting higher education institutions striving to deliver user-focused services in the face of increasing competition, an understanding of successful characteristics of cloud computing service provider business models is of main interest for providers and may also be of value for companies and higher education institutions when selecting cloud computing service providers. Despite the importance of cloud computing service providers' business models, information systems literature has provided limited analysis on the characteristics of successful business models. As such, the chapter aims to contribute to the emerging research on characteristics of successful business models.


2014 ◽  
Vol 2014 ◽  
pp. 1-19 ◽  
Author(s):  
Raquel Lacuesta ◽  
Jaime Lloret ◽  
Sandra Sendra ◽  
Lourdes Peñalver

Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.


2021 ◽  
Vol 2 (5) ◽  
pp. 1-12
Author(s):  
Benedetta Picano ◽  
Romano Fantacci ◽  
Tommaso Pecorella ◽  
Adnan Rashid

In accordance with the Internet of Everything (IoE) paradigm, millions of people and billions of devices are expected to be connected to each other, giving rise to an ever increasing demand for application services with a strict quality of service requirements. Therefore, service providers are dealing with the functional integration of the classical cloud computing architecture with edge computing networks. However, the intrinsic limited capacity of the edge computing nodes implies the need for proper virtual functions' allocations to improve user satisfaction and service fulfillment. In this sense, demand prediction is crucial in services management and exploitation. The main challenge here consists of the high variability of application requests that result in inaccurate forecasts. Federated learning has recently emerged as a solution to train mathematical learning models on the users' site. This paper investigates the application of federated learning to virtual functions demand prediction in IoE based edge cloud computing systems, to preserve the data security and maximise service provider revenue. Additionally, the paper proposes a virtual function placement based on the services demand prediction provided by the federated learning module. A matching based tasks allocation is proposed. Finally, numerical results validate the proposed approach, compared with a chaos theory prediction scheme.


2019 ◽  
Vol 8 (3) ◽  
pp. 39-43
Author(s):  
K. C. Shiva Shankar ◽  
G. T. Jagadeesha

In this competitive business environment, each and every service providers tries to differentiate themselves in offering their products and services according to the basic expectations of the target audiences. Wherein currently technological transformation and its adoption becomes a predominant and essential factor for the success of any service provider in the modern educational institution of the growing Indian service sector. Adoption of modern technologies in to their business offerings certainly increased their competitive advantage compared to other service providers on one hand and on the other hand it provides a unique way of delivery its regular services with a major differentiation with help of technology among their major stakeholders. Modern Growing Educational Institutions are now a days forced to make use of the technological advancements available to them in order increase their business potential and also adoption of such technologies like Cloud Computing (CC), Internet of Things (IoT), Business Automation with Enterprise Resource Planning (ERP), Artificial Intelligence (AI), Machine Learning (ML), etc., has certainly provided a wider range of opportunities in the field of education. However, it is the basic responsibility of each and every service provider to make use of such technology in to their business when and wherever it is required, it needs to be analyzed and utilized within shorter period of time would certainly help them to become a market leader, at the same time, service providers of various educational institutions would be found to be more aggressive in their day to day offering of their services to various stake holders and also business activities would be certainly enriched with the higher adoption of Technology as a core competence factor.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Aveek Basu ◽  
Sanchita Ghosh

Cloud computing can be considered as one of the leading-edge technological advances in the current IT industry. Cloud computing or simply cloud is attributed to the Service Oriented Architecture. Every organization is trying to utilize the benefit of cloud not only to reduce the cost overhead in infrastructure, network, hardware, software, etc., but also to provide seamless service to end users with the benefit of scalability. The concept of multitenancy assists cloud service providers to leverage the costs by providing services to multiple users/companies at the same time via shared resource. There are several cloud service providers currently in the market and they are rapidly changing and reorienting themselves as per market demand. In order to gain market share, the cloud service providers are trying to provide the latest technology to end users/customers with the reduction of costs. In such scenario, it becomes extremely difficult for cloud customers to select the best service provider as per their requirement. It is also becoming difficult to decide upon the deployment model to choose among the existing ones. The deployment models are suitable for different companies. There exist divergent criteria for different deployment models which are not tailor made for an organization. As a cloud customer, it is difficult to decide on the model and determine the appropriate service provider. The multicriteria decision making method is applied to find out the best suitable service provider among the top existing four companies and choose the deployment model as per requirement.


Author(s):  
Jaafar Naser Abdulridha ◽  
Ghani Ressan Gadder

The objective of the investigation is to analyze problems of organization and legal responsibility (civil and administrative) in the field of telecommunications in Iraq. The methodological basis of research consists of dialectical approaches, as well as special methods of studying legal, comparative-legal, structural-functional phenomena. Mobile phone use has spread widely among consumers. The mobile phone revolution has transformed lifestyles and livelihood resources with their envelopes to creating new business activities and changing the way people communicate. It is concluded that the use of a mobile phone has many effects, which can be social, physical, sanitary, environmental, or legal. For the latter, we note in Iraq that there is no legal regulation of communications that adheres to the provisions of consignment service providers in their relationship with subscribers. In this way, some communications authorities took on the task of creating the legal, political and administrative conditions by issuing policies that identify, in many cases, the conditions to which the mobile service provider includes in the service contract.


Sign in / Sign up

Export Citation Format

Share Document