Requirements Engineering for Cloud Application Development

Author(s):  
Holger Schrödl ◽  
Stefan Wind

In industrial practice, cloud computing is becoming increasingly established as an option for formulating cost-efficient and needs-oriented information systems. Despite the increasing acceptance of cloud computing within the industry, many fundamental questions remain unanswered, or are answered only partially. Besides issues relating to the best architectures, legal issues, and pricing models, suppliers of cloud-based solutions are faced with the issue of appropriate requirements engineering. This means eliciting optimal understanding of the customer’s requirements and implementing this into appropriate requirements of the solution to be realised. This chapter examines selected, established requirements engineering methods in order to study the extent to which they can be applied to the specific requirements of cloud-based solutions. Furthermore, it develops a comparison framework containing the features of cloud computing. This comparison framework is applied to four established process models for requirements engineering. Recommendations for a requirements engineering process adapted to cloud computing are derived.

Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Author(s):  
Nitasha Hasteer ◽  
Abhay Bansal ◽  
B. K. Murthy

Cloud computing provides organizations the dynamic capability to deploy applications quickly on self-provision development platforms. In adopting a cloud-computing paradigm, the software development process leverages the use of cloud native features. This article highlights a cloud-based health insurance solution that enables consumers to purchase packages online with the objective of identifying attributes in the context of the development process while analyzing the association among the attributes. Exploratory factor analysis is used to identify the latent attributes. Their associations, in terms of causal relationship analysis, are investigated via DEMATEL. Results of factor analysis imply that agility, availability and adaptability are the underlying factors for cloud application development. The findings of the DEMATEL reveal that co-creative and collaborative development process, which embrace quick discovery and assembly of services in the cloud, are significant attributes that influence other attributes within the context of the cloud-based software development process.


Author(s):  
Rao Ravinder ◽  
V. Sucharita

<span>The advancements in cloud computing and leveraging the benefits from cloud computing to the service providers have increased the deployment of traditional applications to the cloud. The applications once deployed on the cloud, due to various reasons, need migration from development infrastructure to operational infrastructure, one operational instance to other operational instances due to load balancing and the cycle continues due to the use of DevOps as development strategies for cloud computing applications. Advocates of hybrid and public clouds observe cloud computing makes it possible for organizations to avert or minimize upfront IT infrastructure expenses.  Proponents also assert that cloud computing systems permit businesses to receive their software up and running faster, using improved manageability and less maintenance, so it empowers IT teams to rapidly adapt tools to meet the varying and unpredictable requirements. DevOps is a lot of practices that mechanizes the procedures between programming improvement and IT groups, all together that they can fabricate, test, and discharge programming quicker and even more dependably. The idea of DevOps is established on building a culture of a joint effort between groups that generally worked in relative siloes. The guaranteed advantages incorporate expanded trust, quicker programming discharges, capacity to explain basic issues rapidly and better oversee impromptu work. Thus, this work identifies the need for providing multiple security protocols during the complete life cycle of cloud application development and deployment. This work proposes a novel framework for automatic selection and deployment of the security protocols during cloud service deployments. The framework identifies the need for security aspects and selects the appropriate security algorithms for virtual machines. The proposed framework demonstrates nearly 80% improvement over the security policy deployment time. </span>


2018 ◽  
Vol 9 (1) ◽  
pp. 1-8
Author(s):  
Argo Wibowo

Pada saat ini banyak sekali informasi yang bisa kita dapatkan di internet, termasuk informasi seputar kehamilan. Namun dengan banyaknya informasi tersebut, tidak semua informasi bisa dipertanggungjawabkan kebenarannya. Perlu adanya pihak lain yang melakukan validasi. Kehamilan merupakan momen istimewa bagi seorang ibu, untuk itu diperlukan informasi yang tepat untuk kehamilan sang ibu. Melihat masalah tersebut, muncullah gagasan ide untuk merancang suatu aplikasi yang dapat menghubungkan antara ibu yang sedang mengandung, dengan pihak dokter  yang spesialis di bidang kandungan. Tidak hanya dokter, para ibu juga bisa saling berbagi kisah kehamilannya dengan para ibu hamil lainnya. Aplikasi ini dirancang untuk menghubungkan para ibu dan dokter sehingga dapat memperoleh informasi yang lebih terpercaya secara langsung. Perancangan aplikasi berbasis cloud, dengan antarmuka yang sederhana sehingga memudahkan ibu dalam menggunakan aplikasi ini. Kata Kunci—Informasi, Kehamilan, Aplikasi


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1553
Author(s):  
Marian Rusek ◽  
Grzegorz Dwornicki

Introduction of virtualization containers and container orchestrators fundamentally changed the landscape of cloud application development. Containers provide an ideal way for practical implementation of microservice-based architecture, which allows for repeatable, generic patterns that make the development of reliable, distributed applications more approachable and efficient. Orchestrators allow for shifting the accidental complexity from inside of an application into the automated cloud infrastructure. Existing container orchestrators are centralized systems that schedule containers to the cloud servers only at their startup. In this paper, we propose a swarm-like distributed cloud management system that uses live migration of containers to dynamically reassign application components to the different servers. It is based on the idea of “pheromone” robots. An additional mobile agent process is placed inside each application container to control the migration process. The number of parallel container migrations needed to reach an optimal state of the cloud is obtained using models, experiments, and simulations. We show that in the most common scenarios the proposed swarm-like algorithm performs better than existing systems, and due to its architecture it is also more scalable and resilient to container death. It also adapts to the influx of containers and addition of new servers to the cloud automatically.


2015 ◽  
Author(s):  
Philip A. McGillivary ◽  
Michele Stecca ◽  
Massimo Maresca ◽  
Pierpaolo Baglietto

Author(s):  
Lothar Fritsch

This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data protection experts. Designers of locationbased services (LBS) create infrastructures for business or application specific purposes. They have profitoriented views on the rationale for PET deployment. Finally, users have requirements that might be neither on the PET community’s nor on the business people's agenda. Many disciplines provide knowledge about the construction of community-spanning information systems. The challenge for designers of infrastructures and applications is to find a consensus that models all stakeholders’ interests – and takes advantage all involved community’s knowledge. This paper groups LBS stakeholders into a framework based onto a sociological knowledge construct called “boundary object”. For this purpose, a taxonomical analysis of publications in the stakeholder communities is performed. Then the paper proposes a socio-technical approach. Its goal is to find a suitable privacy design for a LBS infrastructure based on the boundary object. Topics for further interdisciplinary research efforts are identified and proposed for discussion.


Sign in / Sign up

Export Citation Format

Share Document