SLA-Aware Enterprise Service Computing

Author(s):  
Longji Tang ◽  
Jing Dong ◽  
Yajing Zhao

There is a growing trend towards enterprise system integration across organizational and enterprise boundaries on the global Internet platform. The Enterprise Service Computing (ESC) has been adopted by more and more corporations to meet the growing demand from businesses and the global economy. However the ESC as a new distributed computing paradigm poses many challenges and issues of quality of services. For example, how is ESC compliant with the quality of service (QoS)? How do service providers guarantee services which meet service consumers’ needs as well as wants? How do both service consumers and service providers agree with QoS at runtime? In this chapter, SLA-Aware enterprise service computing is first introduced as a solution to the challenges and issues of ESC. Then, SLA-Aware ESC is defined as new architectural styles which include SLA-Aware Enterprise Service-Oriented Architecture (ESOA-SLA) and SLA-Aware Enterprise Cloud Service Architecture (ECSA-SLA). In addition, the enterprise architectural styles are specified through our extended ESOA and ECSA models. The ECSA-SLA styles include SLA-Aware cloud services, SLA-Aware cloud service consumers, SLA-Aware cloud SOA infrastructure, SLA-Aware cloud SOA management, SLA-Aware cloud SOA process and SLA-Aware SOA quality attributes. The main advantages of viewing and defining SLA-Aware ESC as an architectural style are (1) abstracting the common structure, constraints and behaviors of a family of ESC systems, such as ECSA-SLA style systems and (2) defining general design principles for the family of enterprise architectures. The design principles of ECSA-SLA systems are proposed based on the model of ECSA-SLA. Finally, we discuss the challenges of SLA-Aware ESC and suggest that the autonomic service computing, automated service computing, adaptive service computing, real-time SOA, and event-driven architecture can help to address the challenges.

Author(s):  
Longji Tang ◽  
Wei-Tek Tsai ◽  
Jing Dong

Today, enterprise systems are integrated across wired and wireless networks. Enterprise Mobile Service Computing (EMSC) is a recent development style in distributed computing, and Enterprise Mobile Service Architecture (EMSA) is a new enterprise architectural style for mobile system integration. This chapter introduces the concepts of EMSC, discusses the opportunities, and addresses mobile constraints and challenges in EMSC. The mobile constraints include aspects relating to mobile hardware, software, networking, and mobility. Many issues such as availability, performance, and security are encountered due to these constraints. To address these challenges in EMSC, the chapter proposes seven architectural views: Enterprise Mobile Service, Enterprise Mobile Service Consumer, Enterprise Mobile Service Data, Enterprise Mobile Service Process, Enterprise Mobile Service Infrastructure, Enterprise Mobile Service Management, and Enterprise Mobile Service Quality. Each is described with principles, design constraints, and emerging technologies. In order to illustrate a practical implementation of EMSA, the chapter presents a major shipping and delivery services enterprise as a case study to describe the integration of Service-driven mobile systems in the enterprise.


This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points. Remote attestation provides a facility to attestation the required platforms using platform configuration registers (PCR), and sealed storage is used to encrypt the consumer sensitive data using cryptographic operations. Integrity measurements are used to measure the given computing components in respective register. Here, the authors concentrated on a trusted computing paradigm to enable cloud service providers to solve the potential insider attacks at cloud premises.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2020 ◽  
Vol 49 (1) ◽  
pp. 113-126
Author(s):  
Imran Mujaddid Rabbani ◽  
Muhammad Aslam ◽  
Ana Maria Martinez Enriquez ◽  
Zeeshan Qudeer

Cloud computing is one of the leading technology in IT and computer science domain. Business IT infrastructures are equipping themselves with modern regime of clouds. In the presence of several opportunities, selection criteria decision becomes vital when there is no supporting information available. Global clouds also need evaluation and assessment from its users that what they think about and how new ones could make their selection as per their needs. Recommended systems were built to propose best services using customer's feedback, applying quality of service parameters, assigning scores, trust worthiness and clustering in different forms and models. These techniques did not record and use interrelationships between the services that is true impact of service utilization. In the proposed approach, service association factor calculates value of interrelations among services used by the end user. An intelligent leaning based recommendation system is developed for assisting users to select services on their respective preferences. This technique is evaluated on leading service providers and results show that learning base system performs well on all types of cloud models.


Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don’t support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of information in cloud forensic investigations. Generally, Cloud service providers have access to activity logs of cloud user and CSP can tamper the logs so that investigator cannot reach to the real culprit. In such an environment, log security is one of challenge in the cloud. Logging technique is used to monitor employee’s behavior, to keep track of malicious activities and prevent cloud networks from intrusion by well-known organizations. Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment. In the proposed framework secure logging environment is provided by storing and processing activity logs and encrypting using advanced encryption method. It detects DDoS (distributed denial of service) attack on cloud infrastructure by using the published logs on cloud and thus helpful in cloud forensics. It is detected by the investigator using available application activity logs in the cloud server. Searchable encryption algorithm will be used to increase the security of the logging mechanism and to maintain confidentiality and privacy of user data. Proof of past (PPL) logs is created by storing logs at more than one place. This PPL helps in the verification process of changed logs by CSP the actual implementation of this application on AWS Infrastructure as a service ( IAAS ) cloud shows real-time use of this structure


Author(s):  
Majid Azadi ◽  
Mohammad Izadikhah ◽  
Fahimeh Ramezani ◽  
Farookh Khadeer Hussain

Abstract The rapid development of cloud computing and the sharp increase in the number of cloud service providers (CSPs) have resulted in many challenges in the suitability and selection of the best CSPs according to quality of service requirements. The main objective of this study is to propose three novel models based on the enhanced Russell model to increase the discrimination power in the evaluation and selection of CSPs. The proposed models are designed based on the distances to two special decision-making units (DMUs), namely the ideal DMU and the anti-ideal DMU. There are two advantages to the proposed ranking methods. First, they consider both pessimistic and optimistic scenarios of data envelopment analysis, so they are more equitable than methods that are based on only one of these scenarios. The second strength of this approach is its discrimination power, enabling it to provide a complete ranking for all CSPs. The proposed method can help customers to choose the most appropriate CSP while at the same time, it helps software developers to identify inefficient CSPs in order to improve their performance in the marketplace.


Author(s):  
N. Krishnadas ◽  
R. Radhakrishna Pillai

Cloud Computing is emerging as a promising cost efficient computing paradigm which professionals believe is an absolutely new trend and will represent next level of internet evolution. Though the presence of Cloud computing is ubiquitous, it still lacks consensus on a proper definition and classification of the major Clouds in effect today. It also suffers from major criticism of being a hype/fad and some researchers claim that it is just an extension of already established computing paradigms. This chapter attempts to deal with such criticisms by comprehensively analyzing the Cloud definitions and diagnose the components of the same. It performs a comprehensive study of more than 30 definitions given by Cloud computing professionals and published in research papers. These definitions are then analyzed under more than fifteen components, each of which is discussed in the chapter. This study is backed by empirical work, to understand Cloud computing from different angles and come up with a comprehensive definition. It also analyses the present Cloud service providers and the level of services they provide to bring about a clear picture of Cloud computing. Based on the comparison, the pending issues in Cloud computing are discussed.


2014 ◽  
Vol 631-632 ◽  
pp. 204-209
Author(s):  
Meng Xu ◽  
Qing Zhong Li ◽  
Li Zhen Cui

With the development of Internet technology, cloud computing has been widely applied to various industries as a new service delivery model in recent years. The cloud service providers must provide services for many customs at the same time. So a large number of different applications must be deployed and the application deployment problem becomes more and more important. How to deploy the application according to their different performance requirements has an important effect on improving the quality of service, enhancing user experience and reducing the service cost. However, for service providers, improving service quality and reducing service cost are contradictory. In this paper, the application deployment problem is modeled as the application deployment graph. Then by using the Pareto optimal thought, a multi-objective optimization algorithm is proposed. It makes that the service providers use less cost to provide the better service quality for users.


2019 ◽  
Vol 31 (3) ◽  
pp. 17-36
Author(s):  
Tung-Hsiang Chou

The purpose of this article is to develop a research model examining the effects on relationship quality of a cloud service and to investigate the continuance intention of SaaS CRM (Software as a Service Customer Relationship Management) based on SaaS cloud service quality of service (SaaS-Qual) model. As basis theories, the study adopted service quality of SaaS and a post-acceptance model of IS continuance. The study also adds a relationship of quality as a moderate variance to validate the feasibility of cloud service. An online survey and a paper-questionnaire were used to collect data, and most respondents were experienced with using SaaS service for CRM for at least one year. The research causal model was validated by using SEM, and all eight study hypotheses were supported. These results indicate that relationship quality played an important role in influencing users' satisfaction and trust of SaaS's CRM service. High SaaS service quality could also increase users' intention to use cloud service continuously. SaaS CRM service providers should focus on enhancing relationship quality through motivational cloud service needs and SaaS CRM service features to increase user satisfaction and enhance levels of trust to promote continued use of SaaS service on the internet. This study contributes to a theoretical understanding of how relationship quality and cloud service can affect continuance intention.


2015 ◽  
Vol 64 (8/9) ◽  
pp. 567-582 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The paper aims to examine the characteristic elements of various organizational factors to identify whether a favourable climate for implementing and sustaining cloud computing in Banaras Hindu University library system (BHULS) existed. Design/methodology/approach – After reviewing relevant literature on the topic, a list of 20 factors that affected an organization’s adoption to innovation was prepared. A questionnaire was personally administered to the library professionals engaged in BHULS. Respondents were asked to nominate the level of importance of each factor for validation of cloud computing adoption. Findings – Findings of the paper validate the fact that opportune time for the implementation of cloud computing existed in BHULS. Library staff showed high willingness toward the adoption of the cloud computing and were well prepared to grasp the challenges. Practical implications – The paper establishes the fact that the benefits of cloud computing are inadequate to convince organizations to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – Because no empirical study on the cloud computing in conjunction with academic libraries of India has been carried out before, this paper closes this gap and provides guidelines to migrate to cloud environment. Also, it provides the perceptions of library professionals in response to its adoption.


Sign in / Sign up

Export Citation Format

Share Document