An Enterprise Mashup Integration Service Framework for Clouds

2012 ◽  
Vol 2 (2) ◽  
pp. 31-40
Author(s):  
Siddesh G. M. ◽  
Srinivasa K. G.

With an advent of gaining popularity in cloud computing, there is a huge demand in ad-hoc services by the end users. These ad-hoc services cannot fully be provided by a service provider; hence Cloud mashup is a solution for this requirement. Cloud mashup is technology where end users can integrate different services of cloud service providers and create their own customized ad-hoc services. This paper proposes an efficient enterprise cloud mashup framework which supports dynamic composition of services to create a new service to the end users. The proposed framework is composed of an adapter, widgets, widget library and a mashup constructor module. Even a non technical end user can easily generate their own customized service on a cloud platform. Experiments reveal that the proposed framework is an efficient enterprise with cloud mashup service integration framework.

Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Abdulsalam Alammari ◽  
Salman Abdul Moiz ◽  
Atul Negi

AbstractThe reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is evaluated using Yet Another Fog Simulator in different scenarios (numbers of users, sensors, actuators, and areas). A comparison was made for Sensing and Actuating as a Service (SAaaS) with/without layered fog, and layered fog with/without (failure reassignment, pre-specified cases in fog nodes, and offloading). The comparison was conducted in terms of computing/communication latencies and the number of missed messages for both observations and actuation commands. Results show that failure reassignment prevented losing messages and maintained network connectivity. Also, wisely selecting the monitoring fog node per end user pre-specified cases and the offloading scheme decreased actuation latency.


Author(s):  
Vivek Gaur ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Recent computing world has seen rapid growth of the number of middle and large scale enterprises that deploy business processes sharing variety of services available over cloud environment. Due to the advantage of reduced cost and increased availability, the cloud technology has been gaining unbound popularity. However, because of existence of multiple cloud service providers on one hand and varying user requirements on the other hand, the task of appropriate service composition becomes challenging. The conception of this chapter is to consider the fact that different quality parameters related to various services might bear varied importance for different user. This chapter introduces a framework for QoS-based Cloud service selection to satisfy the end user needs. A hybrid algorithm based on genetic algorithm (GA) and Tabu Search methods has been developed, and its efficacy is analysed. Finally, this chapter includes the experimental analysis to present the performance of the algorithm.


Author(s):  
Ryota Egashira ◽  
Akihiro Enomoto ◽  
Tatsuya Suda

In Service-Oriented Computing, service providers publish their services by deploying service components which implement those services into a network. Since such services are distributed around the network, Service-Oriented Computing requires the functionality to discover the services that meet certain criteria specified by an end user. In order to overcome the scalability issue that the current centralized discovery mechanism inherently has, distributed discovery mechanisms that the P2P research community has developed may be promising alternatives. This chapter outlines existing distributed mechanisms and proposes a novel discovery mechanism that utilizes end users’ preferences. The proposed mechanism allows end users to return their feedback that describes the degree of the preference for discovered services. The returned preference information is stored at nodes and utilized to decide where to forward subsequent queries. The extensive simulation demonstrates that the proposed mechanism meets key requirements such as selectivity, efficiency and adaptability.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2020 ◽  
Vol 49 (1) ◽  
pp. 113-126
Author(s):  
Imran Mujaddid Rabbani ◽  
Muhammad Aslam ◽  
Ana Maria Martinez Enriquez ◽  
Zeeshan Qudeer

Cloud computing is one of the leading technology in IT and computer science domain. Business IT infrastructures are equipping themselves with modern regime of clouds. In the presence of several opportunities, selection criteria decision becomes vital when there is no supporting information available. Global clouds also need evaluation and assessment from its users that what they think about and how new ones could make their selection as per their needs. Recommended systems were built to propose best services using customer's feedback, applying quality of service parameters, assigning scores, trust worthiness and clustering in different forms and models. These techniques did not record and use interrelationships between the services that is true impact of service utilization. In the proposed approach, service association factor calculates value of interrelations among services used by the end user. An intelligent leaning based recommendation system is developed for assisting users to select services on their respective preferences. This technique is evaluated on leading service providers and results show that learning base system performs well on all types of cloud models.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Alakananda Chakraborty ◽  
Muskan Jindal ◽  
Mohammad R. Khosravi ◽  
Prabhishek Singh ◽  
Achyut Shankar ◽  
...  

With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT solutions have come into existence for exchanging large scale of data securely, backed up by their own unique cloud service providers (CSPs). It has, therefore, generated the need for customers to decide the IoT cloud platform to suit their vivid and volatile demands in terms of attributes like security and privacy of data, performance efficiency, cost optimization, and other individualistic properties as per unique user. In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user. This paper proposes a framework to represent the selection of IoT cloud platform as a MCDM problem, thereby providing a solution of optimal efficacy with a particular focus in user-specific priorities to create a unique solution for volatile user demands and agile market trends and needs using optimized distance-based approach (DBA) aided by Fuzzy Set Theory.


Sign in / Sign up

Export Citation Format

Share Document