service consumer
Recently Published Documents


TOTAL DOCUMENTS

88
(FIVE YEARS 19)

H-INDEX

9
(FIVE YEARS 0)

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Virtual Machine Image (VMI) is the building block of cloud infrastructure. It encapsulates the various applications and data deployed at the Cloud Service Provider (CSP) end. With the leading advances of cloud computing, comes the added concern of its security. Securing the Cloud infrastructure as a whole is based on the security of the underlying Virtual Machine Images (VMI). In this paper an attempt has been made to highlight the various risks faced by the CSP and Cloud Service Consumer (CSC) in the context of VMI related operations. Later, in this article a formal model of the cloud infrastructure has been proposed. Finally, the Ethereum blockchain has been incorporated to secure, track and manage all the vital operations of the VMIs. The immutable and decentralized nature of blockchain not only makes the proposed scheme more reliable but guarantees auditability of the system by maintaining the entire VMI history in the blockchain.


2021 ◽  
Vol 13 (4) ◽  
pp. 65-74
Author(s):  
Ramesh C. ◽  
Santhiya K. ◽  
Rakesh Kumar S. ◽  
Rizwan Patan

Cloud computing is a booming technology in the area of digital markets. Tackling the nonfunctional characteristics is a big challenge between service consumers (SC) and service providers (SP). Without proper negotiation between the participants specifying their quality of service (QoS) requirements, service level agreement (SLA) cannot be achieved. Two strategies that are commonly prevalent in the negotiation process are concession model and trade off model. The concession model assures the service consumer (SC) receiving the services on time without any deferment. But service consumer has only limited utility. To balance the utility and achievement rates, the authors propose a mixed negotiation approach for cloud service negotiation, which is based on “Game of Chicken.” Extensive results show that a mixed negotiation approach brings equal amount of satisfaction to both service consumer and service provider in terms of achieving higher utility and outperforms the concession approach, while taking fewer time delays than that of a tradeoff approach.


2021 ◽  
Vol 190 (5-6(2)) ◽  
pp. 136-148
Author(s):  
Vitalii Kelman ◽  
◽  
Attila Ponevac ◽  
Oksana Korolovych ◽  
◽  
...  

The authors highlight the high priority of rationalization in the management of the totality of transactions carried out in the sphere of network retail, in close contact with the service consumer. For network retail objects with a shift trading function, it is important to implement a direct and permanent impact, both on the system structure and on the basic processes in the area of mass trade services. This impact focuses on studying the flow of requests, service inputs and outputs of the system, as well as the length of waiting times, and the length of queues. The success of development in such retail networks depends on the flexibility of the operations performed by the contractor in close contact with the service consumer. It is envisaged to consider peculiarities in the rationalization of network retail management with trade turnover (flexibility) functions. The latter define the structure of the service delivery system for service consumers with processes running, in which client demands for services, as defined in the income chain, even though the intensity of the customer service flow is not constant. The purpose of the research is to present the informative field for rationalization in network retail management with the function of shifting trade, based on the mathematical description and repeated «playing» of all processes within the area of mass service. To represent the informative area for rationalization in network retail management with a shift trading function based on a mathematical description and repeated play of all processes within the public service area, Methods of probability theory and mathematical statistics have been used, as well as cloud computing in AnyLogic Claud environment, AnyLogic service. The results of the study was the presentation of new possibilities for rationalizing network retail management by groups of network objects based on the concept of a mass service area, and in view of the fact that there is an n-channel system of mass service with an unlimited queue, where the request flow has the intensity λ, and the service flow is the intensity μ. The study was implemented with the example of one of the hubs Walmart-Salvador, uniting 90 supermarkets of the company. All Walmart hubs combine only the same supermarket type, supporting the trade changeover function within a single graph (half-yearly). Similar Walmart hubs are developed in Mexico, Great Britain, Brazil, China, Canada, South Africa, Chile, Japan, Costa Rica, Guatemala, Argentina, Honduras, Nicaragua, El Salvador, and Ukraine. At the same time, all network nodes contain objects that apply multi-channel service systems, most common in the network retail with an unlimited queue and an option to add a new service node. It is the Walmart-Salvador hub that has a fairly high percentage of customers’ refusals due to the busy service devices (this estimate ranging from 19% to 25%). As a result, Walmart’s lost annual profit reaches up to USD 25.5 million approximately. The rationalization in the management of the network retail for the Walmart-Salvador hub objects is implemented with a breakdown into 8 groups, united according to common input parameters, the latter providing a solution for the optimal number of service devices, and their required reserve and runoff are calculated, as well as efficient productivity resulting from the consistency of the input and output flows in the service channel and the stability in the mass service system. At the same time, programming for solving the problem of the management rationalization is realized using rate fixing for the basic processes in the area of mass service. In this way, mass service system sustainability is ensured, with the average timing for the application staying in the mass service system being crucial. In particular, implementing such a standard could allow avoiding losses caused by waiting for servicing and unproductive ones. Among other relevant factors are: associated timing, probability or other values (necessary for transformation operations in the characteristics of the mass service area, performed for generating target values of this indicator). Perspectives of implementing the mathematical description of the processes in a mass-service area are in the fact that it will provide for significantly simplification in the processes of rationalizing the retail management in shift-trading facilities, regardless of the frequency of quantity and quality product range changes.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues continue to exist, like cyberattacks, slow last mile latency, and clouds lack client-centric and location-aware applications to process real time data for efficient and customized application delivery. As an alternative, Fog Computing has the potential to resolve these issues by extending the Cloud service provider's reach to the edge of the Cloud network model, right up to the Cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience and keeps the data close to the user. This research article presents a review on the academic literature research work on Fog Computing, introduces a novel taxonomy to classify cloud products based on Fog computing elements and then determine the best fit Fog Computing product to choose for the Cloud service consumer.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.


2020 ◽  
Vol 39 (6) ◽  
pp. 8345-8356
Author(s):  
M. Alamelu ◽  
T.S. Pradeep Kumar ◽  
V. Vijayakumar

Service Level Agreement (SLA) is an agreement between the service provider and consumer to provide the verifiable quality of services. Using the valuable metrics in SLA, a service consumer could easily evaluate the service provider. Though there are different types of SLA models are available between the consumer and provider, the proposed approach describes the Fuzzy rule base SLA agreement generation among multiple service providers. A negotiation system is designed in this work to collect the different sets of provider services. With their desired quality metrics, a common Fuzzy based SLA report is generated and compared against the existing consumer requirements. From the analysis of the common agreement report, consumers can easily evaluate the best service with the desired Impact service, cost and Quality. The main advantage of this approach is that it reduces the time consumption of a consumer. Moreover, the best service provider can be selected among multiple providers with the desired QoS parameters. At the same time, the bilateral negotiation is enhanced with the approach of multilateral negotiation to improve the searching time of consumers.


2020 ◽  
Vol 32 (3) ◽  
pp. 23-36
Author(s):  
Kanniga Devi R. ◽  
Murugaboopathi Gurusamy ◽  
Vijayakumar P.

A Cloud data center is a network of virtualized resources, namely virtualized servers. They provision on-demand services to the source of requests ranging from virtual machines to virtualized storage and virtualized networks. The cloud data center service requests can come from different sources across the world. It is desirable for enhancing Quality of Service (QoS), which is otherwise known as a service level agreement (SLA), an agreement between cloud service requester and cloud service consumer on QoS, to allocate the cloud data center closest to the source of requests. This article models a Cloud data center network as a graph and proposes an algorithm, modified Breadth First Search where the source of requests assigned to the Cloud data centers based on a cost threshold, which limits the distance between them. Limiting the distance between Cloud data centers and the source of requests leads to faster service provisioning. The proposed algorithm is tested for various graph instances and is compared with modified Voronoi and modified graph-based K-Means algorithms that they assign source of requests to the cloud data centers without limiting the distance between them. The proposed algorithm outperforms two other algorithms in terms of average time taken to allocate the cloud data center to the source of requests, average cost and load distribution.


2020 ◽  
Vol 16 (2) ◽  
pp. 53-61
Author(s):  
A. O. Inshakova ◽  
E. A. Serbina

Introduction. The article describes the existing and potential models of legal regulations between economic agents in Industry 4.0 environment. Conversion of the key production principles and transition to intangible benefits in digital reality сalls for the theoretical rethinking of legal categories.Materials and methods. The study assumed a positivistic materialism approach and abstract to concrete evolution.  The study applied general and  specific scientific methods to understand legal phenomena of relations in neo-industrial era: a dialectic method, analysis and synthesis, classification, legal dogmas, comparative, structural and functional methods.Results. The study found that there are multiple models of legal support to industrial economic agents from special legislation up to the adoption of by-laws, and blending of several approaches. The study confirmed that a particular model is always bases on a chain of relations “producer” “product, work, service” “consumer”. It is recommended to conduct legal studies to regulate activities of economic agents in Industry 4:0 environment grouping them into “developers” and “users”. This grouping should underline specific recommendations, proposals and suggestions to improve various legal mechanisms covering different goals of economic agents, risks, rights, interests and obligations stemming from contracts.Discussion and conclusion. The study justifies and proves that the efficiency the legislator’s use of a certain of legal regulations depends on the category of subjects of Industry 4.0; Manufacturers; Consumers; Users; Intellectual property; Claw mechanisms  to protect rights and legitimate interests. Recipients “developers” and “users”; it also justifies the use of these categories in acts regulating the creation, recording, circulation and deletion of digital cryptographic records in business practice.


In network there are different kinds of attack that impact its presentation and it might hazard security amid the transmission. The security is the serious issue in network that may hurt by these attacks. In this paper the investigation of DDOS attack in network must be handled. However, with the fast development of network technology issues related with security are offering great challenges. Security concerns like security threat and attack are disaster for both service provider and service consumer. In this paper the different procedure that are uses to recognize DDOS attack in network are considered. In this various machine learning based strategies are analyzed to detect DDOS attack in network.


Author(s):  
Olga Aleksandrovna Egorova

This publication discusses the question on “necessary” evidence assessable by the court in consideration of requirements of the consumer of financial services to insurance company regarding the seeking reimbursement of property damages resulting from an automobile accident. The author examines the question on recognition as “necessary” evidence a decision of a financial officer made after examination of the claim of a financial service consumer on violation of insurance policy obligations by the insurer, as well as materials obtained by the financial officer in examination of such claim. The theoretical research is based on application of the following scientific methods: systemic-structural analysis, synthesis, and comparative-legal analysis. The research substantiates the position that recognition as “necessary” evidence of materials collected by the financial officer in examination of a claim of a consumer of financial services on violation of obligation by a financial organization would contribute to a proper examination of an insurance dispute, as well as meet the goals of the procedural efficiency of the judicial process, since the requirement of these materials from the financial officer by the court will exclude the need for repeated submission of these materials during a hearing.


Sign in / Sign up

Export Citation Format

Share Document