• 제목/요약/키워드: Cloud Service Consumer

검색결과 28건 처리시간 0.02초

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment

  • Selvaraj, Kailash;Mukherjee, Saswati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1913-1934
    • /
    • 2022
  • The emergence of technologies like Big data analytics, Industrial Internet of Things, Internet of Things, and applicability of these technologies in various domains leads to increased demand in the underlying execution environment. The demand may be for compute, storage, and network resources. These demands cannot be effectively catered by the conventional cloud environment, which requires an integrated environment. The task of finding an appropriate service provider is tedious for a service consumer as the number of service providers drastically increases and the services provided are heterogeneous in the specification. A service broker is essential to find the service provider for varying service consumer requests. Also, the service broker should be smart enough to make the service providers best fit for consumer requests, ensuring that both service consumer and provider are mutually beneficial. A service broker in an integrated environment named Global Manager is proposed in the paper, which can find an appropriate service provider for every varying service consumer request. The proposed Global Manager is capable of identification of parameters for service negotiation with the service providers thereby making the providers the best fit to the maximum possible extent for every consumer request. The paper describes the architecture of the proposed Global Manager, workflow through the proposed algorithms followed by the pilot implementation with sample datasets retrieved from literature and synthetic data. The experimental results are presented with a few of the future work to be carried out to make the Manager more sustainable and serviceable.

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

Cloud Attack Detection with Intelligent Rules

  • Pradeepthi, K.V;Kannan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4204-4222
    • /
    • 2015
  • Cloud is the latest buzz word in the internet community among developers, consumers and security researchers. There have been many attacks on the cloud in the recent past where the services got interrupted and consumer privacy has been compromised. Denial of Service (DoS) attacks effect the service availability to the genuine user. Customers are paying to use the cloud, so enhancing the availability of services is a paramount task for the service provider. In the presence of DoS attacks, the availability is reduced drastically. Such attacks must be detected and prevented as early as possible and the power of computational approaches can be used to do so. In the literature, machine learning techniques have been used to detect the presence of attacks. In this paper, a novel approach is proposed, where intelligent rule based feature selection and classification are performed for DoS attack detection in the cloud. The performance of the proposed system has been evaluated on an experimental cloud set up with real time DoS tools. It was observed that the proposed system achieved an accuracy of 98.46% on the experimental data for 10,000 instances with 10 fold cross-validation. By using this methodology, the service providers will be able to provide a more secure cloud environment to the customers.

클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인 (Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective)

  • 박수경;조지연;이봉규
    • 한국IT서비스학회지
    • /
    • 제14권3호
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

안전한 콘텐츠 서비스를 위한 클라우드 기반 DRM 서비스 모델 (Cloud-Based DRM Service Model for Secure Contents Service)

  • 이혜주;서창호;신상욱
    • 디지털융복합연구
    • /
    • 제10권10호
    • /
    • pp.465-473
    • /
    • 2012
  • 모바일 기기와 클라우드 컴퓨팅 기술의 도입은 N 스크린 서비스와 같은 새로운 콘텐츠 서비스를 가능하게 하였다. 새로운 콘텐츠 서비스 환경을 위하여 상호운용성과 다중 플랫폼(multi-platform)을 지원하는 DRM(digital rights management) 기술들이 개발되고 있으나 아직까지 콘텐츠 서비스 가입 변경에 의한 콘텐츠의 이동이나 지원 단말의 구매 등 여러 면에서 사용자에게 불편함을 초래하고 있다. 본 논문에서는 가입 서비스와 상관없이 콘텐츠의 자유로운 이동을 지원하고 사용자가 소유한 다양한 스마트 기기에서 DRM이 적용된 콘텐츠를 자유롭게 사용할 수 있도록 클라우드 컴퓨팅 기반의 DRM 서비스 모델로써 DRMaaS(DRM-as-a-Service) 모델을 제안한다.

A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching approach

  • Rajavel, Rajkumar;Thangarathinam, Mala
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권6호
    • /
    • pp.2050-2077
    • /
    • 2015
  • One of the major issues in emerging cloud management system needs the efficient service level agreement negotiation framework, with an optimal negotiation strategy. Most researchers focus mainly on the atomic service negotiation model, with the assistance of the Agent Controller in the broker part to reduce the total negotiation time, and communication overhead to some extent. This research focuses mainly on composite service negotiation, to further minimize both the total negotiation time and communication overhead through the pre-request optimization of broker strategy. The main objective of this research work is to introduce an Automated Dynamic Service Level Agreement Negotiation Framework (ADSLANF), which consists of an Intelligent Third-party Broker for composite service negotiation between the consumer and the service provider. A broker consists of an Intelligent Third-party Broker Agent, Agent Controller and Additional Agent Controller for managing and controlling its negotiation strategy. The Intelligent third-party broker agent manages the composite service by assigning its atomic services to multiple Agent Controllers. Using the Additional Agent Controllers, the Agent Controllers manage the concurrent negotiation with multiple service providers. In this process, the total negotiation time value is reduced partially. Further, the negotiation strategy is optimized in two stages, viz., Classified Similarity Matching (CSM) approach, and the Truncated Negotiation Group Gale Shapely Stable Matching (TNGGSSM) approach, to minimize the communication overhead.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

클라우드 서비스 브로커를 위한 소프트웨어의 서비스 수준 합의 명세 모델과 중개 방법 (Service Level Agreement Specification Model of Software and Its Mediation Mechanism for Cloud Service Broker)

  • 남태우;염근혁
    • 정보과학회 논문지
    • /
    • 제42권5호
    • /
    • pp.591-600
    • /
    • 2015
  • SLA(Service Level Agreement)는 클라우드 컴퓨팅 서비스를 제공하는 사업자가 이용자에게 신뢰성 있고 일관된 품질을 제공하기 위해서 반드시 보장해야 하는 요소이며 특히 클라우드 서비스 브로커리지를 이용해서 서비스를 중개하는 환경에서는 SLA를 통한 서비스 사업자와 고객 간의 계약이 중요하다. 클라우드 컴퓨팅은 다양한 클라우드 서비스의 IT 자원에 따라 IaaS, PaaS, SaaS 등으로 구분되는데 기존의 SLA는 물리적인 네트워크 환경에 대한 요소만 고려하거나 명세에 대한 방법론적인 접근이 없어서 SaaS를 기반으로 제공되는 소프트웨어 서비스의 품질 요소를 반영하기 어렵다. 본 연구를 통해 SaaS 환경에 적합한 SLA 제공을 위해 소프트웨어적인 품질 특성을 명세할 수 있는 방법을 제시하고 SLA 명세를 서비스 제공자와 소비자 간에 교환할 수 있는 메커니즘과 구조를 제안하였다. SaaS 레벨에서의 SLA 명세를 위한 메타모델을 정의하였고 SaaS의 품질 요구사항은 제안한 명세 언어로 기술될 수 있으며, 사례연구를 통해 다양한 소프트웨어적인 품질 요소가 제안한 명세 언어로 표현됨을 검증하였다. SLA 명세는 이를 교환하기 위한 UDDI 기반의 중개 프로세스 및 아키텍처를 이용하여 품질 명세 저장소에 저장되며 교환 아키텍처를 기반으로 서비스 바인딩 시 교환된다.