Karolina Vukojevic-Haupt, Florian Haupt, D. Karastoyanova, F. Leymann
The ability to repeat an experiment, known as replicability, is a basic concept of scientific research and also an important aspect in the field of eScience. The principles of Service Oriented Computing (SOC) and Cloud Computing, both based on high runtime dynamicity, are more and more adopted in the eScience domain. Simulation experiments exploiting these principles introduce significant challenges with respect to replicability. Current research activities mainly focus on how to exploit SOC and Cloud for eScience, while the aspect of replicability for such experiments is still an open issue. In this paper we define a general method to identify points of dynamicity in simulation experiments and to handle them in order to enable replicability. We systematically examine different types of service binding strategies, the main source of dynamicity, and derive a method and corresponding architecture to handle this dynamicity with respect to replicability. Our work enables scientists to perform simulation experiments that exploit the dynamicity and flexibility of SOC and Cloud Computing but still are repeatable.
重复实验的能力,即可复制性,是科学研究的一个基本概念,也是eScience领域的一个重要方面。基于高运行时动态性的面向服务计算(SOC)和云计算原理在eScience领域得到越来越多的应用。利用这些原理的模拟实验在可复制性方面引入了重大挑战。目前的研究活动主要集中在如何利用SOC和Cloud for eScience,而这些实验的可复制性方面仍然是一个开放的问题。在本文中,我们定义了一种识别仿真实验中动态点的通用方法,并对其进行处理,以实现可复制性。我们系统地研究了不同类型的服务绑定策略(动态的主要来源),并推导了一种方法和相应的体系结构来处理与可复制性相关的动态。我们的工作使科学家能够进行模拟实验,利用SOC和云计算的动态性和灵活性,但仍然是可重复的。
{"title":"Replicability of Dynamically Provisioned Scientific Experiments","authors":"Karolina Vukojevic-Haupt, Florian Haupt, D. Karastoyanova, F. Leymann","doi":"10.1109/SOCA.2014.54","DOIUrl":"https://doi.org/10.1109/SOCA.2014.54","url":null,"abstract":"The ability to repeat an experiment, known as replicability, is a basic concept of scientific research and also an important aspect in the field of eScience. The principles of Service Oriented Computing (SOC) and Cloud Computing, both based on high runtime dynamicity, are more and more adopted in the eScience domain. Simulation experiments exploiting these principles introduce significant challenges with respect to replicability. Current research activities mainly focus on how to exploit SOC and Cloud for eScience, while the aspect of replicability for such experiments is still an open issue. In this paper we define a general method to identify points of dynamicity in simulation experiments and to handle them in order to enable replicability. We systematically examine different types of service binding strategies, the main source of dynamicity, and derive a method and corresponding architecture to handle this dynamicity with respect to replicability. Our work enables scientists to perform simulation experiments that exploit the dynamicity and flexibility of SOC and Cloud Computing but still are repeatable.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile computing provides benefits of mobility, convenience and convergence. However, they have limited resources for computation, memory, networking, and battery. An effective approach to remedying the constraints is to offload resource-intensive components of a mobile app to a resource-abundant server and run it, called offloading and more generally Mobile Cloud Computing. There are a number of different approaches to offloading, and they result in different gains on benefit. In this paper, we propose a comprehensive taxonomy of offloading schemes and an assessment on the schemes. We first propose five criteria for classifying offloading schemes and define a taxonomy using the criteria. And, we choose a subset of practically configurable offloading schemes out of 32 schemes in the table. Then, we characterize the resulting offloading schemes by using key quality gains with offloading, Time Efficiency, Resource Consumption, and Adaptability to Load Evolution. Using the proposed taxonomy and guidelines, we present a case study of designing an off loadable mobile app and assess the applicability of the proposed taxonomy and guidelines.
{"title":"A Taxonomy of Offloading in Mobile Cloud Computing","authors":"H. La, Soo Dong Kim","doi":"10.1109/SOCA.2014.22","DOIUrl":"https://doi.org/10.1109/SOCA.2014.22","url":null,"abstract":"Mobile computing provides benefits of mobility, convenience and convergence. However, they have limited resources for computation, memory, networking, and battery. An effective approach to remedying the constraints is to offload resource-intensive components of a mobile app to a resource-abundant server and run it, called offloading and more generally Mobile Cloud Computing. There are a number of different approaches to offloading, and they result in different gains on benefit. In this paper, we propose a comprehensive taxonomy of offloading schemes and an assessment on the schemes. We first propose five criteria for classifying offloading schemes and define a taxonomy using the criteria. And, we choose a subset of practically configurable offloading schemes out of 32 schemes in the table. Then, we characterize the resulting offloading schemes by using key quality gains with offloading, Time Efficiency, Resource Consumption, and Adaptability to Load Evolution. Using the proposed taxonomy and guidelines, we present a case study of designing an off loadable mobile app and assess the applicability of the proposed taxonomy and guidelines.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The security of the authentication scheme plays a more and more important role in today's web service systems as people's daily are increasingly depending on these services and user credentials are collected and stored online. An insecure authentication system will become a great threat for users' privacy. Beside security, usability is also very important for the design of an authentication system. Traditional password-based authentication solutions are often susceptible to various attacks due to the weak passwords chosen by incautious users. This paper illustrates a secure yet simple implementation, which uses digital signature algorithm to authenticate user identities. The proposed design brings usability and convenience to the authentication scheme by taking advantage of the increasingly widespread mobile devices. Full comparisons with existing systems in terms of their security, usability and deploy ability will also be presented in this paper.
{"title":"A User-Friendly Authentication Solution Using NFC Card Emulation on Android","authors":"Haw Lee, Wei-Chih Hong, Chia-Hung Kao, Chen-Mou Cheng","doi":"10.1109/SOCA.2014.16","DOIUrl":"https://doi.org/10.1109/SOCA.2014.16","url":null,"abstract":"The security of the authentication scheme plays a more and more important role in today's web service systems as people's daily are increasingly depending on these services and user credentials are collected and stored online. An insecure authentication system will become a great threat for users' privacy. Beside security, usability is also very important for the design of an authentication system. Traditional password-based authentication solutions are often susceptible to various attacks due to the weak passwords chosen by incautious users. This paper illustrates a secure yet simple implementation, which uses digital signature algorithm to authenticate user identities. The proposed design brings usability and convenience to the authentication scheme by taking advantage of the increasingly widespread mobile devices. Full comparisons with existing systems in terms of their security, usability and deploy ability will also be presented in this paper.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114110085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. A. Galache, Takuro Yonezawa, L. Gürgen, Daniele Pavia, Marco Grella, H. Maeomichi
The Smart City concept relates to improve efficiency of city services and facilitate a more sustainable development of cities, as well as standing as the key concept for the future technological developments in Future Internet, IoT and, for the great quantity of information stored, big data and cloud computing. In this sense, this paper presents the ClouT project, a joint European-Japanese project, whose main aim is making citizens aware of city resources and helping them to use and care these resources by mean of smart IoT services in the Cloud. This objective is addressed through the definition of a three layer architecture composed of: CIaaS, CPaaS and CSaaS layers. On top of this architecture, different use cases associated to different application domains will be developed, mainly within the four cities that take part of the consortium: Mitaka and Fujisawa in Japan, and Santander and Genova in Europe.
{"title":"ClouT: Leveraging Cloud Computing Techniques for Improving Management of Massive IoT Data","authors":"J. A. Galache, Takuro Yonezawa, L. Gürgen, Daniele Pavia, Marco Grella, H. Maeomichi","doi":"10.1109/SOCA.2014.47","DOIUrl":"https://doi.org/10.1109/SOCA.2014.47","url":null,"abstract":"The Smart City concept relates to improve efficiency of city services and facilitate a more sustainable development of cities, as well as standing as the key concept for the future technological developments in Future Internet, IoT and, for the great quantity of information stored, big data and cloud computing. In this sense, this paper presents the ClouT project, a joint European-Japanese project, whose main aim is making citizens aware of city resources and helping them to use and care these resources by mean of smart IoT services in the Cloud. This objective is addressed through the definition of a three layer architecture composed of: CIaaS, CPaaS and CSaaS layers. On top of this architecture, different use cases associated to different application domains will be developed, mainly within the four cities that take part of the consortium: Mitaka and Fujisawa in Japan, and Santander and Genova in Europe.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhi-Kai Zhang, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Chong Kuan Chen, S. Shieh
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters.
{"title":"IoT Security: Ongoing Challenges and Research Opportunities","authors":"Zhi-Kai Zhang, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Chong Kuan Chen, S. Shieh","doi":"10.1109/SOCA.2014.58","DOIUrl":"https://doi.org/10.1109/SOCA.2014.58","url":null,"abstract":"The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information security on the shared data is an important issue that cannot be neglected. In this paper, we begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service composition involves combining many existing services to solve a complex task in the service-oriented environment. Due to the progress in modern smart devices, mobile devices can now act as service providers. The mobility of mobile service providers and the dynamism of the mobile environment are unique features. As a result, there are two issues with service composition in mobile environments: (1) how to use the mobility of devices as an non-functional Quality of Service (QoS) criterion, and (2) how to deal with the dynamism of the mobile environment to realize the optimal service composition. In order to deal with above issues, we proposed a QoS-aware service composition model for service composition in mobile environments considering the feature of mobility in the mobile environment. Moreover, we proposed an adaptive approach called k-neighbor. The main idea of k-neighbor approach is to decompose the composite service into smaller elementary composite services then to set up a solution plan for those elementary composite services based on the available provider set. The evaluation shows that the way of decomposing a composite service adapts to different dynamism of the environment.
{"title":"QoS-Aware Service Composition in Mobile Environments","authors":"N. Ngoc, Donghui Lin, Takao Nakaguchi, T. Ishida","doi":"10.1109/SOCA.2014.51","DOIUrl":"https://doi.org/10.1109/SOCA.2014.51","url":null,"abstract":"Service composition involves combining many existing services to solve a complex task in the service-oriented environment. Due to the progress in modern smart devices, mobile devices can now act as service providers. The mobility of mobile service providers and the dynamism of the mobile environment are unique features. As a result, there are two issues with service composition in mobile environments: (1) how to use the mobility of devices as an non-functional Quality of Service (QoS) criterion, and (2) how to deal with the dynamism of the mobile environment to realize the optimal service composition. In order to deal with above issues, we proposed a QoS-aware service composition model for service composition in mobile environments considering the feature of mobility in the mobile environment. Moreover, we proposed an adaptive approach called k-neighbor. The main idea of k-neighbor approach is to decompose the composite service into smaller elementary composite services then to set up a solution plan for those elementary composite services based on the available provider set. The evaluation shows that the way of decomposing a composite service adapts to different dynamism of the environment.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The default method for handling context today is to use ontology graphs. Recently, facets have become the de-facto method for making context more accessible for human handling that includes context creation and browsing. Although facets are officially classified as a personalization technology, only limited personalization can be achieved in practice. This paper presents a drastically new approach which assumes that content is context-less originally and the context is added as needed by individual users or user communities. Apart from the fact that the proposal is the ultimate form of personalization -- context is added by users themselves, the new approach is open to new forms of graphical representation of context where this paper specifically recommends Metro Maps.
{"title":"On Context Management Using Metro Maps","authors":"M. Zhanikeev","doi":"10.1109/SOCA.2014.41","DOIUrl":"https://doi.org/10.1109/SOCA.2014.41","url":null,"abstract":"The default method for handling context today is to use ontology graphs. Recently, facets have become the de-facto method for making context more accessible for human handling that includes context creation and browsing. Although facets are officially classified as a personalization technology, only limited personalization can be achieved in practice. This paper presents a drastically new approach which assumes that content is context-less originally and the context is added as needed by individual users or user communities. Apart from the fact that the proposal is the ultimate form of personalization -- context is added by users themselves, the new approach is open to new forms of graphical representation of context where this paper specifically recommends Metro Maps.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing popularity of web service, it is indispensable to efficiently locate the desired service. Utilizing WSDL documents to cluster web services into functionally similar service groups is becoming mainstream in recent years. However, most existing algorithms cluster WSDL documents solely and ignore the distribution of words rather than cluster them simultaneously. Different from the traditional clustering algorithms that are on one-way clustering, this paper proposes a novel approach named WCCluster to simultaneously cluster WSDL documents and the words extracted from them to improve the accuracy of clustering. WCCluster poses co-clustering as a bipartite graph partitioning problem, and uses a spectral graph algorithm in which proper singular vectors are utilized as a real relaxation to the NP-complete graph partitioning problem. To evaluate the proposed approach, we design comprehensive experiments based on a real-world data set, and the results demonstrate the effectiveness of WCCluster.
{"title":"Co-Clustering WSDL Documents to Bootstrap Service Discovery","authors":"Tingting Liang, Liang Chen, Haochao Ying, Jian Wu","doi":"10.1109/SOCA.2014.27","DOIUrl":"https://doi.org/10.1109/SOCA.2014.27","url":null,"abstract":"With the increasing popularity of web service, it is indispensable to efficiently locate the desired service. Utilizing WSDL documents to cluster web services into functionally similar service groups is becoming mainstream in recent years. However, most existing algorithms cluster WSDL documents solely and ignore the distribution of words rather than cluster them simultaneously. Different from the traditional clustering algorithms that are on one-way clustering, this paper proposes a novel approach named WCCluster to simultaneously cluster WSDL documents and the words extracted from them to improve the accuracy of clustering. WCCluster poses co-clustering as a bipartite graph partitioning problem, and uses a spectral graph algorithm in which proper singular vectors are utilized as a real relaxation to the NP-complete graph partitioning problem. To evaluate the proposed approach, we design comprehensive experiments based on a real-world data set, and the results demonstrate the effectiveness of WCCluster.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Tsuboi, Tomomichi Hayakawa, Ryouta Suzuki, Takayuki Ito
The government policies "Government 2.0", which are aimed at harness collaborative technologies to create an open-source computing platform in which government, citizens, and innovative companies can improve transparency and efficiency have been adopted in several countries. One of the their goals is sharing local problems and information's between citizens and providing information to the local governments from the public. There are several services designed to help the citizens report non-emergency issues in their neighborhood. (e.g. Fix My Street (FMS) and See Click Fix (SCF)) However, incentive design to enable citizens to actively report the issues and encourage them to patrol an area has not been applied to current services. Therefore, we developed a local management SNS application for understanding the local situation through posted photos and comments from the citizens. In addition, we applies incentive design to a local management SNS application to encourage the user contribution. The incentive mechanism encourages the contribution of users by keeping score of points earned through various contributions on the application.
政府政策“政府2.0”,旨在利用协作技术创建一个开源计算平台,在这个平台上,政府、公民和创新型公司可以提高透明度和效率,已经在几个国家被采用。他们的目标之一是在市民之间分享当地的问题和信息,并向当地政府提供来自公众的信息。有几项服务旨在帮助市民报告他们附近的非紧急问题。(例如:Fix My Street (FMS)和See Click Fix (SCF))然而,鼓励市民主动报告问题并鼓励他们在某个地区巡逻的激励设计尚未应用于当前的服务。因此,我们开发了一个地方管理SNS应用程序,通过张贴照片和市民的评论来了解当地的情况。此外,我们将激励设计应用于本地管理SNS应用,以鼓励用户的贡献。奖励机制通过记录用户在应用程序上的各种贡献所获得的积分来鼓励用户的贡献。
{"title":"An Implementation of a Local Issue Sharing System Based on Incentive Mechanism","authors":"T. Tsuboi, Tomomichi Hayakawa, Ryouta Suzuki, Takayuki Ito","doi":"10.1109/SOCA.2014.35","DOIUrl":"https://doi.org/10.1109/SOCA.2014.35","url":null,"abstract":"The government policies \"Government 2.0\", which are aimed at harness collaborative technologies to create an open-source computing platform in which government, citizens, and innovative companies can improve transparency and efficiency have been adopted in several countries. One of the their goals is sharing local problems and information's between citizens and providing information to the local governments from the public. There are several services designed to help the citizens report non-emergency issues in their neighborhood. (e.g. Fix My Street (FMS) and See Click Fix (SCF)) However, incentive design to enable citizens to actively report the issues and encourage them to patrol an area has not been applied to current services. Therefore, we developed a local management SNS application for understanding the local situation through posted photos and comments from the citizens. In addition, we applies incentive design to a local management SNS application to encourage the user contribution. The incentive mechanism encourages the contribution of users by keeping score of points earned through various contributions on the application.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131461182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Hahn, Santiago Gómez Sáez, V. Andrikopoulos, D. Karastoyanova, F. Leymann
The support of multi-tenancy is an essential requirement for leveraging the full capacity of Cloud computing. Multi-tenancy enables service providers to maximize the utilization of their infrastructure and to reduce the servicing costs per customer, thus indirectly benefiting also the customers. In addition, it allows both providers and consumers to reap the advantages of Cloud-based applications configurable for the needs of different tenants. Nowadays, new applications or services are typically compositions of multiple existing services. Service Composition Engines (SCEs) provide the required functionality to enable the definition and execution of such compositions. Multi-tenancy on the level of SCEs allows for both process model, as well as underlying infrastructure sharing. Towards the goal of enabling multi-tenancy of SCEs, in this paper, we investigate the requirements and define a general architecture for the realization of a multi-tenant SCE solution. This architecture is prototypically realized based on an open-source SCE implementation and integrated into an existing multi-tenant aware Enterprise Service Bus (ESB). The performance evaluation of our prototype shows promising results in terms of the degradation introduced due to processing and communication overhead.
{"title":"SCE^MT: A Multi-tenant Service Composition Engine","authors":"Michael Hahn, Santiago Gómez Sáez, V. Andrikopoulos, D. Karastoyanova, F. Leymann","doi":"10.1109/SOCA.2014.9","DOIUrl":"https://doi.org/10.1109/SOCA.2014.9","url":null,"abstract":"The support of multi-tenancy is an essential requirement for leveraging the full capacity of Cloud computing. Multi-tenancy enables service providers to maximize the utilization of their infrastructure and to reduce the servicing costs per customer, thus indirectly benefiting also the customers. In addition, it allows both providers and consumers to reap the advantages of Cloud-based applications configurable for the needs of different tenants. Nowadays, new applications or services are typically compositions of multiple existing services. Service Composition Engines (SCEs) provide the required functionality to enable the definition and execution of such compositions. Multi-tenancy on the level of SCEs allows for both process model, as well as underlying infrastructure sharing. Towards the goal of enabling multi-tenancy of SCEs, in this paper, we investigate the requirements and define a general architecture for the realization of a multi-tenant SCE solution. This architecture is prototypically realized based on an open-source SCE implementation and integrated into an existing multi-tenant aware Enterprise Service Bus (ESB). The performance evaluation of our prototype shows promising results in terms of the degradation introduced due to processing and communication overhead.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"61 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}