Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.50
M. Bellamy
Despite attractive benefits a range of barriers is inhibiting take-up of Cloud Computing services which in most public sector organisations remains at less than 5% of the ICT footprint. The generic factor inhibiting wider deployment is that use of Cloud Computing services exposes organisations to heightened risks. While the inherent risks can be managed, in the near term significant investment in skills, processes, tools and technology is a prerequisite for doing so efficiently. For many organisations that use ICT services, the level of investment needed will often be prohibitive. This has created the opportunity for the emergence of trusted cloud brokerage services that can invest strategically to assist organisations with the use of Cloud Computing services and management of the associated risks, developing service portfolios that reduce upfront costs, so that use of Cloud Computing services becomes the best choice on a project by project basis. This paper considers the benefits of Cloud Computing, identifies the barriers to take up and how these can be overcome, and considers how cloud services brokerages can potentially develop new capabilities to accelerate take-up and benefits realisation.
{"title":"Adoption of Cloud Computing Services by Public Sector Organisations","authors":"M. Bellamy","doi":"10.1109/SERVICES.2013.50","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.50","url":null,"abstract":"Despite attractive benefits a range of barriers is inhibiting take-up of Cloud Computing services which in most public sector organisations remains at less than 5% of the ICT footprint. The generic factor inhibiting wider deployment is that use of Cloud Computing services exposes organisations to heightened risks. While the inherent risks can be managed, in the near term significant investment in skills, processes, tools and technology is a prerequisite for doing so efficiently. For many organisations that use ICT services, the level of investment needed will often be prohibitive. This has created the opportunity for the emergence of trusted cloud brokerage services that can invest strategically to assist organisations with the use of Cloud Computing services and management of the associated risks, developing service portfolios that reduce upfront costs, so that use of Cloud Computing services becomes the best choice on a project by project basis. This paper considers the benefits of Cloud Computing, identifies the barriers to take up and how these can be overcome, and considers how cloud services brokerages can potentially develop new capabilities to accelerate take-up and benefits realisation.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.45
Sana Baccar, M. Rouached, Mohamed Abid
Web services provide an instantiation of the loosely coupled Service Oriented Architecture (SOA) and facilitate the process of enterprise application integration. However, with the explosive growth of the number of Web services published over the Internet, identifying a high quality of composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. We propose in this paper an approach that adresses this challenge by considering a two-phase composition process. The composition first proceeds to generate an abstract plan based on Web service types using Dynamic Description Logics (DDL). This abstract plan is then concretized into an executable plan by selecting the appropriate Web service instances based on non-functional requirements.
{"title":"A User Requirements Oriented Semantic Web Services Composition Framework","authors":"Sana Baccar, M. Rouached, Mohamed Abid","doi":"10.1109/SERVICES.2013.45","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.45","url":null,"abstract":"Web services provide an instantiation of the loosely coupled Service Oriented Architecture (SOA) and facilitate the process of enterprise application integration. However, with the explosive growth of the number of Web services published over the Internet, identifying a high quality of composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. We propose in this paper an approach that adresses this challenge by considering a two-phase composition process. The composition first proceeds to generate an abstract plan based on Web service types using Dynamic Description Logics (DDL). This abstract plan is then concretized into an executable plan by selecting the appropriate Web service instances based on non-functional requirements.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.44
Sarra M. Alqahtani, R. Gamble, I. Ray
The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their message exchange among vendors. Service vendors must disclose their COI classes for storage and analysis by the cloud because as services are provisioned to an application, additional conflict classes may be added, preventing the service from future compositions to avoid COI. In this paper, we present a strategy to centrally store and monitor COI classes for services in a service chain using principles of the Chinese Wall Model. We introduce a Security Monitoring Database (SMDB) that audits and monitors the COI classes as they exist or are assigned to hosted services, including the tenant services making requests. We describe an algorithm to prevent COI before provisioning services and dynamically detect it during run time due to concurrent service invocations using the SMDB information.
{"title":"Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud","authors":"Sarra M. Alqahtani, R. Gamble, I. Ray","doi":"10.1109/SERVICES.2013.44","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.44","url":null,"abstract":"The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their message exchange among vendors. Service vendors must disclose their COI classes for storage and analysis by the cloud because as services are provisioned to an application, additional conflict classes may be added, preventing the service from future compositions to avoid COI. In this paper, we present a strategy to centrally store and monitor COI classes for services in a service chain using principles of the Chinese Wall Model. We introduce a Security Monitoring Database (SMDB) that audits and monitors the COI classes as they exist or are assigned to hosted services, including the tenant services making requests. We describe an algorithm to prevent COI before provisioning services and dynamically detect it during run time due to concurrent service invocations using the SMDB information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.56
Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke
This paper mainly develops the operation strategy of an enterprise drive based on viral marketing. Firstly, it introduces the concept, the features and successful cases of viral marketing. Next, it introduces what is Kingdee cloud drive and shows the comparative results among Kingdee cloud drive and other drives. With respect to the market positioning, this paper designs the operation strategy. Based on viral marketing, the detailed progress and reward mechanism are put forward in order to attract more users. Finally, the lottery model is developed based on the analytic network process in the reward mechanism.
{"title":"Viral Marketing and Its Application in Enterprise Drive Operation","authors":"Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke","doi":"10.1109/SERVICES.2013.56","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.56","url":null,"abstract":"This paper mainly develops the operation strategy of an enterprise drive based on viral marketing. Firstly, it introduces the concept, the features and successful cases of viral marketing. Next, it introduces what is Kingdee cloud drive and shows the comparative results among Kingdee cloud drive and other drives. With respect to the market positioning, this paper designs the operation strategy. Based on viral marketing, the detailed progress and reward mechanism are put forward in order to attract more users. Finally, the lottery model is developed based on the analytic network process in the reward mechanism.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.21
Eleni Stroulia, D. Gibbs, Blerina Bazelli
In this position paper, we present our early work towards a software architecture for developing product lines of personalized mobile applications.
在这份意见书中,我们介绍了我们为开发个性化移动应用产品线的软件架构所做的早期工作。
{"title":"Towards Families of Personalized Mobile Applications","authors":"Eleni Stroulia, D. Gibbs, Blerina Bazelli","doi":"10.1109/SERVICES.2013.21","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.21","url":null,"abstract":"In this position paper, we present our early work towards a software architecture for developing product lines of personalized mobile applications.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.47
G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman
Hadoop is a popular open source implementation of MapReduce, that has a number of prominent users including Yahoo!, Facebook, and Twitter. Though several works have focused on deploying algorithms on Hadoop MapReduce, research efforts into applying formal methods to prove the correctness of hadoop systems are limited. In this paper we propose a holistic approach to verify the correctness of hadoop systems using model checking techniques. We model Hadoop's parallel architecture to constraint it to valid start up ordering and identify and prove the benefits of data locality, deadlock-freeness and non-termination among others.
{"title":"Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop","authors":"G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman","doi":"10.1109/SERVICES.2013.47","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.47","url":null,"abstract":"Hadoop is a popular open source implementation of MapReduce, that has a number of prominent users including Yahoo!, Facebook, and Twitter. Though several works have focused on deploying algorithms on Hadoop MapReduce, research efforts into applying formal methods to prove the correctness of hadoop systems are limited. In this paper we propose a holistic approach to verify the correctness of hadoop systems using model checking techniques. We model Hadoop's parallel architecture to constraint it to valid start up ordering and identify and prove the benefits of data locality, deadlock-freeness and non-termination among others.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.15
A. Muñoz, A. Maña
Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do not provide support for dynamic changes of components as required in Cloud Computing scenarios. In existing certification schemes certificates refer to a particular version of the product or system, changes in the system structure require a process of recertification. We propose a solution based on the combination of software certification techniques and hardware-based certification, as those provided by the Trusted Computing technology. Likewise, the main target of our approach is bringing the gap existing between the software certification and the means for hardware certification, in order to provide a solution for the whole system certification using Trusted Computing technology.
{"title":"Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing","authors":"A. Muñoz, A. Maña","doi":"10.1109/SERVICES.2013.15","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.15","url":null,"abstract":"Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do not provide support for dynamic changes of components as required in Cloud Computing scenarios. In existing certification schemes certificates refer to a particular version of the product or system, changes in the system structure require a process of recertification. We propose a solution based on the combination of software certification techniques and hardware-based certification, as those provided by the Trusted Computing technology. Likewise, the main target of our approach is bringing the gap existing between the software certification and the means for hardware certification, in order to provide a solution for the whole system certification using Trusted Computing technology.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.38
Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth
Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At the same time, the need for cloud users to protect the security and privacy of their resources has also intensified. In this paper, the problem of simultaneously supporting privacy and auditing in cloud systems is studied. Specifically, the paper discusses the guiding principles, fundamental concepts, and threat models for current cloud computing systems. Finally, we propose infrastructure that exploits a novel thin layer between the client and the cloud service provider to ensure that data storage, operation, and auditing does not reveal sensitive client information.
{"title":"Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems","authors":"Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth","doi":"10.1109/SERVICES.2013.38","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.38","url":null,"abstract":"Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At the same time, the need for cloud users to protect the security and privacy of their resources has also intensified. In this paper, the problem of simultaneously supporting privacy and auditing in cloud systems is studied. Specifically, the paper discusses the guiding principles, fundamental concepts, and threat models for current cloud computing systems. Finally, we propose infrastructure that exploits a novel thin layer between the client and the cloud service provider to ensure that data storage, operation, and auditing does not reveal sensitive client information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.36
Amr Osman, M. El-Refaey, A. Elnaggar
The data explosion and the tremendous growth in the volume of data generated from various IT services places an enormous demand on harnessing and smartly analyzing the generated data and enterprise contents. According to recent studies, it is predicted that the volume of such data will become 26 fold in the next five years. While there might be some existing technologies to support this, industry is frantically exploring new models that lead to more efficient and higher performance solutions. With the aid of cloud computing and high performance analytics such as scalable-parallel machine learning, big data could be the fuel to a smarter cloud-powered IT world. Through our work, we provide a state-of-the-art review of high-performance advanced cloud analytics in the literature in attempt to find the ideal real-time platform for distributed analytic computations.
{"title":"Towards Real-Time Analytics in the Cloud","authors":"Amr Osman, M. El-Refaey, A. Elnaggar","doi":"10.1109/SERVICES.2013.36","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.36","url":null,"abstract":"The data explosion and the tremendous growth in the volume of data generated from various IT services places an enormous demand on harnessing and smartly analyzing the generated data and enterprise contents. According to recent studies, it is predicted that the volume of such data will become 26 fold in the next five years. While there might be some existing technologies to support this, industry is frantically exploring new models that lead to more efficient and higher performance solutions. With the aid of cloud computing and high performance analytics such as scalable-parallel machine learning, big data could be the fuel to a smarter cloud-powered IT world. Through our work, we provide a state-of-the-art review of high-performance advanced cloud analytics in the literature in attempt to find the ideal real-time platform for distributed analytic computations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.23
J. Ng, Diana H. Lau
End-users are confined by the social networking platforms that they invest effort in to set up their social contacts and relationships. The centralized, monopolized, and silo approach of today's social networking providers discourage interoperability across platforms. Enterprises struggle to find a common social networking approach to deal with the diversity of social networking platforms of choice of their users. Though each social networking platform provides their own APIs for externalizing users' social data, they are not designed to interoperate with other platforms. In this paper, we propose Social Ontology and Semantic Actions (SOSA) as a de-centralized, inter-operable social networking model and runtime services that enterprises can use as social networking middleware components for interoperability of social networking platforms of their users. SOSA provides platform agnostic construct for contacts; relationship axiom association with contacts, with inherent inferences to compute memberships given a relationship axiom. SOSA also enables binding with enterprise services as semantic actions of a given relationship axiom. Social relationship can also be used incontext with enterprise services and distributed web tasking.
最终用户受限于他们投入精力建立社交联系和关系的社交网络平台。当今社交网络提供商的集中式、垄断式和竖井式方法阻碍了跨平台的互操作性。企业努力寻找一种通用的社交网络方法来应对用户选择的社交网络平台的多样性。尽管每个社交网络平台都提供了自己的api来外部化用户的社交数据,但它们并不是为与其他平台进行互操作而设计的。在本文中,我们提出社会本体和语义动作(Social Ontology and Semantic Actions, SOSA)作为一种分散的、可互操作的社交网络模型和运行时服务,企业可以将其用作社交网络中间件组件,实现其用户的社交网络平台的互操作性。SOSA为联系人提供平台无关的构造;关系公理与联系人的关联,用给定关系公理的固有推理来计算成员关系。SOSA还支持将企业服务绑定为给定关系公理的语义操作。社会关系也可以在企业服务和分布式web任务的上下文中使用。
{"title":"Social Ontology and Semantic Actions: Enabling Social Networking Services for Distributed Web Tasking","authors":"J. Ng, Diana H. Lau","doi":"10.1109/SERVICES.2013.23","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.23","url":null,"abstract":"End-users are confined by the social networking platforms that they invest effort in to set up their social contacts and relationships. The centralized, monopolized, and silo approach of today's social networking providers discourage interoperability across platforms. Enterprises struggle to find a common social networking approach to deal with the diversity of social networking platforms of choice of their users. Though each social networking platform provides their own APIs for externalizing users' social data, they are not designed to interoperate with other platforms. In this paper, we propose Social Ontology and Semantic Actions (SOSA) as a de-centralized, inter-operable social networking model and runtime services that enterprises can use as social networking middleware components for interoperability of social networking platforms of their users. SOSA provides platform agnostic construct for contacts; relationship axiom association with contacts, with inherent inferences to compute memberships given a relationship axiom. SOSA also enables binding with enterprise services as semantic actions of a given relationship axiom. Social relationship can also be used incontext with enterprise services and distributed web tasking.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}