Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.73
Zheng Li, L. O'Brien, He Zhang
Given an increasing number of Cloud services available in the market, evaluating candidate Cloud services is crucial and beneficial for both service customers (e.g. cost benefit analysis) and providers (e.g. direction of improvement). When it comes to performing any evaluation, a suitable methodology is inevitably required to direct experimental implementations. Nevertheless, there is still a lack of a sound methodology to guide the evaluation of Cloud services. By borrowing the lessons from evaluation of traditional computing systems, referring to the guidelines for Design of Experiments (DOE), and summarizing the existing experiences of real experimental studies, we proposed a generic Cloud Evaluation Experiment Methodology (CEEM) for Cloud services evaluation. Furthermore, we have established a pre-experimental knowledge base and specified corresponding suggestions to make this methodology more practical in the Cloud Computing domain. Through evaluating the Google AppEngine Python runtime as a preliminary validation, we show that Cloud evaluators may achieve more rational and convincing experimental results and conclusions following such an evaluation methodology.
{"title":"CEEM: A Practical Methodology for Cloud Services Evaluation","authors":"Zheng Li, L. O'Brien, He Zhang","doi":"10.1109/SERVICES.2013.73","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.73","url":null,"abstract":"Given an increasing number of Cloud services available in the market, evaluating candidate Cloud services is crucial and beneficial for both service customers (e.g. cost benefit analysis) and providers (e.g. direction of improvement). When it comes to performing any evaluation, a suitable methodology is inevitably required to direct experimental implementations. Nevertheless, there is still a lack of a sound methodology to guide the evaluation of Cloud services. By borrowing the lessons from evaluation of traditional computing systems, referring to the guidelines for Design of Experiments (DOE), and summarizing the existing experiences of real experimental studies, we proposed a generic Cloud Evaluation Experiment Methodology (CEEM) for Cloud services evaluation. Furthermore, we have established a pre-experimental knowledge base and specified corresponding suggestions to make this methodology more practical in the Cloud Computing domain. Through evaluating the Google AppEngine Python runtime as a preliminary validation, we show that Cloud evaluators may achieve more rational and convincing experimental results and conclusions following such an evaluation methodology.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.43
Robert Nix, Murat Kantarcioglu, S. Shetty
The amount of computing done in the cloud is greatly increasing. The decentralized nature of the cloud, however, makes it difficult for individuals to ensure that the computation is being done correctly. Thus, the concept of "cloud auditing" has appeared. As applications in the cloud become more sensitive, the need for auditing systems to provide rapid analysis and quick responses also increases. Machine learning algorithms can be employed for the purposes of providing audit data. Few of these algorithms can be done in an online fashion, however. In this work, we examine one such online machine learning algorithm, and describe how it might be employed in a distributed computing environment.
{"title":"Toward a Real-Time Cloud Auditing Paradigm","authors":"Robert Nix, Murat Kantarcioglu, S. Shetty","doi":"10.1109/SERVICES.2013.43","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.43","url":null,"abstract":"The amount of computing done in the cloud is greatly increasing. The decentralized nature of the cloud, however, makes it difficult for individuals to ensure that the computation is being done correctly. Thus, the concept of \"cloud auditing\" has appeared. As applications in the cloud become more sensitive, the need for auditing systems to provide rapid analysis and quick responses also increases. Machine learning algorithms can be employed for the purposes of providing audit data. Few of these algorithms can be done in an online fashion, however. In this work, we examine one such online machine learning algorithm, and describe how it might be employed in a distributed computing environment.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"57 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129472623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.41
David Reynolds, Mina Guirguis
With the escalation of attacks that target mobile devices there is an increasing need for efficient monitoring tools. Due to computation, storage, and power constraints of the devices, these monitoring tools may overload the entire system causing severe performance degradation for the running applications. Moreover, they can be pushed by resource-intensive applications and may not perform an adequate monitoring job. To that end, in this project we develop adaptive monitoring tools that are capable of monitoring a wide range of information while efficiently utilizing the available resources on the mobile device. We apply control theoretic techniques to design monitoring functionalities, such as process, integrity and network monitors, that utilize the underlying resources efficiently. This is achieved through controllers that dynamically select the duty cycles of the monitors. Our models and results are validated on the Android platform through emulation and real implementation on the Nexus 7 tablet.
{"title":"Control Theoretic Adaptive Monitoring Tools","authors":"David Reynolds, Mina Guirguis","doi":"10.1109/SERVICES.2013.41","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.41","url":null,"abstract":"With the escalation of attacks that target mobile devices there is an increasing need for efficient monitoring tools. Due to computation, storage, and power constraints of the devices, these monitoring tools may overload the entire system causing severe performance degradation for the running applications. Moreover, they can be pushed by resource-intensive applications and may not perform an adequate monitoring job. To that end, in this project we develop adaptive monitoring tools that are capable of monitoring a wide range of information while efficiently utilizing the available resources on the mobile device. We apply control theoretic techniques to design monitoring functionalities, such as process, integrity and network monitors, that utilize the underlying resources efficiently. This is achieved through controllers that dynamically select the duty cycles of the monitors. Our models and results are validated on the Android platform through emulation and real implementation on the Nexus 7 tablet.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.16
S. Cimato, E. Damiani, Francesco Zavatarelli, R. Menicocci
The need of a certification process for cloud-based services is emerging as a way to address some of the remaining obstacles facing the effective development and diffusion of the cloud-computing paradigm. In this paper we move the first steps towards a complete approach containing a conceptual framework where the specifications of basic, hybrid and incremental certification models for cloud-based services can be given. Specifically, we focus on the definition of a unifying meta-model to provide representational guidelines for (i) the definition of the security properties to be certified, (ii) the types of evidence underlying them, (iii) the phases of the certificate life cycle, as well as of all mechanisms for generating supporting evidence.
{"title":"Towards the Certification of Cloud Services","authors":"S. Cimato, E. Damiani, Francesco Zavatarelli, R. Menicocci","doi":"10.1109/SERVICES.2013.16","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.16","url":null,"abstract":"The need of a certification process for cloud-based services is emerging as a way to address some of the remaining obstacles facing the effective development and diffusion of the cloud-computing paradigm. In this paper we move the first steps towards a complete approach containing a conceptual framework where the specifications of basic, hybrid and incremental certification models for cloud-based services can be given. Specifically, we focus on the definition of a unifying meta-model to provide representational guidelines for (i) the definition of the security properties to be certified, (ii) the types of evidence underlying them, (iii) the phases of the certificate life cycle, as well as of all mechanisms for generating supporting evidence.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122857092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.70
Ning Li, Liang-Jie Zhang, Ping Xu, Li Wang, Jianhua Zheng, Yifu Guo
With the development of cloud computing,as a cloud computing service, cloud storage widely applied to enterprises and people's daily life in the form of the public cloud storage, hybrid cloud storage , internal cloud storage. In the current internet environment, the annual investment in providing public cloud storage services is more than ?500 million. More and more companies have joined the R & D team on cloud storage. Because the product differentiation of Cloud storage products is small, the personal preferences of user groups is completed, the market is a buyer's market, and other reasons. Further, the profit of private cloud storage model is also not clear. Cloud storage pricing model has become the focus for the user and vendor. In this article, the authors will be starting from different pricing strategies to discuss the pricing model of cloud storage.
{"title":"Research on Pricing Model of Cloud Storage","authors":"Ning Li, Liang-Jie Zhang, Ping Xu, Li Wang, Jianhua Zheng, Yifu Guo","doi":"10.1109/SERVICES.2013.70","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.70","url":null,"abstract":"With the development of cloud computing,as a cloud computing service, cloud storage widely applied to enterprises and people's daily life in the form of the public cloud storage, hybrid cloud storage , internal cloud storage. In the current internet environment, the annual investment in providing public cloud storage services is more than ?500 million. More and more companies have joined the R & D team on cloud storage. Because the product differentiation of Cloud storage products is small, the personal preferences of user groups is completed, the market is a buyer's market, and other reasons. Further, the profit of private cloud storage model is also not clear. Cloud storage pricing model has become the focus for the user and vendor. In this article, the authors will be starting from different pricing strategies to discuss the pricing model of cloud storage.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130053339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.71
Raed Karim, Chen Ding, A. Miri
In order to select and rank the best services in a cloud computing environment, the end-to-end quality of service (QoS) values of cloud services have to be computed. For a new SaaS provider, the deployment of its software application in the cloud is a challenging job. It has to find a hosting service (IaaS) that hosts its service. The primary goal of the SaaS provider is to make its service at the top of the ranked list of cloud services returned to end users through satisfying their QoS requirements. In this paper, we propose a mechanism to map the users' QoS requirements of cloud services to the right QoS specifications of SaaS then map them to best IaaS service that offers the optimal QoS guarantees. Then together SaaS and IaaS services can provide the best service offer to end users. As a result of the mapping, the end-to-end QoS values can be calculated. We propose a set of rules to perform the mapping process. We hierarchically model the QoS specifications of cloud services using the Analytic Hierarchy Process (AHP) method. The AHP based model helps to facilitate the mapping process across the cloud layers, and to rank the candidate cloud services for end users. We use a case study to illustrate and validate our solution approach.
{"title":"An End-to-End QoS Mapping Approach for Cloud Service Selection","authors":"Raed Karim, Chen Ding, A. Miri","doi":"10.1109/SERVICES.2013.71","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.71","url":null,"abstract":"In order to select and rank the best services in a cloud computing environment, the end-to-end quality of service (QoS) values of cloud services have to be computed. For a new SaaS provider, the deployment of its software application in the cloud is a challenging job. It has to find a hosting service (IaaS) that hosts its service. The primary goal of the SaaS provider is to make its service at the top of the ranked list of cloud services returned to end users through satisfying their QoS requirements. In this paper, we propose a mechanism to map the users' QoS requirements of cloud services to the right QoS specifications of SaaS then map them to best IaaS service that offers the optimal QoS guarantees. Then together SaaS and IaaS services can provide the best service offer to end users. As a result of the mapping, the end-to-end QoS values can be calculated. We propose a set of rules to perform the mapping process. We hierarchically model the QoS specifications of cloud services using the Analytic Hierarchy Process (AHP) method. The AHP based model helps to facilitate the mapping process across the cloud layers, and to rank the candidate cloud services for end users. We use a case study to illustrate and validate our solution approach.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130295951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.20
Haiming Wang, Kenny Wong
With the growing establishment of Internet infrastructure, more and more online services become available to end user, which in turn promotes the prosperity of the Internet. However, two issues emerge during this information increase. First, users have to access many individual sites to get their services, which consumes lots of time and contains some duplicate work. Second, user traces in different websites could have been used to provide more personalized services. Given these observations, this position paper proposes a recommendation-assisted personal web system based on existing work on personal web and recommendation systems. This system can integrate several web services to form a personal web, derive request-specific user data, and provide a personalized service by content based filtering and user intention inference. Using a research assistant application as a case study, we show how this framework helps to deliver personalized services.
{"title":"Recommendation-Assisted Personal Web","authors":"Haiming Wang, Kenny Wong","doi":"10.1109/SERVICES.2013.20","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.20","url":null,"abstract":"With the growing establishment of Internet infrastructure, more and more online services become available to end user, which in turn promotes the prosperity of the Internet. However, two issues emerge during this information increase. First, users have to access many individual sites to get their services, which consumes lots of time and contains some duplicate work. Second, user traces in different websites could have been used to provide more personalized services. Given these observations, this position paper proposes a recommendation-assisted personal web system based on existing work on personal web and recommendation systems. This system can integrate several web services to form a personal web, derive request-specific user data, and provide a personalized service by content based filtering and user intention inference. Using a research assistant application as a case study, we show how this framework helps to deliver personalized services.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.26
Aili Wang, Chao Wang, Xi Li, Xuehai Zhou
In order to protect the teenagers in online cyberspace, this paper presents SOBA, novel services-oriented internet browser architecture with distributed filtering mechanisms. SOBA is the first literature that introduces SOA concepts into the web browser design paradigm. It contains a server cluster, which employs URL filter functions to verify the URL access, while whitelists and validation results are wrapped as services. Mean-while, a customized SOBA client is in charge of data conversion and web site navigation while verification workloads are de-ployed on the server side. Administrators can manage URL data-bases through back stage websites. A prototyping software browser of SOBA demonstrates that SOA concepts can greatly improve the safety for teenage users with high flexibility and modularity.
{"title":"SOBA: A Services-Oriented Browser Architecture with Distributed URL-Filtering Mechanisms for Teenagers","authors":"Aili Wang, Chao Wang, Xi Li, Xuehai Zhou","doi":"10.1109/SERVICES.2013.26","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.26","url":null,"abstract":"In order to protect the teenagers in online cyberspace, this paper presents SOBA, novel services-oriented internet browser architecture with distributed filtering mechanisms. SOBA is the first literature that introduces SOA concepts into the web browser design paradigm. It contains a server cluster, which employs URL filter functions to verify the URL access, while whitelists and validation results are wrapped as services. Mean-while, a customized SOBA client is in charge of data conversion and web site navigation while verification workloads are de-ployed on the server side. Administrators can manage URL data-bases through back stage websites. A prototyping software browser of SOBA demonstrates that SOA concepts can greatly improve the safety for teenage users with high flexibility and modularity.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.51
Marioli Montenegro, A. Maña
Software certification has been successfully used with traditional "static" software. With the introduction of new computing paradigms such as service-oriented computing and cloud computing, the existing way to represent software certifications based in verbose human-oriented documents, exhibits many limitations, to the point of making the approach not useful in practice. The ASSERT4SOA project is currently addressing this problem and has developed a computer-oriented representation for software certifications based on a new type of digital certificates called ASSERT. However, in order to be able to represent the huge heterogeneity of certification schemes and standards, the ASSERT specification has to be extremely flexible and rather complex. This in turn, makes the production of ASSERTs difficult, and moreover, limits their interoperability, as to be interoperable, ASSERTS need to follow certain rules. This paper presents the solution adopted in the project in order to improve the interoperability of independently produced ASSERTS. The solution has been evaluated and has received very positive feedback.
{"title":"Improving Interoperability of Digital Certificates for Software & Services","authors":"Marioli Montenegro, A. Maña","doi":"10.1109/SERVICES.2013.51","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.51","url":null,"abstract":"Software certification has been successfully used with traditional \"static\" software. With the introduction of new computing paradigms such as service-oriented computing and cloud computing, the existing way to represent software certifications based in verbose human-oriented documents, exhibits many limitations, to the point of making the approach not useful in practice. The ASSERT4SOA project is currently addressing this problem and has developed a computer-oriented representation for software certifications based on a new type of digital certificates called ASSERT. However, in order to be able to represent the huge heterogeneity of certification schemes and standards, the ASSERT specification has to be extremely flexible and rather complex. This in turn, makes the production of ASSERTs difficult, and moreover, limits their interoperability, as to be interoperable, ASSERTS need to follow certain rules. This paper presents the solution adopted in the project in order to improve the interoperability of independently produced ASSERTS. The solution has been evaluated and has received very positive feedback.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.60
P. Lach, H. Müller
Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior and are better at satisfying user utility. Applications need to become smart applications and as software engineers we can make this happen by looking at the lessons learned from self-adaptive systems. Data structures, models, and an unfettered resolve to simplifying the user experience will help us get there.
{"title":"Towards Smarter Task Applications","authors":"P. Lach, H. Müller","doi":"10.1109/SERVICES.2013.60","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.60","url":null,"abstract":"Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior and are better at satisfying user utility. Applications need to become smart applications and as software engineers we can make this happen by looking at the lessons learned from self-adaptive systems. Data structures, models, and an unfettered resolve to simplifying the user experience will help us get there.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}