Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284882
Payam Rahimi, C. Chrysostomou, I. Kyriakides, V. Vassiliou
The Internet of Things (IoT) is an enabler technology for smart maritime networks. Connected IoT systems require reliable machine-type communication (MTC). However, maritime MTC is facing several practical challenges including the wide-area coverage, ubiquitous connectivity, cost-effectiveness, and reliability. In this paper, we first present a novel wireless communications assisted unmanned aerial vehicles (UAVs) system for maritime MTC. In our approach, UAVs are deployed to provide wide-area coverage, while a network of connected buoys handles data transmission between the UAVs and the on-shore data fusion and control center (DFCC). We propose a handover decision method that eliminates unnecessary handover triggers; thus, reducing the overall energy consumption and ensuring seamless connectivity. We formulate the handover decision method as a constrained optimization problem of maximizing handover efficiency in terms of signal-to-noise ratio (SNR), available data rate, residual energy, and buffered data, by identifying the buoy offering optimal connectivity. The optimization problem is solved by a probabilistic based genetic algorithm (GA). We compare the proposed handover decision model with three benchmark scenarios to validate the performance gains achieved.
{"title":"An Energy-Efficient Machine-Type Communication for Maritime Internet of Things","authors":"Payam Rahimi, C. Chrysostomou, I. Kyriakides, V. Vassiliou","doi":"10.1109/IEMCON51383.2020.9284882","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284882","url":null,"abstract":"The Internet of Things (IoT) is an enabler technology for smart maritime networks. Connected IoT systems require reliable machine-type communication (MTC). However, maritime MTC is facing several practical challenges including the wide-area coverage, ubiquitous connectivity, cost-effectiveness, and reliability. In this paper, we first present a novel wireless communications assisted unmanned aerial vehicles (UAVs) system for maritime MTC. In our approach, UAVs are deployed to provide wide-area coverage, while a network of connected buoys handles data transmission between the UAVs and the on-shore data fusion and control center (DFCC). We propose a handover decision method that eliminates unnecessary handover triggers; thus, reducing the overall energy consumption and ensuring seamless connectivity. We formulate the handover decision method as a constrained optimization problem of maximizing handover efficiency in terms of signal-to-noise ratio (SNR), available data rate, residual energy, and buffered data, by identifying the buoy offering optimal connectivity. The optimization problem is solved by a probabilistic based genetic algorithm (GA). We compare the proposed handover decision model with three benchmark scenarios to validate the performance gains achieved.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"38 1","pages":"0668-0676"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78548444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284820
M. E. Alim, Sarosh Ahmad, Marzieh Naghdi Dorabati, Ihab Hassoun
It has been observed that an alarming rate of road accidents occur in different countries every year with the increase of bikes and motorcycles. Some countries are one of the densely populated in the world where roads are narrower in comparison to the roads and streets. Although enough rules and regulations are made by the government to avoid road accidents, but the accident rate is increasing day by day. Reasons such as avoiding helmet by the bike rider during their ride as well as riding being drunk are worth mentionable. Motorcycle rider involve them in serious road accidents causing fatality while not wearing helmet and riding motorcycles being drunk. Wearing helmet can however reduce the risk of accidents largely. In this paper a very effective and technological way of Smart Helmet using Internet of Things (IoT) has been introduced by which one can avoid such problems. Arduino NANO and Arduino Mega-2560 are microcontrollers which control the entire components of the system. Two 2.4 GHZ nRF24L01 acts like sender and receiver for communication. One MQ-3 gas sensor is used which can detect whether the bike rider is alcoholic or not. If the bike rider is alcoholic, then the MQ-3 sensor detects it and the whole system goes off. A Sharp IR sensor detects the head of the motorcyclist within the range of 10–80 cm. The Bike rider's engine will start only when the rider will buckle the helmet. GPS & GSM Technology is used for tracking the location of the bike rider and sending text message to the family members of the Bike rider when an accident occurs. Our Smart Helmet is used for Accident Detection and Bike Rider's Safety.
{"title":"Design & Implementation of IoT Based Smart Helmet for Road Accident Detection","authors":"M. E. Alim, Sarosh Ahmad, Marzieh Naghdi Dorabati, Ihab Hassoun","doi":"10.1109/IEMCON51383.2020.9284820","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284820","url":null,"abstract":"It has been observed that an alarming rate of road accidents occur in different countries every year with the increase of bikes and motorcycles. Some countries are one of the densely populated in the world where roads are narrower in comparison to the roads and streets. Although enough rules and regulations are made by the government to avoid road accidents, but the accident rate is increasing day by day. Reasons such as avoiding helmet by the bike rider during their ride as well as riding being drunk are worth mentionable. Motorcycle rider involve them in serious road accidents causing fatality while not wearing helmet and riding motorcycles being drunk. Wearing helmet can however reduce the risk of accidents largely. In this paper a very effective and technological way of Smart Helmet using Internet of Things (IoT) has been introduced by which one can avoid such problems. Arduino NANO and Arduino Mega-2560 are microcontrollers which control the entire components of the system. Two 2.4 GHZ nRF24L01 acts like sender and receiver for communication. One MQ-3 gas sensor is used which can detect whether the bike rider is alcoholic or not. If the bike rider is alcoholic, then the MQ-3 sensor detects it and the whole system goes off. A Sharp IR sensor detects the head of the motorcyclist within the range of 10–80 cm. The Bike rider's engine will start only when the rider will buckle the helmet. GPS & GSM Technology is used for tracking the location of the bike rider and sending text message to the family members of the Bike rider when an accident occurs. Our Smart Helmet is used for Accident Detection and Bike Rider's Safety.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"173 1","pages":"0576-0581"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85596166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284864
Karel Hynek, T. Čejka
DNS over HTTPS (DoH) has been created with ambitions to improve the privacy of users on the internet. Domain names that are being resolved by DoH are transferred via an encrypted channel, ensures nobody should be able to read the content. However, even though the communication is encrypted, we show that it still leaks some private information, which can be misused. Therefore, this paper studies the behavior of the DoH protocol implementation in Firefox and Chrome web-browsers, and the level of detail that can be revealed by observing and analyzing packet-level information. The aim of this paper is to evaluate and highlight discovered privacy weaknesses hidden in DoH. By the trained machine learning classifier, it is possible to infer individual domain names only from the captured encrypted DoH connection. The resulting trained classifier can infer domain name from encrypted DNS traffic with surprisingly high accuracy up to 90% on HTTP 1.1, and up to 70% on HTTP 2 protocol.
{"title":"Privacy Illusion: Beware of Unpadded DoH","authors":"Karel Hynek, T. Čejka","doi":"10.1109/IEMCON51383.2020.9284864","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284864","url":null,"abstract":"DNS over HTTPS (DoH) has been created with ambitions to improve the privacy of users on the internet. Domain names that are being resolved by DoH are transferred via an encrypted channel, ensures nobody should be able to read the content. However, even though the communication is encrypted, we show that it still leaks some private information, which can be misused. Therefore, this paper studies the behavior of the DoH protocol implementation in Firefox and Chrome web-browsers, and the level of detail that can be revealed by observing and analyzing packet-level information. The aim of this paper is to evaluate and highlight discovered privacy weaknesses hidden in DoH. By the trained machine learning classifier, it is possible to infer individual domain names only from the captured encrypted DoH connection. The resulting trained classifier can infer domain name from encrypted DNS traffic with surprisingly high accuracy up to 90% on HTTP 1.1, and up to 70% on HTTP 2 protocol.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"6 1","pages":"0621-0628"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78427659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284854
Maruli Tua Baja Sihotang, M. I. Nashiruddin, M. A. Murti
The Smart Cities Framework is the basis for developing the Smart Cities model. This consideration must take into account the possibility of increasing the number of subscribers who require operators to provide appropriate access services. This study provides solutions and optimization of LoRaWAN-based Internet of Things (IoT) network connectivity to determine the needfor the number of gateways. LoRaWAN-based IoT optimization has critical design parameters, namely bandwidth, Spreading Factor (SF), and Coding Rate (CR). For this reason, analytic models and simulation tools are applied based on the scope and range that canbe transmitted. The results showed that the mean of best receivedsignal level for all areas of Bandung City was −81.17 dBm based oncapacity analysis and 82.31 dBm based on coverage analysis. Basedon the analysis of LoRaWAN capacity and coverage planning thatthe gateway needs in Bandung are 40 and 30 sites.
{"title":"LoRaWAN Internet of Things Network Planning for Smart City in Bandung Areas","authors":"Maruli Tua Baja Sihotang, M. I. Nashiruddin, M. A. Murti","doi":"10.1109/IEMCON51383.2020.9284854","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284854","url":null,"abstract":"The Smart Cities Framework is the basis for developing the Smart Cities model. This consideration must take into account the possibility of increasing the number of subscribers who require operators to provide appropriate access services. This study provides solutions and optimization of LoRaWAN-based Internet of Things (IoT) network connectivity to determine the needfor the number of gateways. LoRaWAN-based IoT optimization has critical design parameters, namely bandwidth, Spreading Factor (SF), and Coding Rate (CR). For this reason, analytic models and simulation tools are applied based on the scope and range that canbe transmitted. The results showed that the mean of best receivedsignal level for all areas of Bandung City was −81.17 dBm based oncapacity analysis and 82.31 dBm based on coverage analysis. Basedon the analysis of LoRaWAN capacity and coverage planning thatthe gateway needs in Bandung are 40 and 30 sites.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"138 1","pages":"0582-0588"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86499725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284909
Mirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Md Ashif Uddin, M. Mamun, Shamima Sultana Sonia, Moriom Akter, Abdullah G. Alharbi
Internet of Things (IoT) is a popular technology that changes everyday life and contributes in changing the way of using other technologies. IoT connects the things with the internet. By means of IoT, one can be notified about the weather status beforehand using sensors. Weather conditions can be observed and collected for further use. Weather status data can be stored in a website and Raspberry Pi can read this stored information to send a set of instructions to the objects. Then, objects can respond according to the information on the website. In this work, a weather notification system is proposed where the system collects the weather status from the website and sends instruction to the things. It is a common problem of many people to forget about taking the umbrella everyday while going outside. Our system can notify the weather status by turning ON an LED attached with the umbrella and sending SMS to the user equipment at user specified time. Therefore, this smart umbrella can make everyday life more comfortable.
{"title":"A Novel Website Development for Weather Notification System using Smart Umbrella Based on Internet of Things","authors":"Mirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Md Ashif Uddin, M. Mamun, Shamima Sultana Sonia, Moriom Akter, Abdullah G. Alharbi","doi":"10.1109/IEMCON51383.2020.9284909","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284909","url":null,"abstract":"Internet of Things (IoT) is a popular technology that changes everyday life and contributes in changing the way of using other technologies. IoT connects the things with the internet. By means of IoT, one can be notified about the weather status beforehand using sensors. Weather conditions can be observed and collected for further use. Weather status data can be stored in a website and Raspberry Pi can read this stored information to send a set of instructions to the objects. Then, objects can respond according to the information on the website. In this work, a weather notification system is proposed where the system collects the weather status from the website and sends instruction to the things. It is a common problem of many people to forget about taking the umbrella everyday while going outside. Our system can notify the weather status by turning ON an LED attached with the umbrella and sending SMS to the user equipment at user specified time. Therefore, this smart umbrella can make everyday life more comfortable.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"8 1","pages":"0129-0133"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87562410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284889
B. P. Beauchamp
A consolidation of sEMG to Muscle Force signal processing and Fingertip Workspace Mathematics (FWM) is hypothesized in this literature. Consequently, this hypothesis suggests a projection matrix from muscle force to joint angles of the hand. Using a supervised kinematic algorithm, an sEMG device can learn to describe an individual's fingertip positions in two steps. The first step is inverse kinematics to learn a projection from joint angle to muscle force. The second step is forward kinematics of muscle forces to predict joint angles without direct observation. This literature presents low cost hardware design for acquiring forearm sEMG signals and fingertip joint angles. The consolidation of sEMG to muscle force and kinematic hand modeling bridges the gap between physiologic research and human interfacing technology.
{"title":"A Low Cost sEMG Development Platform for Hand Joint Angle Acquisition","authors":"B. P. Beauchamp","doi":"10.1109/IEMCON51383.2020.9284889","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284889","url":null,"abstract":"A consolidation of sEMG to Muscle Force signal processing and Fingertip Workspace Mathematics (FWM) is hypothesized in this literature. Consequently, this hypothesis suggests a projection matrix from muscle force to joint angles of the hand. Using a supervised kinematic algorithm, an sEMG device can learn to describe an individual's fingertip positions in two steps. The first step is inverse kinematics to learn a projection from joint angle to muscle force. The second step is forward kinematics of muscle forces to predict joint angles without direct observation. This literature presents low cost hardware design for acquiring forearm sEMG signals and fingertip joint angles. The consolidation of sEMG to muscle force and kinematic hand modeling bridges the gap between physiologic research and human interfacing technology.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2010 1","pages":"0485-0491"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89818267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284868
R. Vahidnia, F. J. Dian
The application of Cellular Internet of Things (CIoT) devices is rapidly increasing in many use cases such as healthcare and smart cities. Governments, enterprises and even start-ups are heavily investing in implementing new solutions using cellular IoT technologies. However, there are many concerns associated with the deployment of these technologies that lead people to be hesitant in welcoming CIoT solutions. Security, privacy and safety issues are among these concerns. Consumers of IoT wearable devices are worried about the negative effects that the radiation of smart devices may have on their health. In this article, we address the safety concern by reviewing the standard limits of human exposure to radio frequency electromagnetic energy and analyzing the radiation levels of CIoT antennas.
{"title":"Radiation Safety Hazards of Cellular IoT Devices","authors":"R. Vahidnia, F. J. Dian","doi":"10.1109/IEMCON51383.2020.9284868","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284868","url":null,"abstract":"The application of Cellular Internet of Things (CIoT) devices is rapidly increasing in many use cases such as healthcare and smart cities. Governments, enterprises and even start-ups are heavily investing in implementing new solutions using cellular IoT technologies. However, there are many concerns associated with the deployment of these technologies that lead people to be hesitant in welcoming CIoT solutions. Security, privacy and safety issues are among these concerns. Consumers of IoT wearable devices are worried about the negative effects that the radiation of smart devices may have on their health. In this article, we address the safety concern by reviewing the standard limits of human exposure to radio frequency electromagnetic energy and analyzing the radiation levels of CIoT antennas.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"8 1","pages":"0116-0120"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84443938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284948
F. J. Dian, R. Vahidnia
It is important for an IoT device to be able to access the network with no or small delay in order to send its data to the Internet quickly. Particularly, in real time applications that time is of the essence, this delay should be small. The period of time from when an IoT device initiates a Random Access (RA) process to get access to the network until it sends its data is called the latency. Since the latency is dependent on the number of IoT devices in the network, the way that each device generates its traffic, and many other factors, it is extremely challenging to accurately estimate the latency. In this paper, we provide a simplistic view to estimate the latency in various situations based on the number of collisions, repetition, and data size for various RA processes belonging to different Cellular Internet of Things (CIoT) technology enhancements. To simplify the situation, we only discuss the most important factors. This simplistic view gives the reader a sense of the trimming of different parts of the RA process without using a complex simulator or analytical model.
{"title":"A Simplistic View on Latency of Random Access in Cellular Internet of Things","authors":"F. J. Dian, R. Vahidnia","doi":"10.1109/IEMCON51383.2020.9284948","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284948","url":null,"abstract":"It is important for an IoT device to be able to access the network with no or small delay in order to send its data to the Internet quickly. Particularly, in real time applications that time is of the essence, this delay should be small. The period of time from when an IoT device initiates a Random Access (RA) process to get access to the network until it sends its data is called the latency. Since the latency is dependent on the number of IoT devices in the network, the way that each device generates its traffic, and many other factors, it is extremely challenging to accurately estimate the latency. In this paper, we provide a simplistic view to estimate the latency in various situations based on the number of collisions, repetition, and data size for various RA processes belonging to different Cellular Internet of Things (CIoT) technology enhancements. To simplify the situation, we only discuss the most important factors. This simplistic view gives the reader a sense of the trimming of different parts of the RA process without using a complex simulator or analytical model.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"53 1","pages":"0391-0395"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80970305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284925
S. M. Reza Dibaj, A. Miri
Flexibility and the ability of cost management have made on-demand price scheduling as one of the most favourable choices of cloud service users. This mechanism is not appealing for cloud service providers at the same level because it cannot provide the required information to anticipate and provide future market demands. Instead, cloud service providers are more inclined to use Futures contracts. However, these methods do not provide the flexibility and cost management that on-demand methods provide for service users. Cloud secondary markets emerged to meet the needs of both sides of the market: 1) cloud service providers, 2)cloud service users, where brokers and reseller buyers act as intermediaries to provide the demanded services for service users. There is high competition among service providers to attract service users and among service users to find appropriate services, and also there are high fluctuations in environmental parameters, such as price and the volume of supply and demand. These are the reasons that designing an appropriate pricing algorithm and resource allocation mechanism is of great importance. In this paper, we propose a competition-based price scheduling mechanism that considers the inherent competition and fluctuation attributes of such environments. The provided experimental results show that our mechanism is superior to other methods, such as fixed and history-based pricing mechanisms, in terms of utility and resource allocation efficiency.
{"title":"C2TOP: A Cloud Competition-based Truthful Online Pricing Mechanism in Secondary Markets","authors":"S. M. Reza Dibaj, A. Miri","doi":"10.1109/IEMCON51383.2020.9284925","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284925","url":null,"abstract":"Flexibility and the ability of cost management have made on-demand price scheduling as one of the most favourable choices of cloud service users. This mechanism is not appealing for cloud service providers at the same level because it cannot provide the required information to anticipate and provide future market demands. Instead, cloud service providers are more inclined to use Futures contracts. However, these methods do not provide the flexibility and cost management that on-demand methods provide for service users. Cloud secondary markets emerged to meet the needs of both sides of the market: 1) cloud service providers, 2)cloud service users, where brokers and reseller buyers act as intermediaries to provide the demanded services for service users. There is high competition among service providers to attract service users and among service users to find appropriate services, and also there are high fluctuations in environmental parameters, such as price and the volume of supply and demand. These are the reasons that designing an appropriate pricing algorithm and resource allocation mechanism is of great importance. In this paper, we propose a competition-based price scheduling mechanism that considers the inherent competition and fluctuation attributes of such environments. The provided experimental results show that our mechanism is superior to other methods, such as fixed and history-based pricing mechanisms, in terms of utility and resource allocation efficiency.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"17 1","pages":"0174-0181"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85154300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284849
S. Noor, M. Hossain, R. Khan, Ragib Hasan, S. M. Riazul Islam
Cloud computing has become popular in various application domains based on infrastructure, platform, and software as a service model. Rapid deployment, high scalability, on-demand, and (theoretically) infinite resources have driven the industry towards the wide adoption of cloud computing services. However, the difficulty of cross-provider resource allocation and seamless resource transition is a major concern for such services. Therefore, the segregated cloud market forces its clients to use provider-specific and pre-configured options for their required resources and services. Thus, the overall market, even with the presence of multiple cloud service providers, operates as a direct service from the providers to the clients, and with non-negotiable pricing strategies for the cloud services. In this article, we propose Bepari, a cost-driven model for opaque service platforms for cloud computing. Bepari acts as a negotiation-based approach to deliver composite cross-provider cloud-based services to the end-users. Bepari provides a detailed service-oriented architecture for multiple cloud service providers to provide cross-platform and composite services. Furthermore, Bepari delivers a detailed cost model and comparison between establishing a cloud service vs. an opaque cloud service. Our empirical framework allows a Bepari service provider to analyze the profit model and create a market niche accordingly. Simulation results are provided, which validate the efficiency of a negotiated pricing strategy in terms of maximized resource utilization and profits for cloud service providers and cost reduction for the cloud users.
{"title":"Bepari: A Cost-aware Comprehensive Agent Architecture for Opaque Cloud Services","authors":"S. Noor, M. Hossain, R. Khan, Ragib Hasan, S. M. Riazul Islam","doi":"10.1109/IEMCON51383.2020.9284849","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284849","url":null,"abstract":"Cloud computing has become popular in various application domains based on infrastructure, platform, and software as a service model. Rapid deployment, high scalability, on-demand, and (theoretically) infinite resources have driven the industry towards the wide adoption of cloud computing services. However, the difficulty of cross-provider resource allocation and seamless resource transition is a major concern for such services. Therefore, the segregated cloud market forces its clients to use provider-specific and pre-configured options for their required resources and services. Thus, the overall market, even with the presence of multiple cloud service providers, operates as a direct service from the providers to the clients, and with non-negotiable pricing strategies for the cloud services. In this article, we propose Bepari, a cost-driven model for opaque service platforms for cloud computing. Bepari acts as a negotiation-based approach to deliver composite cross-provider cloud-based services to the end-users. Bepari provides a detailed service-oriented architecture for multiple cloud service providers to provide cross-platform and composite services. Furthermore, Bepari delivers a detailed cost model and comparison between establishing a cloud service vs. an opaque cloud service. Our empirical framework allows a Bepari service provider to analyze the profit model and create a market niche accordingly. Simulation results are provided, which validate the efficiency of a negotiated pricing strategy in terms of maximized resource utilization and profits for cloud service providers and cost reduction for the cloud users.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0108-0115"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86102910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}