Book ChapterDOI
Service Insurance: A New Approach in Cloud Brokerage
Adrija Bhattacharya,Sankhayan Choudhury +1 more
- pp 39-52
Reads0
Chats0
TLDR
A novel methodology termed as service insurances is proposed, which is incorporated into the service broker as a new module and is expected to ensure customer’s satisfaction in context of a business application domain.Abstract:
In cloud service domain, an acceptable standard of quality of service (QoS) must be maintained for subscribed services. The performance measurement of those cloud services is based on the satisfaction of customers with respect to the pre-defined QoS. Deviation of QoS as mentioned in SLA results dissatisfaction among users. A large numbers of business entities and consumers are involved in this service delivery process. In business environment, guaranteeing the QoS and establishing the service contracts are essential. However, for the service providers, it is challenging to maintain the QoS at run-time. Moreover, even if it is maintained, additional cost may be needed. Sometime a categorization among the consumers (premium or ordinary) is also required due to the limitation of the resources. Thus, the service management for ensuring the delivery with desired QoS at least for the premium consumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.read more
Citations
More filters
Journal ArticleDOI
Cloud service selection using cloud service brokers: approaches and challenges
TL;DR: This paper reviews the recent approaches that have been introduced and used for cloud service brokerage and proposes a set of attributes for a CSB to be considered effective, which have wider application in cloud computing environments.
Book ChapterDOI
Service Provisioning in Cloud: A Systematic Survey
TL;DR: In this article, an attempt has been made for analyzing the service provisioning techniques from different perspectives, including various techniques and methodologies, QoS parameter considered, context awareness, etc.
Journal ArticleDOI
Insurance for Improving User Satisfaction Level
TL;DR: A novel approach is proposed for providing insurance coverage for such root events by limiting insurance provisions to the users with the highest priority, and a criterion is presented for priority assignment to users, and an algorithm is proposed to provide insurance according to this priority.
References
More filters
Proceedings Article
Copysets: reducing the frequency of data loss in cloud storage
TL;DR: Copyset Replication is presented, a novel general-purpose replication technique that significantly reduces the frequency of data loss events and presents a near optimal tradeoff between the number of nodes on which the data is scattered and the probability ofData loss.
Proceedings ArticleDOI
An integrated approach to resource pool management: Policies, efficiency and quality metrics
TL;DR: The integrated controller approach outperforms the use of either controller separately for the enterprise application workloads in this study and shows the influence of the blade and server pool infrastructures on the effectiveness of the management policies.
Security issues in cloud computing and countermeasures
Danish Jamil,Hassan Zaki +1 more
TL;DR: This paper introduces four cloud security problems, which are XML Signature Element Wrapping, Browser Security, Cloud Malware Injection Attack and Flooding Attacks, and also gives the possible countermeasures.
Cloud computing vulnerability incidents: a statistical overview
TL;DR: In an attempt to ascertain Cloud Computing reliability, 11,491 news articles on cloud computing-related outages from 39 news sources between Jan 2008 and Feb 2012 – effectively covering the first five years of cloud computing - were reviewed.
Proceedings ArticleDOI
Social engineering attack detection model: SEADM
TL;DR: A model is proposed which can be used by call centre employees to detect social engineering attacks in a call centre environment and is a quick and effective way to determine if the requester is trying to manipulate an individual into disclosing information to which the requesters does not have authorization for.