scispace - formally typeset
Book ChapterDOI

Service Insurance: A New Approach in Cloud Brokerage

Reads0
Chats0
TLDR
A novel methodology termed as service insurances is proposed, which is incorporated into the service broker as a new module and is expected to ensure customer’s satisfaction in context of a business application domain.
Abstract
In cloud service domain, an acceptable standard of quality of service (QoS) must be maintained for subscribed services. The performance measurement of those cloud services is based on the satisfaction of customers with respect to the pre-defined QoS. Deviation of QoS as mentioned in SLA results dissatisfaction among users. A large numbers of business entities and consumers are involved in this service delivery process. In business environment, guaranteeing the QoS and establishing the service contracts are essential. However, for the service providers, it is challenging to maintain the QoS at run-time. Moreover, even if it is maintained, additional cost may be needed. Sometime a categorization among the consumers (premium or ordinary) is also required due to the limitation of the resources. Thus, the service management for ensuring the delivery with desired QoS at least for the premium consumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.

read more

Citations
More filters
Journal ArticleDOI

Cloud service selection using cloud service brokers: approaches and challenges

TL;DR: This paper reviews the recent approaches that have been introduced and used for cloud service brokerage and proposes a set of attributes for a CSB to be considered effective, which have wider application in cloud computing environments.
Book ChapterDOI

Service Provisioning in Cloud: A Systematic Survey

TL;DR: In this article, an attempt has been made for analyzing the service provisioning techniques from different perspectives, including various techniques and methodologies, QoS parameter considered, context awareness, etc.
Journal ArticleDOI

Insurance for Improving User Satisfaction Level

TL;DR: A novel approach is proposed for providing insurance coverage for such root events by limiting insurance provisions to the users with the highest priority, and a criterion is presented for priority assignment to users, and an algorithm is proposed to provide insurance according to this priority.
References
More filters
Proceedings Article

Copysets: reducing the frequency of data loss in cloud storage

TL;DR: Copyset Replication is presented, a novel general-purpose replication technique that significantly reduces the frequency of data loss events and presents a near optimal tradeoff between the number of nodes on which the data is scattered and the probability ofData loss.
Proceedings ArticleDOI

An integrated approach to resource pool management: Policies, efficiency and quality metrics

TL;DR: The integrated controller approach outperforms the use of either controller separately for the enterprise application workloads in this study and shows the influence of the blade and server pool infrastructures on the effectiveness of the management policies.

Security issues in cloud computing and countermeasures

Danish Jamil, +1 more
TL;DR: This paper introduces four cloud security problems, which are XML Signature Element Wrapping, Browser Security, Cloud Malware Injection Attack and Flooding Attacks, and also gives the possible countermeasures.

Cloud computing vulnerability incidents: a statistical overview

TL;DR: In an attempt to ascertain Cloud Computing reliability, 11,491 news articles on cloud computing-related outages from 39 news sources between Jan 2008 and Feb 2012 – effectively covering the first five years of cloud computing - were reviewed.
Proceedings ArticleDOI

Social engineering attack detection model: SEADM

TL;DR: A model is proposed which can be used by call centre employees to detect social engineering attacks in a call centre environment and is a quick and effective way to determine if the requester is trying to manipulate an individual into disclosing information to which the requesters does not have authorization for.