scispace - formally typeset
Search or ask a question
Book ChapterDOI

Service Provisioning in Cloud: A Systematic Survey

01 Jan 2017-Advances in intelligent systems and computing (Springer, Singapore)-Vol. 568, pp 37-63
TL;DR: In this article, an attempt has been made for analyzing the service provisioning techniques from different perspectives, including various techniques and methodologies, QoS parameter considered, context awareness, etc.
Abstract: Cloud Computing is all about delivering services over the Internet. It has some technical, business and economical aspects. The complexity of service provisioning has increased significantly with the increasing number of cloud services and their providers. This creates a complex situation and as a result the service provisioning techniques face hurdles. The challenge of service provisioning is to properly offer services by adjusting the complexities efficiently. There are significant works to solve the problem in different manners. But still there are some gaps that are to be noticed and bridged for future advancement of cloud technology research. In this paper an attempt has been made for analyzing the service provisioning techniques from different perspectives. The said perspectives are various techniques and methodologies, QoS parameter considered, context awareness, etc. Moreover, the role of a broker in this context is also addressed. The overall motivation is to identify the open challenges, that may provide a future research direction in context of service provisioning.
Citations
More filters
01 Jan 2010
TL;DR: In this article, the authors proposed an identity federation broker that introduces a trusted third party as a trust broker to simplify the management of identity federation in a user centric manner, which can reduce the cost and risk of federated identity management for both enterprises and service providers.
Abstract: As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. For service providers, typical pairwise identity federation solutions are not scalable to support single sign-on, service composition, etc. among services for large environment like service cloud. This paper proposes an identity federation broker that introduces a trusted third party as a trust broker to simplify the management of identity federation in a user centric manner. With this solution, the cost and risk of federated identity management for both enterprises and service providers could be significantly reduced. A detailed scenario implementation is given to demonstrate the feasibility of the solution. Moreover, the vulnerability analysis shows how the solution can resist the typical security attacks.

32 citations

Journal ArticleDOI
22 May 2020
TL;DR: This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security, and open research issues are provided for future research development.
Abstract: In recent years, cloud computing is an emergent field in the Internet era. There is rapid development in high-performance computing and technology extended from grid computing to cloud computing to provide computing resources on pay per basis. Cloud service providers developed applications for users to easily access cloud services with quality of service (QoS) because cloud application plays an important role in service delivery of cloud organization. This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security. Finally, open research issues are provided for future research development.

11 citations

Posted Content
TL;DR: In this article, a comprehensive 3-tier search strategy (manual search, backward snowballing, and database search) was used to identify the most important and hottest topics in the field of cloud broker, identifying existing trends and issues, identifying active researchers and countries in the cloud broker field, a variety of commonly used techniques in building cloud brokers, variety of evaluation methods, the amount of research conducted in this field by year and place of publication and the identification of the most relevant active search spaces.
Abstract: The current systematic review includes a comprehensive 3-tier strategy (manual search, backward snowballing, and database search). The accuracy of the search methodology has been analyzed in terms of extracting related studies and collecting comprehensive and complete information in a supplementary file. In the search methodology, qualitative criteria have been defined to select studies with the highest quality and the most relevant among all search spaces. Also, some queries have been created using important keywords in the field under study in order to find studies related to the field of the cloud broker. Out of 1928 extracted search spaces, 171 search spaces have been selected based on defined quality criteria. Then, 1298 studies have been extracted from the selected search spaces and have been selected 496 high-quality papers published in prestigious journals, conferences, and workshops that the advent of them have been from 2009 until the end of 2019. In Systematic Mapping Study (SMS), 8 research questions have been designed to achieve goals such as identifying the most important and hottest topics in the field of cloud broker, identifying existing trends and issues, identifying active researchers and countries in the cloud broker field, a variety of commonly used techniques in building cloud brokers, variety of evaluation methods, the amount of research conducted in this field by year and place of publication and the identification of the most important active search spaces.

1 citations

References
More filters
Proceedings ArticleDOI
27 Sep 1999
TL;DR: Some of the research challenges in understanding context and in developing context-aware applications are discussed, which are increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly.
Abstract: When humans talk with humans, they are able to use implicit situational information, or context, to increase the conversational bandwidth. Unfortunately, this ability to convey ideas does not transfer well to humans interacting with computers. In traditional interactive computing, users have an impoverished mechanism for providing input to computers. By improving the computer’s access to context, we increase the richness of communication in human-computer interaction and make it possible to produce more useful computational services. The use of context is increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly. In this panel, we want to discuss some of the research challenges in understanding context and in developing context-aware applications.

4,842 citations

Proceedings ArticleDOI
15 Jun 2010
TL;DR: MAUI supports fine-grained code offload to maximize energy savings with minimal burden on the programmer, and decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device's current connectivity constrains.
Abstract: This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migration. MAUI uses the benefits of a managed code environment to offer the best of both worlds: it supports fine-grained code offload to maximize energy savings with minimal burden on the programmer. MAUI decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device's current connectivity constrains. In our evaluation, we show that MAUI enables: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application that doubles its refresh rate, and 3) a voice-based language translation application that bypasses the limitations of the smartphone environment by executing unsupported components remotely.

2,530 citations

Journal ArticleDOI
TL;DR: Everyday computing is proposed, a new area of applications research, focussed on scaling interaction with respect to time, just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers.
Abstract: The proliferation of computing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggest new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, application-driven research on abiquitous computing (ubicomp) has pushed three interaction themes:natural interfaces, context-aware applications,andautomated capture and access. To chart a course for future research in ubiquitous computing, we review the accomplishments of these efforts and point to remaining research challenges. Research in ubiquitious computing implicitly requires addressing some notion of scale, whether in the number and type of devices, the physical space of distributed computing, or the number of people using a system. We posit a new area of applications research, everyday computing, focussed on scaling interaction with respect to time. Just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers, providing continuous interaction moves computing from a localized tool to a constant companion. Designing for continous interaction requires addressing interruption and reumption of intreaction, representing passages of time and providing associative storage models. Inherent in all of these interaction themes are difficult issues in the social implications of ubiquitous computing and the challenges of evaluating> ubiquitious computing research. Although cumulative experience points to lessons in privacy, security, visibility, and control, there are no simple guidelines for steering research efforts. Akin to any efforts involving new technologies, evaluation strategies form a spectrum from technology feasibility efforts to long-term use studies—but a user-centric perspective is always possible and necessary

1,541 citations

07 Sep 2004
TL;DR: This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing, reviewed, classified relative to their core elements and evaluated with respect to their appropriateness.
Abstract: Context-awareness is one of the drivers of the ubiquitous computing paradigm, whereas a well designed model is a key accessor to the context in any context-aware system This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing Numerous approaches are reviewed, classified relative to their core elements and evaluated with respect to their appropriateness for ubiquitous computing

1,310 citations