scispace - formally typeset
Search or ask a question

Showing papers on "Service provider published in 2013"


Journal ArticleDOI
TL;DR: The authors analyzes value creation and co-creation in service by analytically defining the roles of the customer and the firm, as well as the scope, locus, and nature of value and value creation.
Abstract: Because extant literature on the service logic of marketing is dominated by a metaphorical view of value co-creation, the roles of both service providers and customers remain analytically unspecified, without a theoretically sound foundation for value creation or co-creation. This article analyzes value creation and co-creation in service by analytically defining the roles of the customer and the firm, as well as the scope, locus, and nature of value and value creation. Value creation refers to customers’ creation of value-in-use; co-creation is a function of interaction. Both the firm’s and the customer’s actions can be categorized by spheres (provider, joint, customer), and their interactions are either direct or indirect, leading to different forms of value creation and co-creation. This conceptualization of value creation spheres extends knowledge about how value-in-use emerges and how value creation can be managed; it also emphasizes the pivotal role of direct interactions for value co-creation opportunities.

2,036 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a research agenda for the emerging area of transformative service research, which lies at the intersection of service research and consumer research and focuses on well-being outcomes related to service and services.

672 citations


Journal ArticleDOI
01 Jan 2013
TL;DR: Drawing on the information systems success model and flow theory, this research identified the factors affecting continuance intention of mobile payment and indicated that servicequality is the main factor affecting trust, whereas system quality is themain factor affecting satisfaction.
Abstract: Retaining users and facilitating their continuance usage are crucial for mobile payment service providers. Drawing on the information systems success model and flow theory, this research identified the factors affecting continuance intention of mobile payment. We conducted data analysis with structural equation modeling. The results indicated that service quality is the main factor affecting trust, whereas system quality is the main factor affecting satisfaction. Information quality and service quality affect flow. Trust, flow and satisfaction determine continuance intention of mobile payment. The results imply that service providers need to offer quality system, information and services in order to facilitate users' continuance usage of mobile payment. Highlights? Service quality is the main factor affecting trust. ? System quality is the main factor affecting satisfaction. ? Information quality and service quality affect flow. ? Trust, flow and satisfaction determine continuance usage of mobile payment.

657 citations


Journal ArticleDOI
TL;DR: This article presents the first comprehensive review of social and computer science literature on trust in social networks and discusses recent works addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination.
Abstract: Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes an essential and important element of a successful social network. In this article, we present the first comprehensive review of social and computer science literature on trust in social networks. We first review the existing definitions of trust and define social trust in the context of social networks. We then discuss recent works addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination. Finally, we compare and contrast the literature and identify areas for further research in social trust.

615 citations


Journal ArticleDOI
TL;DR: An SME cloud computing adoption model that was theoretically grounded in the TOE framework was developed, and it was shown that the three contexts of this framework (technological, organisational, and environmental) are connected to each other.
Abstract: – The purpose of this paper is to contribute to a growing body of research on cloud computing, by studying the small to medium‐sized enterprise (SME) adoption process. If SMEs have access to scalable technologies they could potentially deliver products and services that in the past only large enterprises could deliver, flattening the competitive arena., – By adopting the Technological, Organisational and Environmental (TOE) framework as a theoretical base, this qualitative exploratory study used semi‐structured interviews to collect data in 15 different SMEs and service providers in the north east of England. The north east of England was selected as it is a region that aspires to become home to innovative digital firms and most of the companies in the region are SMEs., – The main factors that were identified as playing a significant role in SME adoption of cloud services were: relative advantage, uncertainty, geo‐restriction, compatibility, trialability, size, top management support, prior experience, innovativeness, industry, market scope, supplier efforts and external computing support. In contrast, this study did not find enough evidence that competitive pressure was a significant determinant of cloud computing adoption., – These findings have important implications and great value to the research community, managers and information and communication technologies (ICT) providers, in terms of formulating better strategies for cloud computing adoption. For service providers, using the research model in this study can assist in increasing their understanding of why some SMEs choose to adopt cloud computing services, while seemingly similar ones facing similar market conditions do not. Also, cloud computing providers may need to improve their interaction with SMEs which are involved in the cloud computing experience, in an effort to create a healthy environment for cloud computing adoption, and to remove any vagueness surrounding this type of technology., – This study is an attempt to explore and develop an SME cloud computing adoption model that was theoretically grounded in the TOE framework. By adopting the TOE framework this study has shown that the three contexts of this framework (technological, organisational, and environmental) are connected to each other.

578 citations


Journal ArticleDOI
TL;DR: The goal of this article is to compare the approaches to QoS description in the literature, where several models and metamodels are included, and to analyze where the need for further research and investigation lies.
Abstract: Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, for the acceptance of a service by the user, or for guaranteeing service characteristics in a composition of services, where a service is defined as either a software or a software-support (i.e., infrastructural) service which is available on any type of network or electronic channel. The goal of this article is to compare the approaches to QoS description in the literature, where several models and metamodels are included. consider a large spectrum of models and metamodels to describe service quality, ranging from ontological approaches to define quality measures, metrics, and dimensions, to metamodels enabling the specification of quality-based service requirements and capabilities as well as of SLAs (Service-Level Agreements) and SLA templates for service provisioning. Our survey is performed by inspecting the characteristics of the available approaches to reveal which are the consolidated ones and which are the ones specific to given aspects and to analyze where the need for further research and investigation lies. The approaches here illustrated have been selected based on a systematic review of conference proceedings and journals spanning various research areas in computer science and engineering, including: distributed, information, and telecommunication systems, networks and security, and service-oriented and grid computing.

397 citations


Journal ArticleDOI
TL;DR: A method in which in-browser key translation allows a software-as-a-service application to run with confidentiality from the service provider to survey approaches to protecting data from a cloud infrastructure provider.

381 citations


Proceedings ArticleDOI
14 Apr 2013
TL;DR: This paper addresses the problem of incentive mechanism design for data contributors for participatory sensing applications, and derives a mechanism that optimally solves the problem and is individually rational and incentive-compatible.
Abstract: Participatory sensing has emerged as a novel paradigm for data collection and collective knowledge formation about a state or condition of interest, sometimes linked to a geographic area. In this paper, we address the problem of incentive mechanism design for data contributors for participatory sensing applications. The service provider receives service queries in an area from service requesters and initiates an auction for user participation. Upon request, each user reports its perceived cost per unit of amount of participation, which essentially maps to a requested amount of compensation for participation. The participation cost quantifies the dissatisfaction caused to user due to participation. This cost is considered to be private information for each device, as it strongly depends on various factors inherent to it, such as the energy cost for sensing, data processing and transmission to the closest point of wireless access, the residual battery level, the number of concurrent jobs at the device processor, the required bandwidth to transmit data and the related charges of the mobile network operator, or even the user discomfort due to manual effort to submit data. Hence, participants have strong motive to mis-report their cost, i.e. declare a higher cost that the actual one, so as to obtain higher payment. We seek a mechanism for user participation level determination and payment allocation which is most viable for the provider, that is, it minimizes the total cost of compensating participants, while delivering a certain quality of experience to service requesters. We cast the problem in the context of optimal reverse auction design, and we show how the different quality of submitted information by participants can be tracked by the service provider and used in the participation level and payment selection procedures. We derive a mechanism that optimally solves the problem above, and at the same time it is individually rational (i.e., it motivates users to participate) and incentive-compatible (i.e. it motivates truthful cost reporting by participants). Finally, a representative participatory sensing case study involving parameter estimation is presented, which exemplifies the incentive mechanism above.

330 citations


Patent
05 Mar 2013
TL;DR: Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser, are discussed in this paper.
Abstract: Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service promoter may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service promoter may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber. However, in the case of the mobile subscriber requesting emergency help, the service promoter may not block identity and/or location information. Instead, the service promoter may send all such information to the emergency service provider (e.g., the police or a hospital).

325 citations


Proceedings Article
01 Jan 2013
TL;DR: AGILE uses wavelets to provide a medium-term resource demand prediction with enough lead time to start up new application server instances before performance falls short, and it uses dynamic VM cloning to reduce application startup times.
Abstract: Dynamically adjusting the number of virtual machines (VMs) assigned to a cloud application to keep up with load changes and interference from other uses typically requires detailed application knowledge and an ability to know the future, neither of which are readily available to infrastructure service providers or application owners. The result is that systems need to be over-provisioned (costly), or risk missing their performance Service Level Objectives (SLOs) and have to pay penalties (also costly). AGILE deals with both issues: it uses wavelets to provide a medium-term resource demand prediction with enough lead time to start up new application server instances before performance falls short, and it uses dynamic VM cloning to reduce application startup times. Tests using RUBiS and Google cluster traces show that AGILE can predict varying resource demands over the medium-term with up to 3.42× better true positive rate and 0.34× the false positive rate than existing schemes. Given a target SLO violation rate, AGILE can efficiently handle dynamic application workloads, reducing both penalties and user dissatisfaction.

267 citations


Journal ArticleDOI
TL;DR: In this article, the authors introduce the concept of the service delivery network (SDN) defined as two or more organizations that, in the eyes of the customer, are responsible for the provision of a connected overall service experience.
Abstract: In this article, we introduce the concept of the service delivery network (SDN) defined as two or more organizations that, in the eyes of the customer, are responsible for the provision of a connected overall service experience. This responds to calls for frameworks recognizing that dyadic service encounters are embedded in the series of experiences customers have with complementary providers as part of the journey to achieve their desired goals. Adopting an SDN perspective presents a dramatically different set of challenges for managers and provides research opportunities challenging the current view of established service concepts. Managers must recognize that to better serve the customer they need to understand the role that they play in the customer-defined service journey and be prepared to coordinate their activities with complementary providers. Participating in helping build and manage the SDN for the customer, or understanding how they fit into customer’s self-designed SDN, becomes a central chal...

Journal ArticleDOI
TL;DR: In this paper, a model on the broaden-and-build theory of positive emotions is used to empirically assess how situation-specific emotions and customer participation during a health care service experience affect perceptions of the service provider.
Abstract: Many service interactions require customers to actively participate, yet customers often do not participate at levels that optimize their outcomes, particularly in health care. To gain insight into how customers shape a service experience with highly uncertain outcomes, we construct a model on the broaden-and-build theory of positive emotions. The model is used to empirically assess how situation-specific emotions and customer participation during a health care service experience affect perceptions of the service provider. The model is tested using data from 190 medical clinic customers. Consistent with theory, results reveal that as customers’ relative affect levels become more positive, levels of participation increase as well. In turn, higher levels of positivity and participation improve customer perceptions of the quality of the service provider and satisfaction with the co-produced service experience. Implications of this research focus managers on designing services to help clients manage their emotions in ways that facilitate positivity and participation and thus improve service perceptions.

Patent
06 Mar 2013
TL;DR: A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services as mentioned in this paper.
Abstract: A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.

Journal ArticleDOI
TL;DR: This survey reviews some of the well-known past broadband pricing proposals (both static and dynamic), including their current realizations in various consumer data plans around the world, and discusses several research problems and open questions.
Abstract: Traditionally, network operators have used simple flat-rate broadband data plans for both wired and wireless network access. But today, with the popularity of mobile devices and exponential growth of apps, videos, and clouds, service providers are gradually moving toward more sophisticated pricing schemes. This decade will therefore likely witness a major change in the ways in which network resources are managed, and the role of economics in allocating these resources. This survey reviews some of the well-known past broadband pricing proposals (both static and dynamic), including their current realizations in various consumer data plans around the world, and discusses several research problems and open questions. By exploring the benefits and challenges of pricing data, this article attempts to facilitate both the industrial and the academic communities' efforts in understanding the existing literature, recognizing new trends, and shaping an appropriate and timely research agenda.

Journal ArticleDOI
TL;DR: This work focuses on comparing many employed and proposed pricing models techniques and highlights the pros and cons of each, and finds that most approaches are theoretical and not implemented in the real market, although their simulation results are very promising.
Abstract: Cloud computing is emerging as a promising field offering a variety of computing services to end users. These services are offered at different prices using various pricing schemes and techniques. End users will favor the service provider offering the best QoS with the lowest price. Therefore, applying a fair pricing model will attract more customers and achieve higher revenues for service providers. This work focuses on comparing many employed and proposed pricing models techniques and highlights the pros and cons of each. The comparison is based on many aspects such as fairness, pricing approach, and utilization period. Such an approach provides a solid ground for designing better models in the future. We have found that most approaches are theoretical and not implemented in the real market, although their simulation results are very promising. Moreover, most of these approaches are biased toward the service provider.

Patent
22 Jul 2013
TL;DR: Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser, are discussed in this article.
Abstract: Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service promoter may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service promoter may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber. However, in the case of the mobile subscriber requesting emergency help, the service promoter may not block identity and/or location information. Instead, the service promoter may send all such information to the emergency service provider (e.g., the police or a hospital).

Journal ArticleDOI
TL;DR: In this paper, an empirical study on the adoption of environmental initiatives in the contract logistics industry, along with the metrics used for environmental performance measurement and the barriers and drivers that may hinder or facilitate the adoption, is presented.

Patent
27 Sep 2013
TL;DR: In this article, the authors proposed a system information (SI) broadcast from a radio access network (RAN) node to indicate that an operator of the RAN node supports service-based network access.
Abstract: Systems, methods, and instrumentalities are disclosed such that a WTRU may obtain network operator agnostic wireless access for a service. The WTRU may receive a system information (SI) broadcast from a radio access network (RAN) node. The SI broadcast may indicate that an operator of the RAN node supports service-based network access. The WTRU may send a service request to a virtual service provider to request the service. The WTRU may receive a service response from the virtual service provider. The WTRU may receive a service response from the virtual service provider, the service response indicating a mobile network operator (MNO) to use for obtaining the service and subscription information for accessing the MNO, wherein the MNO is different than the operator of the RAN node. The WTRU may access the MNO to obtain the service.

Journal ArticleDOI
TL;DR: How refugees learn to engage with a complex, multimodal information landscape and how their information literacy practice may be constructed to enable them to connect and be included in their new information landscape is understood.
Abstract: Purpose – The purpose of the research reported in this article is to understand how refugees learn to engage with a complex, multimodal information landscape and how their information literacy practice may be constructed to enable them to connect and be included in their new information landscape. Design/methodology/approach – The study is framed through practice and socio‐cultural theories. A qualitative research design is employed including semi‐structured face‐to‐face interviews and focus groups which are thematically analysed through an information practice lens. Findings – Refugees encounter complex and challenging information landscapes that present barriers to their full participation in their new communities. Social inclusion becomes possible where information is provided via sharing through trusted mediators who assist with navigating the information landscape and information mapping, and through visual and social sources. Research limitations/implications – The study is local and situated and therefore not empirically generalizable. It does however provide rich, deep description and explanation that is instructive beyond the specific research site and contributes to theory building. Practical implications – The study highlights the role, and importance, of social and visual information sources and the key role of service providers as mediators and navigators. Governments, funders and service providers can use these findings to inform their service provision. Originality/value – This is an original research paper in which the results provide practical advice for those working with refugees and which also extends theories of information literacy practice as an information practice.

Proceedings ArticleDOI
04 Feb 2013
TL;DR: This paper builds predictive models for user decisions in Twitter by proposing Co-Factorization Machines (CoFM), an extension of a state-of-the-art recommendation model, to handle multiple aspects of the dataset at the same time, and concludes that CoFM with ranking-based loss functions is superior to state of theart methods and yields interpretable latent factors.
Abstract: Users of popular services like Twitter and Facebook are often simultaneously overwhelmed with the amount of information delivered via their social connections and miss out on much content that they might have liked to see, even though it was distributed outside of their social circle. Both issues serve as difficulties to the users and drawbacks to the services.Social media service providers can benefit from understanding user interests and how they interact with the service, potentially predicting their behaviors in the future. In this paper, we address the problem of simultaneously predicting user decisions and modeling users' interests in social media by analyzing rich information gathered from Twitter. The task differs from conventional recommender systems as the cold-start problem is ubiquitous, and rich features, including textual content, need to be considered. We build predictive models for user decisions in Twitter by proposing Co-Factorization Machines (CoFM), an extension of a state-of-the-art recommendation model, to handle multiple aspects of the dataset at the same time. Additionally, we discuss and compare ranking-based loss functions in the context of recommender systems, providing the first view of how they vary from each other and perform in real tasks. We explore an extensive set of features and conduct experiments on a real-world dataset, concluding that CoFM with ranking-based loss functions is superior to state-of-the-art methods and yields interpretable latent factors.

Journal ArticleDOI
TL;DR: This paper proposes a framework for resource allocation to the mobile applications, and revenue management and cooperation formation among service providers, and applies the concepts of core and Shapley value from cooperative game theory as a solution.
Abstract: Mobile cloud computing is an emerging technology to improve the quality of mobile services. In this paper, we consider the resource (i.e., radio and computing resources) sharing problem to support mobile applications in a mobile cloud computing environment. In such an environment, mobile cloud service providers can cooperate (i.e., form a coalition) to create a resource pool to share their own resources with each other. As a result, the resources can be better utilized and the revenue of the mobile cloud service providers can be increased. To maximize the benefit of the mobile cloud service providers, we propose a framework for resource allocation to the mobile applications, and revenue management and cooperation formation among service providers. For resource allocation to the mobile applications, we formulate and solve optimization models to obtain the optimal number of application instances that can be supported to maximize the revenue of the service providers while meeting the resource requirements of the mobile applications. For sharing the revenue generated from the resource pool (i.e., revenue management) among the cooperative mobile cloud service providers in a coalition, we apply the concepts of core and Shapley value from cooperative game theory as a solution. Based on the revenue shares, the mobile cloud service providers can decide whether to cooperate and share the resources in the resource pool or not. Also, the provider can optimize the decision on the amount of resources to contribute to the resource pool.

Journal ArticleDOI
TL;DR: According to the findings, as interpersonal-based medical service encounters will positively influence service quality and patient satisfaction, and the differences for patients’ perceptions of the professional skill and communication attitude of personnel in these encounters will influence patients‘ overall satisfaction, this study attempts to bridge the research gap in existing literature on the correlation between service quality, patient trust, and satisfaction.
Abstract: Interaction between service provider and customer is the primary core of service businesses of different natures, and the influence of trust on service quality and customer satisfaction could not be ignored in interpersonal-based service encounters. However, lack of existing literature on the correlation between service quality, patient trust, and satisfaction from the prospect of interpersonal-based medical service encounters has created a research gap in previous studies. Therefore, this study attempts to bridge such a gap with an evidence-based practice study. We adopted a cross-sectional design using a questionnaire survey of outpatients in seven medical centers of Taiwan. Three hundred and fifty copies of questionnaire were distributed, and 285 valid copies were retrieved, with a valid response rate of 81.43%. The SPSS 14.0 and AMOS 14.0 (structural equation modeling) statistical software packages were used for analysis. Structural equation modeling clarifies the extent of relationships between variables as well as the chain of cause and effect. Restated, SEM results do not merely show empirical relationships between variables when defining the practical situation. For this reason, SEM was used to test the hypotheses. Perception of interpersonal-based medical service encounters positively influences service quality and patient satisfaction. Perception of service quality among patients positively influences their trust. Perception of trust among patients positively influences their satisfaction. According to the findings, as interpersonal-based medical service encounters will positively influence service quality and patient satisfaction, and the differences for patients’ perceptions of the professional skill and communication attitude of personnel in interpersonal-based medical service encounters will influence patients’ overall satisfaction in two ways: (A) interpersonal-based medical service encounter directly affects patient satisfaction, which represents a direct effect; and (B) service quality and patient trust are used as intervening variables to affect patient satisfaction, which represents an indirect effect. Due to differences in the scale, resources and costs among medical institutions of different levels, it is a most urgent and concerning issue of how to control customers’ demands and preferences and adopt correct marketing concepts under the circumstances of intense competition in order to satisfy the public and build up a competitive edge for medical institutions.


Journal ArticleDOI
TL;DR: This work constructs and empirically test a research model that depicts a comprehensive collection of web-enabled service content functions and delivery dimensions desirable by citizens and delineates e-government service quality into aspects of IT-mediated service content and service delivery.
Abstract: Despite extensive deliberations in contemporary literature, the design of citizen-centric e-government websites remains an unresolved theoretical and pragmatic conundrum. Operationalizing e-government service quality to investigate and improve the design of e-government websites has been a much sought-after objective. Yet, there is a lack of actionable guidance on how to develop e-government websites that exhibit high levels of service quality. Drawing from marketing literature, we undertake a goal approach to this problem by delineating e-government service quality into aspects of IT-mediated service content and service delivery. Whereas service content describes the functions available on an e-government website that assist citizens in completing their transactional goals, service delivery defines the manner by which these functions are made accessible via the web interface as a delivery channel. We construct and empirically test a research model that depicts a comprehensive collection of web-enabled service content functions and delivery dimensions desirable by citizens. Empirical findings from an online survey of 647 respondents attest to the value of distinguishing between service content functions and delivery dimensions in designing e-government websites. Both service content and delivery are found to be significant contributors to achieving e-government service quality. These IT-mediated service content functions and delivery dimensions represent core areas of e-government website design where the application of technology makes a difference, especially when considered in tandem with the type of transactional activity. A split sample analysis of the data further demonstrates our model's robustness when applied to e-government transactions of varying frequency.

Journal ArticleDOI
TL;DR: By determining the data remnants on client devices, research contributes to a better understanding of the types of terrestrial artifacts that are likely to remain for digital forensics practitioners and examiners.

Journal ArticleDOI
TL;DR: The definition of customer satisfaction in economics is referred to and a formula for measuringCustomer satisfaction in cloud computing is developed and an analysis is given in detail on how the customer satisfaction affects the profit.
Abstract: As cloud computing becomes more and more popular, understanding the economics of cloud computing becomes critically important. To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multiserver system. The problem of optimal multiserver configuration for profit maximization in a cloud computing environment is studied. Our pricing model takes such factors into considerations as the amount of a service, the workload of an application environment, the configuration of a multiserver system, the service-level agreement, the satisfaction of a consumer, the quality of a service, the penalty of a low-quality service, the cost of renting, the cost of energy consumption, and a service provider's margin and profit. Our approach is to treat a multiserver system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. Two server speed and power consumption models are considered, namely, the idle-speed model and the constant-speed model. The probability density function of the waiting time of a newly arrived service request is derived. The expected service charge to a service request is calculated. The expected net business gain in one unit of time is obtained. Numerical calculations of the optimal server size and the optimal server speed are demonstrated.

Journal ArticleDOI
TL;DR: PolyViNE is presented, a policy-based inter-domain VN embedding framework that embeds end-to-end VNs in a decentralized manner and outlines scalability and performance characteristics of PolyViNE through quantitative and qualitative evaluations.
Abstract: Intra-domain virtual network embedding is a well-studied problem in the network virtualization literature. For most practical purposes, however, virtual networks (VNs) must be provisioned across heterogeneous administrative domains managed by multiple infrastructure providers (InPs). In this paper, we present PolyViNE, a policy-based inter-domain VN embedding framework that embeds end-to-end VNs in a decentralized manner. PolyViNE introduces a distributed protocol that coordinates the VN embedding process across participating InPs and ensures competitive prices for service providers (SPs), i.e., VN owners, while providing monetary incentives for InPs to participate in the process even under heavy competition. We also present a location-aware VN request forwarding mechanism – basd on a hierarchical addressing scheme (COST) and a location awareness protocol (LAP) – to allow faster embedding. We outline scalability and performance characteristics of PolyViNE through quantitative and qualitative evaluations.

Journal ArticleDOI
TL;DR: The risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed and some suggestions for health care providers are made to protect the confidentiality of patient information and facilitate the process.
Abstract: Background: The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients’ medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. Objective: To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. Methods: To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers.

Journal ArticleDOI
TL;DR: This paper model the service provisioning problem as a generalized Nash game and shows the existence of equilibria for such game, and proposes and proves two solution methods based on the best-reply dynamics that can improve the efficiency of the cloud system evaluated in terms of Price of Anarchy.
Abstract: In recent years, the evolution and the widespread adoption of virtualization, service-oriented architectures, autonomic, and utility computing have converged letting a new paradigm to emerge: cloud computing. Clouds allow the on-demand delivering of software, hardware, and data as services. Currently, the cloud offer is becoming wider day by day because all the major IT companies and service providers, like Microsoft, Google, Amazon, HP, IBM, and VMWare, have started providing solutions involving this new technological paradigm. As cloud-based services are more numerous and dynamic, the development of efficient service provisioning policies becomes increasingly challenging. In this paper, we take the perspective of Software as a Service (SaaS) providers that host their applications at an Infrastructure as a Service (IaaS) provider. Each SaaS needs to comply with quality-of-service requirements, specified in service-level agreement (SLA) contracts with the end users, which determine the revenues and penalties on the basis of the achieved performance level. SaaS providers want to maximize their revenues from SLAs, while minimizing the cost of use of resources supplied by the IaaS provider. Moreover, SaaS providers compete and bid for the use of infrastructural resources. On the other hand, the IaaS wants to maximize the revenues obtained providing virtualized resources. In this paper, we model the service provisioning problem as a generalized Nash game and we show the existence of equilibria for such game. Moreover, we propose two solution methods based on the best-reply dynamics, and we prove their convergence in a finite number of iterations to a generalized Nash equilibrium. In particular, we develop an efficient distributed algorithm for the runtime allocation of IaaS resources among competing SaaS providers. We demonstrate the effectiveness of our approach by simulation and performing tests on a real prototype environment deployed on Amazon EC2. Results show that, compared to other state-of-the-art solutions, our model can improve the efficiency of the cloud system evaluated in terms of Price of Anarchy by 50-70 percent.

Journal ArticleDOI
TL;DR: External and internal factors that affect the performance of resource allocation models are introduced in this article and design challenges are discussed with the aim of providing a reference to be used when designing a comprehensive energy-aware resource allocation model for cloud computing data centers.
Abstract: Cloud computing is a utility computing paradigm that has become a solid base for a wide array of enterprise and end-user applications Providers offer varying service portfolios that differ in resource configurations and provided services A comprehensive solution for resource allocation is fundamental to any cloud computing service provider Any resource allocation model has to consider computational resources as well as network resources to accurately reflect practical demands Another aspect that should be considered while provisioning resources is energy consumption This aspect is getting more attention from industrial and government parties Calls for the support of green clouds are gaining momentum With that in mind, resource allocation algorithms aim to accomplish the task of scheduling virtual machines on the servers residing in data centers and consequently scheduling network resources while complying with the problem constraints Several external and internal factors that affect the performance of resource allocation models are introduced in this article These factors are discussed in detail, and research gaps are pointed out Design challenges are discussed with the aim of providing a reference to be used when designing a comprehensive energy-aware resource allocation model for cloud computing data centers