scispace - formally typeset
Search or ask a question

Showing papers on "Service provider published in 2018"


Journal ArticleDOI
TL;DR: A process model is inductively derived that aims to describe and explain how SME entrepreneurs, with support from the digital platform service provider, drive digital transformation through managerial cognition renewal, managerial social capital development, business team building, and organizational capability building.
Abstract: This research investigates how entrepreneurs of small and medium enterprises (SMEs) with inadequate capabilities and limited resources drove digital transformation in their companies, a phenomenon that remains under-researched in the extant literature. We conduct qualitative research on digital transformation to cross-border e-commerce undergone by 7 SMEs on the Alibaba digital platform. We inductively derive a process model that aims to describe and explain how SME entrepreneurs, with support from the digital platform service provider, drive digital transformation through managerial cognition renewal, managerial social capital development, business team building, and organizational capability building. This model expands our understanding of both digital entrepreneurship and digital transformation. It also presents new insights into how digital platform service providers can help SMEs transform and compete.

515 citations


Journal ArticleDOI
TL;DR: A cloud resource allocation model based on an imperfect information Stackelberg game (CSAM-IISG) using a hidden Markov model (HMM) in a cloud computing environment was shown to increase the profits of service providers and infrastructure suppliers simultaneously.
Abstract: Existing static grid resource scheduling algorithms, which are limited to minimizing the makespan, cannot meet the needs of resource scheduling required by cloud computing. Current cloud infrastructure solutions provide operational support at the level of resource infrastructure only. When hardware resources form the virtual resource pool, virtual machines are deployed for use transparently. Considering the competing characteristics of multi-tenant environments in cloud computing, this paper proposes a cloud resource allocation model based on an imperfect information Stackelberg game (CSAM-IISG) using a hidden Markov model (HMM) in a cloud computing environment. CSAM-IISG was shown to increase the profit of both the resource supplier and the applicant. Firstly, we used the HMM to predict the service provider's current bid using the historical resources based on demand. Through predicting the bid dynamically, an imperfect information Stackelberg game (IISG) was established. The IISG motivates service providers to choose the optimal bidding strategy according to the overall utility, achieving maximum profits. Based on the unit prices of different types of resources, a resource allocation model is proposed to guarantee optimal gains for the infrastructure supplier. The proposed resource allocation model can support synchronous allocation for both multi-service providers and various resources. The simulation results demonstrated that the predicted price was close to the actual transaction price, which was lower than the actual value in the game model. The proposed model was shown to increase the profits of service providers and infrastructure suppliers simultaneously.

311 citations


Journal ArticleDOI
TL;DR: In this article, the authors examine how two defining features of an on-demand service platform can be used to connect waiting-time-sensitive customers with independent service providers (agents).
Abstract: An on-demand service platform connects waiting-time-sensitive customers with independent service providers (agents). This paper examines how two defining features of an on-demand service platform—d...

278 citations


Journal ArticleDOI
TL;DR: A novel definition of Smart PSS is provided, and a systematic design framework for its service innovation is proposed with an elaborated case study of a personalized smart wearable.

277 citations


Journal ArticleDOI
TL;DR: A permissioned blockchain framework among the various elements involved to manage the collected vehicle-related data enables trustless, traceable, and privacy-aware post-accident analysis with minimal storage and processing overhead.
Abstract: Today's vehicles are becoming cyber-physical systems that not only communicate with other vehicles but also gather various information from hundreds of sensors within them These developments help create smart and connected (eg, self-driving) vehicles that will introduce significant information to drivers, manufacturers, insurance companies, and maintenance service providers for various applications One such application that is becoming crucial with the introduction of self-driving cars is forensic analysis of traffic accidents The utilization of vehicle-related data can be instrumental in post-accident scenarios to discover the faulty party, particularly for self-driving vehicles With the opportunity of being able to access various information in cars, we propose a permissioned blockchain framework among the various elements involved to manage the collected vehicle-related data Specifically, we first integrate vehicular public key infrastructure (VPKI) to the proposed blockchain to provide membership establishment and privacy Next, we design a fragmented ledger that will store detailed data related to vehicles such as maintenance information/ history, car diagnosis reports, and so on The proposed forensic framework enables trustless, traceable, and privacy-aware post-accident analysis with minimal storage and processing overhead

238 citations


Journal ArticleDOI
TL;DR: Results show that the proposed methodology can bring more advantages to CMfg than the security and scalability, as well as the qualitative and quantitative methods are utilized.
Abstract: New emerging manufacturing paradigms such as cloud manufacturing, IoT enabled manufacturing and service-oriented manufacturing, have brought many advantages to the manufacturing industry and metamorphosis the industrial IT infrastructure. However, all existing paradigms still suffer from the main problem related to centralized industrial network and third part trust operation. In a nutshell, centralized networking has had issues with flexibility, efficiency, availability, and security. Therefore, the main aim of this paper is to present a distributed peer to peer network architecture that improves the security and scalability of the CMfg. The proposed architecture was developed based on blockchain technology, this facilitated the development of a distributed peer to peer network with high security, scalability and a well-structured cloud system. The proposed architecture which was named as the “BCmfg” is made up of five layers namely; resource layer, perception layer, manufacturing layer, infrastructure layer and application layer. In this paper, the concept of its architecture, secure data sharing, and typical characteristic are discussed and investigated as well as the key technologies required for the implementation of this proposed architecture is explained based on demonstrative case study. The proposed architecture is explained based on a case study which contains five service providers and 15 end users with considering 32 OnCloud services. For evaluation purpose, the qualitative and quantitative methods are utilized and the results show that the proposed methodology can bring more advantages to CMfg than the security and scalability.

221 citations


Journal ArticleDOI
TL;DR: In this article, the authors highlight the benefits of the digitization of logistics process and examine the sustainability impact of digitization in logistics, based on a case study within the FMCG companies and their transport service providers in Turkey.

197 citations


Journal ArticleDOI
TL;DR: How past trauma can be understood as the cause of mental distress for many service users, how service users can be retraumatised by ‘trauma-uninformed’ staff and how staff can experience vicariously the service user's trauma and can themselves be traumatised by practices such as restraint and seclusion are described.
Abstract: Trauma-informed approaches emerged partly in response to research demonstrating that trauma is widespread across society, that it is highly correlated with mental health and that this is a costly public health issue. The fundamental shift in providing support using a trauma-informed approach is to move from thinking ‘What is wrong with you?’ to considering ‘What happened to you?’. This article, authored by trauma survivors and service providers, describes trauma-informed approaches to mental healthcare, why they are needed and how barriers can be overcome so that they can be implemented as an organisational change process. It also describes how past trauma can be understood as the cause of mental distress for many service users, how service users can be retraumatised by ‘trauma-uninformed’ staff and how staff can experience vicariously the service user's trauma and can themselves be traumatised by practices such as restraint and seclusion. Trauma-informed mental healthcare offers opportunities to improve service users' experiences, improve working environments for staff, increase job satisfaction and reduce stress levels by improving the relationships between staff and patients through greater understanding, respect and trust.LEARNING OBJECTIVES• Appreciate broad-based definitions of trauma• Gain an understanding of what trauma-informed approaches are and why they have emerged, including the potential for (re)traumatisation in the mental health system• Consider how to practise trauma-informed approaches, including in ‘trauma-uninformed’ organisations, and the potential barriers to and opportunities from doing soDECLARATION OF INTERESTA. S. is funded by a National Institute for Health Research (NIHR) Post-Doctoral Fellowship. This article presents independent research partially funded by the NIHR. The views expressed are those of the authors and not necessarily those of the National Health Service, the NIHR or the Department of Health.

196 citations


Journal ArticleDOI
05 Jan 2018
TL;DR: The already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud are surveyed and a framework for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity is proposed.
Abstract: Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

182 citations


Journal ArticleDOI
TL;DR: BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing, is introduced and the security analysis indicates that BCPay achieves Soundness and Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks.

182 citations


Journal ArticleDOI
TL;DR: A new metric to assess the impact on power grid without solving complete power flow equations is proposed and a safeguard of profit is incorporated in the model to protect service providers from severe financial losses.
Abstract: This paper studies the problem of stochastic dynamic pricing and energy management policy for electric vehicle (EV) charging service providers. In the presence of renewable energy integration and energy storage system, EV charging service providers must deal with multiple uncertainties—charging demand volatility, inherent intermittency of renewable energy generation, and wholesale electricity price fluctuation. The motivation behind our work is to offer guidelines for charging service providers to determine proper charging prices and manage electricity to balance the competing objectives of improving profitability, enhancing customer satisfaction, and reducing impact on power grid in spite of these uncertainties. We propose a new metric to assess the impact on power grid without solving complete power flow equations. To protect service providers from severe financial losses, a safeguard of profit is incorporated in the model. Two algorithms—stochastic dynamic programming (SDP) algorithm and greedy algorithm (benchmark algorithm)—are applied to derive the pricing and electricity procurement policy. A Pareto front of the multi-objective optimization is derived. Simulation results show that using SDP algorithm can achieve up to 7% profit gain over using greedy algorithm. Additionally, we observe that the charging service provider is able to reshape spatial-temporal charging demands to reduce the impact on power grid via pricing signals.

Journal ArticleDOI
TL;DR: In this paper, the authors investigate how service providers can enhance memorable and authentic tourist experiences in on-site conditions, in the context of sightseeing tours, based on scale development, the experience-involvement construct is introduced to measure onsite tourist experience.

Journal ArticleDOI
TL;DR: This study highlights how SEM often not only fails to provide benefits but also destructs value if not done properly, with potential fallouts which affect the long-term benefits.

Journal ArticleDOI
TL;DR: Hospital healthcare service quality was examined in order to find out its effect on patient satisfaction and patient loyalty and confirmed that better quality of healthcare services inclines to build satisfaction and loyalty among patients.
Abstract: The purpose of this paper is to explain the patients’ views towards private healthcare service providers. The study focussed on hospital service quality and analysed the relative significance of quality measurements in anticipating the patients’ satisfaction and loyalty. The mediating role of patient satisfaction is assessed between quality of hospital healthcare services and patient loyalty.,A total 611 patients (both indoor and outdoor) participated in a questionnaire survey from the six private hospitals of capital city, Islamabad, Pakistan. Data were analysed through descriptive statistics, common method variance, reliability, correlation and regression in order to investigate customer perceived service quality and how the quality of services stimulates loyalty intentions towards private service suppliers.,Findings depict that private healthcare service providers are attempting to deliver well improved healthcare services to their customers. Results confirmed that better quality of healthcare services inclines to build satisfaction and loyalty among patients. The healthcare service quality aspects (i.e. physical environment, customer-friendly environment, responsiveness, communication, privacy and safety) are positively related with patient loyalty which is mediated through patient satisfaction.,Findings will help the hospital managers to articulate effective strategies in order to ensure superior quality of healthcare services to patients. The study will induce hospital management to deliver attentions towards the quality of private healthcare service systems and improvements towards the deficient healthcare services. Furthermore, the study will present a clear picture of patient’s behavioural attitudes; satisfaction and loyalty intentions towards the quality of healthcare services.,The study provides the views and perceptions of patients towards the quality of healthcare services. The healthcare service quality dimensions, i.e., physical environment, customer-friendly environment, responsiveness, communication, and privacy and safety were assessed. Hospital healthcare service quality was examined in order to find out its effect on patient satisfaction and patient loyalty.

Journal ArticleDOI
TL;DR: Mobile money is a mobile phone-based financial tool that can transfer money safely and quickly across a wide geographical area as mentioned in this paper, which has transformed the way businesses in Eastern sub-Sahara countries in Africa.
Abstract: Mobile money is a mobile-phone-based financial tool that can transfer money safely and quickly across a wide geographical area. Mobile money has transformed the way businesses in Eastern sub-Sahara...

Journal ArticleDOI
TL;DR: In this paper, a short overview of the research on MHD in elite athletes is provided, and models of service provision for elite athletes suffering from MHD from six European countries are presented, focusing on professional service providers, support systems, diagnostic assessment, clinical treatment, performance during treatment, screening and education systems.

Journal ArticleDOI
TL;DR: This work investigates a joint radio and computational resource allocation problem to optimize the system performance and improve user satisfaction, and proposes to use a matching game framework, in particular, student project allocation (SPA) game, to provide a distributed solution for the formulated joint resource allocationproblem.
Abstract: The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we investigate a joint radio and computational resource allocation problem to optimize the system performance and improve user satisfaction. Important factors, such as service delay, link quality, mandatory benefit, and so on, are taken into consideration. Instead of the conventional centralized optimization, we propose to use a matching game framework, in particular, student project allocation (SPA) game, to provide a distributed solution for the formulated joint resource allocation problem. The efficient SPA-(S,P) algorithm is implemented to find a stable result for the SPA problem. In addition, the instability caused by the external effect, i.e., the interindependence between matching players, is removed by the proposed user-oriented cooperation (UOC) strategy. The system performance is also further improved by adopting the UOC strategy.

Journal ArticleDOI
TL;DR: This paper proposes an approach proactively protect financial customers’ privacy information using Attributed-Based Access Control as well as data self-deterministic scheme, called Proactive Dynamic Secure Data Scheme (P2DS), which aims to guarantee the unanticipated parties cannot reach the privacy data.

Journal ArticleDOI
TL;DR: An incentive-compatible auction mechanism (ICAM) for the resource trading between the mobile devices as service users (buyers) and cloudlets as service providers (sellers) that can effectively allocate cloudlets to satisfy the service demands of mobile devices and determine the pricing.
Abstract: Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In this paper, we propose an incentive-compatible auction mechanism (ICAM) for the resource trading between the mobile devices as service users (buyers) and cloudlets as service providers (sellers). ICAM can effectively allocate cloudlets to satisfy the service demands of mobile devices and determine the pricing. Both the theoretical analysis and the numerical results show that the ICAM guarantees desired properties with respect to individual rationality, budget balance and truthfulness (incentive compatibility) for both the buyers and the sellers, and computational efficiency.

Proceedings ArticleDOI
20 May 2018
TL;DR: In this paper, an auction-based edge computing resource allocation mechanism for the edge computing service provider is proposed to maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency.
Abstract: Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource allocation mechanism for the edge computing service provider. Since there is competition among miners, the allocative externalities are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that the proposed mechanism can efficiently solve the social welfare maximization problem for the edge computing service provider.

Journal ArticleDOI
TL;DR: The FAIR Metrics Group as discussed by the authors defines a set of features, attributes, and behaviors that will move a digital resource closer to the FAIR goal, and defines ways to measure FAIRness.
Abstract: The FAIR Principles provide guidelines for the publication of digital resources such as datasets, code, workflows, and research objects, in a manner that makes them Findable, Accessible, Interoperable, and Reusable (FAIR). The Principles have rapidly been adopted by publishers, funders, and pan-disciplinary infrastructure programmes and societies. The Principles are aspirational, in that they do not strictly define how to achieve a state of "FAIRness", but rather they describe a continuum of features, attributes, and behaviors that will move a digital resource closer to that goal. This ambiguity has led to a wide range of interpretations of FAIRness, with some resources even claiming to already "be FAIR"! The increasing number of such statements, the emergence of subjective and self-assessments of FAIRness2,3, and the need of data and service providers, journals, funding agencies, and regulatory bodies to qualitatively or quantitatively evaluate such claims, led us to self-assemble and establish a FAIR Metrics group to pursue the goal of defining ways to measure FAIRness.

Journal ArticleDOI
TL;DR: Security analysis shows that the proposed PAA scheme is able to address the serious security problems existing in Tsai and Lo's scheme and can meet security requirements for MCC services.
Abstract: With the exponential increase of the mobile devices and the fast development of cloud computing, a new computing paradigm called mobile cloud computing (MCC) is put forward to solve the limitation of the mobile device's storage, communication, and computation. Through mobile devices, users can enjoy various cloud computing services during their mobility. However, it is difficult to ensure security and protect privacy due to the openness of wireless communication in the new computing paradigm. Recently, Tsai and Lo proposed a privacy-aware authentication (PAA) scheme to solve the identification problem in MCC services and proved that their scheme was able to resist many kinds of existing attacks. Unfortunately, we found that Tsai and Lo's scheme cannot resist the service provider impersonation attack, i.e., an adversary can impersonate the service provider to the user. Also, the adversary can extract the user's real identity during executing the service provider impersonation attack. To address the above problems, in this paper, we construct a new PAA scheme for MCC services by using an identity-based signature scheme. Security analysis shows that the proposed PAA scheme is able to address the serious security problems existing in Tsai and Lo's scheme and can meet security requirements for MCC services. The performance evaluation shows that the proposed PAA scheme has less computation and communication costs compared with Tsai and Lo's PAA scheme.

Journal ArticleDOI
TL;DR: In this paper, the impact of perceived usefulness, perceived security, perceived ease of use, trust, grievance redressal and satisfaction on young users' intention to continually use M-wallet in India was investigated.
Abstract: Many developing countries, including India, are committed to curbing black money from the economy. Therefore, these countries are focusing on a transparent online transaction facility. M-wallets are one online option facilitated by various companies using a mobile application. The purpose of this paper is to investigate the impact of perceived usefulness, perceived security, perceived ease of use, trust, grievance redressal and satisfaction on young users’ intention to continually use M-wallet in India.,A research framework based on the expectation–confirmation theory has been formulated and tested empirically using data from M-wallets young users in India using structural equation modeling.,The analysis reveals that perceived usefulness and perceived ease of use significantly affect user satisfaction and intention to continually use M-wallets. The effect of perceived security on user satisfaction is significant, and grievance redressal mediates the effect of perceived security on intention to continually use M-wallets.,The outcome of the research will help M-wallet service providers and policy makers in planning the service and increasing customer’ continuance intention.,The uniqueness of this research is that it adds two important constructs for mobile payment systems (grievance redressal and perceived security) that were missing in the earlier model proposed by Zhou (2013). The addition of the two constructs helped in formulating a better model.

Journal ArticleDOI
TL;DR: This article proposes a thing-fog-cloud architecture for secure query processing based on well studied classical paradigms, and surveys the latest milestone-like approaches, and provides an insight into the advantages and limitations of each scheme.
Abstract: IoT is envisioned as the next stage of the information revolution, enabling various daily applications and providing better service by conducting a deep fusion with cloud and fog computing. As the key mission of most IoT applications, data management, especially the fundamental function-data query, has long been plagued by severe security and privacy problems. Most query service providers, including the big ones (e.g., Google, Facebook, Amazon, and so on) are suffering from intensive attacks launched by insiders or outsiders. As a consequence, processing various queries in IoT without compromising the data and query privacy is an urgent and challenging issue. In this article, we propose a thing-fog-cloud architecture for secure query processing based on well studied classical paradigms. Following with a description of crucial technical challenges in terms of functionality, privacy and efficiency assurance, we survey the latest milestone-like approaches, and provide an insight into the advantages and limitations of each scheme. Based on the recent advances, we also discuss future research opportunities to motivate efforts to develop practical private query protocols in IoT.

Journal ArticleDOI
TL;DR: An efficient workload slicing scheme is proposed for handling data-intensive applications in multiedge-cloud environment using software-defined networks (SDN), an SDN-based control scheme is presented, which provides energy-aware network traffic flow scheduling and a multileader multifollower Stackelberg game is proposed to provide cost-effective inter-DC migrations.
Abstract: With the evolution of Internet and extensive usage of smart devices for computing and storage, cloud computing has become popular. It provides seamless services such as e-commerce, e-health, e-banking, etc., to the end users. These services are hosted on massive geodistributed data centers (DCs), which may be managed by different service providers. For faster response time, such a data explosion creates the need to expand DCs. So, to ease the load on DCs, some of the applications may be executed on the edge devices near to the proximity of the end users. However, such a multiedge-cloud environment involves huge data migrations across the underlying network infrastructure, which may generate long migration delay and cost. Hence, in this paper, an efficient workload slicing scheme is proposed for handling data-intensive applications in multiedge-cloud environment using software-defined networks (SDN). To handle the inter-DC migrations efficiently, an SDN-based control scheme is presented, which provides energy-aware network traffic flow scheduling. Finally, a multileader multifollower Stackelberg game is proposed to provide cost-effective inter-DC migrations. The efficacy of the proposed scheme is evaluated on Google workload traces using various parameters. The results obtained show the effectiveness of the proposed scheme.

Journal ArticleDOI
TL;DR: This paper extends the scope of INV theory via a model that encompasses the internationalization process of digital platform providers, and reports on a longitudinal case study of a digital platform provider (covering the period 2000–2017), to gain in-depth insight into the INV phenomenon.

Posted Content
01 Jan 2018-SocArXiv
TL;DR: This work theorizes global platforms through transaction cost economics (TCE), arguing that they are a new technology-enabled offshoring institution that emerges in response to cross-border information asymmetries that hitherto prevented microproviders from participating in offshored markets.
Abstract: Global online platforms match firms with service providers around the world, in services ranging from software development to copywriting and graphic design. Unlike in traditional offshore outsourcing, service providers are predominantly one-person microproviders located in emerging-economy countries not necessarily associated with offshoring and often disadvantaged by negative country images. How do these microproviders survive and thrive? We theorize global platforms through transaction cost economics (TCE), arguing that they are a new technology-enabled offshoring institution that emerges in response to cross-border information asymmetries that hitherto prevented microproviders from participating in offshoring markets. To explain how platforms achieve this, we adapt signaling theory to a TCE-based model and test our hypotheses by analyzing 6 months of transaction records from a leading platform. To help interpret the results and generalize them beyond a single platform, we introduce supplementary data from 107 face-to-face interviews with microproviders in Southeast Asia and Sub-Saharan Africa. Individuals choose microprovidership when it provides a better return on their skills and labor than employment at a local (offshoring) firm. The platform acts as a signaling environment that allows microproviders to inform foreign clients of their quality, with platform-generated signals being the most informative signaling type. Platform signaling disproportionately benefits emerging-economy providers, allowing them to partly overcome the effects of negative country images and thus diminishing the importance of home country institutions. Global platforms in other factor and product markets likely promote cross-border microbusiness through similar mechanisms.

Journal ArticleDOI
TL;DR: The discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform and the open issues, main challenges and directions highlighted for future work in this area.
Abstract: The Internet today lacks an identity protocol for identifying people and organizations. As a result, service providers needed to build and maintain their own databases of user information. This solution is costly to the service providers, inefficient as much of the information is duplicated across different providers, difficult to secure as evidenced by recent large-scale personal data breaches around the world, and cumbersome to the users who need to remember different sets of credentials for different services. Furthermore, personal information could be collected for data mining, profiling and exploitation without users' knowledge or consent. The ideal solution would be self-sovereign identity, a new form of identity management that is owned and controlled entirely by each individual user. This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers. The individual provides proof of identity and membership by sharing relevant parts of their identity with the service providers. Consent for access may also be revoked hence giving the individual full control over its own data. This survey critically investigates different blockchain based identity management and authentication frameworks. A summary of the state-of-the-art blockchain based identity management and authentication solutions from year 2014 to 2018 is presented. The paper concludes with the open issues, main challenges and directions highlighted for future work in this area. In a nutshell, the discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform.

Journal ArticleDOI
TL;DR: The findings suggest pre-encounter information search impacts positively on improved service engagement and commitment to compliance with medical instructions, and suggests a need for service providers to adopt delivery approaches that would effectively integrate patient resources to co-create value.

Journal ArticleDOI
TL;DR: This article proposes a novel SDN-based big data management approach with respect to the optimized network resource consumption such as network bandwidth and data storage units and analyzes various components at both the data and control planes that can enhance the optimized big data analytics across multiple cloud data centers.
Abstract: With an exponential increase in smart device users, there is an increase in the bulk amount of data generation from various smart devices, which varies with respect to all the essential V's used to categorize it as big data. Generally, most service providers, including Google, Amazon, Microsoft and so on, have deployed a large number of geographically distributed data centers to process this huge amount of data generated from various smart devices so that users can get quick response time. For this purpose, Hadoop, and SPARK are widely used by these service providers for processing large datasets. However, less emphasis has been given on the underlying infrastructure (the network through which data flows), which is one of the most important components for successful implementation of any designed solution in this environment. In the worst case, due to heavy network traffic with respect to data migrations across different data centers, the underlying network infrastructure may not be able to transfer data packets from source to destination, resulting in performance degradation. Focusing on all these issues, in this article, we propose a novel SDN-based big data management approach with respect to the optimized network resource consumption such as network bandwidth and data storage units. We analyze various components at both the data and control planes that can enhance the optimized big data analytics across multiple cloud data centers. For example, we analyze the performance of the proposed solution using Bloom-filter-based insertion and deletion of an element in the flow table maintained at the OpenFlow controller, which makes most of the decisions for network traffic classification using the rule-and-action-based mechanism. Using the proposed solution, developers can deploy and analyze real-time traffic behavior for the future big data applications in MCE.