scispace - formally typeset
Search or ask a question

Showing papers on "Software as a service published in 2017"


Posted Content
TL;DR: A comprehensive survey on fog computing is presented in this article, which critically reviews the state of the art in the light of a concise set of evaluation criteria and challenges and research directions.
Abstract: Cloud computing with its three key facets (i.e., IaaS, PaaS, and SaaS) and its inherent advantages (e.g., elasticity and scalability) still faces several challenges. The distance between the cloud and the end devices might be an issue for latency-sensitive applications such as disaster management and content delivery applications. Service Level Agreements (SLAs) may also impose processing at locations where the cloud provider does not have data centers. Fog computing is a novel paradigm to address such issues. It enables provisioning resources and services outside the cloud, at the edge of the network, closer to end devices or eventually, at locations stipulated by SLAs. Fog computing is not a substitute for cloud computing but a powerful complement. It enables processing at the edge while still offering the possibility to interact with the cloud. This article presents a comprehensive survey on fog computing. It critically reviews the state of the art in the light of a concise set of evaluation criteria. We cover both the architectures and the algorithms that make fog systems. Challenges and research directions are also introduced. In addition, the lessons learned are reviewed and the prospects are discussed in terms of the key role fog is likely to play in emerging technologies such as Tactile Internet.

450 citations


Journal ArticleDOI
TL;DR: Five multilingual web services for speech science operational since 2012 are described and the benefits and drawbacks of the new paradigm as well as the experiences with user acceptance and implementation problems are discussed.

272 citations


Posted Content
TL;DR: A literature review of quality issues and attributes as they relate to the contemporary issue of chatbot development and implementation is presented, and a quality assessment method based on these attributes and the Analytic Hierarchy Process is proposed and examined.
Abstract: Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both). They provide conversational output in response, and if commanded, can sometimes also execute tasks. Although chatbot technologies have existed since the 1960s and have influenced user interface development in games since the early 1980s, chatbots are now easier to train and implement. This is due to plentiful open source code, widely available development platforms, and implementation options via Software as a Service (SaaS). In addition to enhancing customer experiences and supporting learning, chatbots can also be used to engineer social harm - that is, to spread rumors and misinformation, or attack people for posting their thoughts and opinions online. This paper presents a literature review of quality issues and attributes as they relate to the contemporary issue of chatbot development and implementation. Finally, quality assessment approaches are reviewed, and a quality assessment method based on these attributes and the Analytic Hierarchy Process (AHP) is proposed and examined.

226 citations


Journal ArticleDOI
TL;DR: This article provides a comprehensive review of the state-of-the-art contributions from the perspective of software defined networking and machineto- machine integration, and the overall design of the proposed software-defined machine-to-machine (SD-M2M) framework is presented.
Abstract: The successful realization of smart energy management relies on ubiquitous and reliable information exchange among millions of sensors and actuators deployed in the field with little or no human intervention. This motivates us to propose a unified communication framework for smart energy management by exploring the integration of software-defined networking with machine-to-machine communication. In this article, first we provide a comprehensive review of the state-of-the-art contributions from the perspective of software defined networking and machineto- machine integration. Second, the overall design of the proposed software-defined machine-to-machine (SD-M2M) framework is presented, with an emphasis on its technical contributions to cost reduction, fine granularity resource allocation, and end-to-end quality of service guarantee. Then a case study is conducted for an electric vehicle energy management system to validate the proposed SD-M2M framework. Finally, we identify several open issues and present key research opportunities.

154 citations


Journal ArticleDOI
TL;DR: This framework aims at adding an extra security level at the early stages of the CSDLC, which has been further illustrated by a case study showing the applicability of the framework.

136 citations


Journal ArticleDOI
TL;DR: The high activity of research work around the field of Open Source collaboration, especially in the software domain, revealed a set of shortcomings and proposed some actions to mitigate them.
Abstract: Context: GitHub, nowadays the most popular social coding platform, has become the reference for mining Open Source repositories, a growing research trend aiming at learning from previous software projects to improve the development of new ones. In the last years, a considerable amount of research papers have been published reporting findings based on data mined from GitHub. As the community continues to deepen in its understanding of software engineering thanks to the analysis performed on this platform, we believe that it is worthwhile to reflect on how research papers have addressed the task of mining GitHub and what findings they have reported. Objective: The main objective of this paper is to identify the quantity, topic, and empirical methods of research works, targeting the analysis of how software development practices are influenced by the use of a distributed social coding platform like GitHub. Method: A systematic mapping study was conducted with four research questions and assessed 80 publications from 2009 to 2016. Results: Most works focused on the interaction around coding-related tasks and project communities. We also identified some concerns about how reliable were these results based on the fact that, overall, papers used small data sets and poor sampling techniques, employed a scarce variety of methodologies and/or were hard to replicate. Conclusions: This paper attested the high activity of research work around the field of Open Source collaboration, especially in the software domain, revealed a set of shortcomings and proposed some actions to mitigate them. We hope that this paper can also create the basis for additional studies on other collaborative activities (like book writing for instance) that are also moving to GitHub.

111 citations


Journal ArticleDOI
TL;DR: Activity-aaService is able to address the current lack of Cloud-Assisted Body Area Networks platforms and applications supporting monitoring and analysis of human activity for single individuals and communities by enabling efficient BSN-based sensor data collection and local processing.

107 citations


Journal ArticleDOI
TL;DR: The MERRA Analytic Services (MERRAAS) as mentioned in this paper is an example of cloud-enabled CAaaS built on this principle, which enables MapReduce analytics over NASAs Modern-Era Retrospective Analysis for Research and Applications data collection.

99 citations


Journal ArticleDOI
TL;DR: This article proposes a design of software as a service called OpenPipe, which enables network-level virtualization and adopts a hybrid control model with two hierarchical control levels, where an SDN controller forms the higher level and local controllers comprise the lower level.
Abstract: Today, billions of communication devices connecting to wireless networks impose serious challenges to network deployment, management, and data processing. Among all emerging technologies tackling these challenges, SDNs decouple the control plane from the data plane to provide network programmability, and virtualization can share network and radio resources among various applications. On the other hand, fog computing offloads computing services from the cloud to the edge of networks, offering real-time data services to nearby data terminals. In this article, we present an integrated architecture for software defined and virtualized radio access networks with fog computing. We propose a design of software as a service called OpenPipe, which enables network-level virtualization. To integrate SDNs and network virtualization with fog computing, we adopt a hybrid control model with two hierarchical control levels, where an SDN controller forms the higher level and local controllers comprise the lower level. Typical use cases of the proposed network architecture are validated through laboratory demonstrations.

97 citations


Book
12 Oct 2017
TL;DR: An algorithm which considered Preemptable task execution and multiple SLA parameters such as memory, network bandwidth, and required CPU time is proposed and obtained experimental results show that in a situation where resource contention is fierce the algorithm provides better utilization of resources.
Abstract: Today Cloud computing is on demand as it offers dynamic flexible resource allocation, for reliable and guaranteed services in pay-as-you-use manner, to Cloud service users So there must be a provision that all resources are made available to requesting users in efficient manner to satisfy their needs This resource provision is done by considering the Service Level Agreements (SLA) and with the help of parallel processing Recent work considers various strategies with single SLA parameter Hence by considering multiple SLA parameter and resource allocation by preemption mechanism for high priority task execution can improve the resource utilization in Cloud In this paper we propose an algorithm which considered Preemptable task execution and multiple SLA parameters such as memory, network bandwidth, and required CPU time An obtained experimental results show that in a situation where resource contention is fierce our algorithm provides better utilization of resources

84 citations


Journal ArticleDOI
TL;DR: An integrated data combination and data management architecture that is able to accommodate real‐time data gathered by a fleet of robotic vehicles on a crisis site, and which allows for reusing recorded exercises with real robots and rescue teams for training purposes and teaching search‐and‐rescue personnel how to handle the different robotic tools is presented.
Abstract: Search-and-rescue operations have recently been confronted with the introduction of robotic tools that assist the human search-and-rescue workers in their dangerous but life-saving job of searching for human survivors after major catastrophes. However, the world of search and rescue is highly reliant on strict procedures for the transfer of messages, alarms, data, and command and control over the deployed assets. The introduction of robotic tools into this world causes an important structural change in this procedural toolchain. Moreover, the introduction of search-and-rescue robots acting as data gatherers could potentially lead to an information overload toward the human search-and-rescue workers, if the data acquired by these robotic tools are not managed in an intelligent way. With that in mind, we present in this paper an integrated data combination and data management architecture that is able to accommodate real-time data gathered by a fleet of robotic vehicles on a crisis site, and we present and publish these data in a way that is easy to understand by end-users. In the scope of this paper, a fleet of unmanned ground and aerial search-and-rescue vehicles is considered, developed within the scope of the European ICARUS project. As a first step toward the integrated data-management methodology, the different robotic systems require an interoperable framework in order to pass data from one to another and toward the unified command and control station. As a second step, a data fusion methodology will be presented, combining the data acquired by the different heterogenic robotic systems. The computation needed for this process is done in a novel mobile data center and then (as a third step) published in a software as a service (SaaS) model. The SaaS model helps in providing access to robotic data over ubiquitous Ethernet connections. As a final step, we show how the presented data-management architecture allows for reusing recorded exercises with real robots and rescue teams for training purposes and teaching search-and-rescue personnel how to handle the different robotic tools. The system was validated in two experiments. First, in the controlled environment of a military testing base, a fleet of unmanned ground and aerial vehicles was deployed in an earthquake-response scenario. The data gathered by the different interoperable robotic systems were combined by a novel mobile data center and presented to the end-user public. Second, an unmanned aerial system was deployed on an actual mission with an international relief team to help with the relief operations after major flooding in Bosnia in the spring of 2014. Due to the nature of the event (floods), no ground vehicles were deployed here, but all data acquired by the aerial system (mainly three-dimensional maps) were stored in the ICARUS data center, where they were securely published for authorized personnel all over the world. This mission (which is, to our knowledge, the first recorded deployment of an unmanned aerial system by an official governmental international search-and-rescue team in another country) proved also the concept of the procedural integration of the ICARUS data management system into the existing procedural toolchain of the search and rescue workers, and this in an international context (deployment from Belgium to Bosnia). The feedback received from the search-and-rescue personnel on both validation exercises was highly positive, proving that the ICARUS data management system can efficiently increase the situational awareness of the search-and-rescue personnel.

Journal ArticleDOI
Asif Khan1
TL;DR: This paper addresses a set of capabilities required of a container orchestration platform to embody the design principles as illustrated by twelve factor app design and provides a non-exhaustive and prescriptive guide to identifying and implementing key mechanisms required in a container Orchestration platform.
Abstract: As compute evolves from bare metal to virtualized environments to containers towards serverless, the efficiency gains have enabled a wide variety of use cases. Organizations have used containers to run long running services, batch processing at scale, control planes, Internet of Things, and Artificial Intelligence workloads. Further, methodologies for software as a service, such as twelve-factor app, emphasize a clean contract with the underlying operating system and maximum portability between execution environments.1 In this paper, we address a set of capabilities required of a container orchestration platform to embody the design principles as illustrated by twelve factor app design. This paper also provides a non-exhaustive and prescriptive guide to identifying and implementing key mechanisms required in a container orchestration platform. We will cover capabilities such as cluster state management and scheduling, high availability and fault tolerance, security, networking, service discovery, continuous deployment, monitoring, and governance.

Journal ArticleDOI
TL;DR: The study investigated factors that affect the intention of small companies in Korea to adopt SaaS and found that they were more concerned with the security risks than the economic or performance risks, and management support was considered to be more important than the resources or IT capacity for the adoption of SAAS.
Abstract: Cloud computing is a cutting‐edge information technology (IT) that receives computing resources and services from external providers rather than building their own information systems. Software‐as‐...

Journal ArticleDOI
TL;DR: The potential of cloud-deployed IFC for enforcing owners’ data flow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software is discussed.
Abstract: A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government, consisting of different departments, provides services to its citizens through a common platform. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows;a crucial issue once data has left its owner’s control by cloud-hosted applications andwithin cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners’ data flow policy with regard to protection and sharing, aswell as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency and offers system-wide visibility over data flows. This helps those responsible to meet their data management obligations, providing evidence of compliance, and aids in the identification ofpolicy errors and misconfigurations. We present our IFC model and describe and evaluate our IFC architecture and implementation (CamFlow). This comprises an OS level implementation of IFC with support for application management, together with an IFC-enabled middleware.

Journal ArticleDOI
TL;DR: This work shows how Pattern-Based description of composite Cloud Services can be used to define proper Orchestrations action, along all the ”‘aaS”’ layers of Cloud Architecture.

Journal ArticleDOI
TL;DR: A generic value network for Cloud-based enterprise software is presented and it is found that the role of the consultative partner is more focussed on business process management and that technical consulting remains relevant due to IT security, data migration, interface definition, customizing, and mobile application development.

Journal ArticleDOI
TL;DR: The results of this study reflect what critical factors should be considered and how they are interrelated and show the organizational demands that must be considered by those companies wishing to implement a real management model adopted to the digital economy, especially those related to cloud computing.
Abstract: The present study empirically analyzes the factors that determine the adoption of cloud computing (SaaS model) in firms where this strategy is considered strategic for executing their activity. A research model has been developed to evaluate the factors that influence the intention of using cloud computing that combines the variables found in the technology acceptance model (TAM) with other external variables such as top management support, training, communication, organization size, and technological complexity. Data compiled from 150 companies in Andalusia (Spain) are used to test the formulated hypotheses. The results of this study reflect what critical factors should be considered and how they are interrelated. They also show the organizational demands that must be considered by those companies wishing to implement a real management model adopted to the digital economy, especially those related to cloud computing.

Journal ArticleDOI
TL;DR: This paper investigates the problem of joint pricing and capacity planning in the IaaS provider market with a set of software-as-a-service (SaaS) providers, and develops an iterative algorithm to achieve the Nash equilibrium.
Abstract: In the cloud context, pricing and capacity planning are two important factors to the profit of the infrastructure-as-a-service (IaaS) providers. This paper investigates the problem of joint pricing and capacity planning in the IaaS provider market with a set of software-as-a-service (SaaS) providers, where each SaaS provider leases the virtual machines (VMs) from the IaaS providers to provide cloud-based application services to its end-users. We study two market models, one with a monopoly IaaS provider market, the other with multiple-IaaS-provider market. For the monopoly IaaS provider market, we first study the SaaS providers’ optimal decisions in terms of the amount of end-user requests to admit and the number of VMs to lease, given the resource price charged by the IaaS provider. Based on the best responses of the SaaS providers, we then derive the optimal solution to the problem of joint pricing and capacity planning to maximize the IaaS provider's profit. Next, for the market with multiple IaaS providers, we formulate the pricing and capacity planning competition among the IaaS providers as a three-stage Stackelberg game. We explore the existence and uniqueness of Nash equilibrium, and derive the conditions under which there exists a unique Nash equilibrium. Finally, we develop an iterative algorithm to achieve the Nash equilibrium.

Patent
15 Aug 2017
TL;DR: In this paper, a block chain-based online taxi-hailing service system is presented. But the system includes a traffic cloud database, traffic cloud artificial intelligence system (TAI) and a mobile client.
Abstract: The invention discloses a block chain-based online taxi-hailing service system. The system includes a traffic cloud database, a traffic cloud artificial intelligence system (TAI) and a mobile client. With the block chain-based online taxi-hailing service system adopted, a decentralized, trustless, collectively maintained, asymmetric cryptography reliable database basic infrastructure and underlying internet protocol can be provided for traffic cloud; and a mobile SaaS (Software-as-a-Service) application pattern, a distributed computing normal form and a group intelligence model which can establish high-degree connections for travelers based on time stamp, achieve travel resource allocation consensuses and provide services according to demands can be realized.

Proceedings ArticleDOI
05 Dec 2017
TL;DR: A Digital Twin-as-a-Service (DTaaS) model for simulation and prediction of industrial processes using Digital Twins is described.
Abstract: The concept of "Industry 4.0" considers smart factories as data-driven and knowledge enabled enterprise intelligence. In such kind of factory, manufacturing processes and final products are accompanied by virtual models -- Digital Twins. To support Digital Twins concept, a simulation model for each process or system should be implemented as independent computational service. The only way to implement an orchestration of a set of independent services and provide scalability for simulation is to use a cloud computing platform as a provider of the computing infrastructure. In this paper, we describe a Digital Twin-as-a-Service (DTaaS) model for simulation and prediction of industrial processes using Digital Twins.

Journal ArticleDOI
TL;DR: The intelligent logistics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-win logistics ecological system and the benign development of the ICT industry in the trend of intellectualization in China.
Abstract: Intellectualization has become a new trend for telecom industry, driven by intelligent technology including cloud computing, big data, and Internet of things. In order to satisfy the service demand of intelligent logistics, this paper designed an intelligent logistics platform containing the main applications such as e-commerce, self-service transceiver, big data analysis, path location and distribution optimization. The intelligent logistics service platform has been built based on cloud computing to collect, store and handling multi-source heterogeneous mass data from sensors, RFID electronic tag, vehicle terminals and APP, so that the open-access cloud services including distribution, positioning, navigation, scheduling and other data services can be provided for the logistics distribution applications. And then the architecture of intelligent logistics cloud platform containing software layer (SaaS), platform layer (PaaS) and infrastructure (IaaS) has been constructed accordance with the core technology relative high concurrent processing technique, heterogeneous terminal data access, encapsulation and data mining. Therefore, intelligent logistics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-win logistics ecological system and the benign development of the ICT industry in the trend of intellectualization in China.

Patent
Anand Sampath1, Bilal Muhsin1
26 Apr 2017
TL;DR: A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service as mentioned in this paper, which can reduce costs and increase security and reliability of those networks.
Abstract: A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service. The medical network service in certain embodiments can provide networking services via software as a service technologies, platform as a service technologies, and/or infrastructure as a service technologies. The medical network service can provide these services to large existing clinical facilities such as metropolitan hospitals as well as to smaller clinical facilities such as specialized surgical centers. The medical network service can replace and/or supplement existing IT networks in hospitals and other clinical facilities and can therefore reduce costs and increase security and reliability of those networks. In addition, the medical network service can provide synergistic benefits that can improve patient outcomes and patient care. In addition, a medical edge router can provide redundant communications features for transmitting patient data to the medical network service.

Journal ArticleDOI
17 Aug 2017
TL;DR: A model to study the interaction of price competition and congestion in the cloud computing marketplace is proposed and it is highlighted that both of these depend fundamentally on the degree to which congestion results from shared or dedicated resources in thecloud.
Abstract: This article proposes a model to study the interaction of price competition and congestion in the cloud computing marketplace. Specifically, we propose a three-tier market model that captures a marketplace with users purchasing services from Software-as-a-Service (SaaS) providers, which in turn purchase computing resources from either Provider-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS) providers. Within each level, we define and characterize market equilibria. Further, we use these characterizations to understand the relative profitability of SaaSs and PaaSs/IaaSs and to understand the impact of price competition on the user experienced performance, that is, the “price of anarchy” of the cloud marketplace. Our results highlight that both of these depend fundamentally on the degree to which congestion results from shared or dedicated resources in the cloud.

Proceedings ArticleDOI
01 Feb 2017
TL;DR: This papers proposes a system architecture which will try to overcome the above shortcoming by analyzing messages of each ejabberd users to check whether it's actionable or not and an automated Chatbot will initiates conversation with that user and help the user to resolve the issue.
Abstract: It's being very important to listen to social media streams whether it's Twitter, Facebook, Messenger, LinkedIn, email or even company own application. As many customers may be using this streams to reach out to company because they need help. The company have setup social marketing team to monitor this stream. But due to huge volumes of users it's very difficult to analyses each and every social message and take a relevant action to solve users grievances, which lead to many unsatisfied customers or may even lose a customer. This papers proposes a system architecture which will try to overcome the above shortcoming by analyzing messages of each ejabberd users to check whether it's actionable or not. If it's actionable then an automated Chatbot will initiates conversation with that user and help the user to resolve the issue by providing a human way interactions using LUIS and cognitive services. To provide a highly robust, scalable and extensible architecture, this system is implemented on AWS public cloud.

Journal ArticleDOI
TL;DR: Study of an enterprise software vendor’s decision on three prominent licensing models indicates that both the customers’ estimation of the future software quality improvement and network effects play critical roles in the software vendor's choice of optimal licensing models.
Abstract: We study an enterprise software vendor’s decision on three prominent licensing models– on-premises, software as a service (SaaS), and hybrid. Our findings indicate that both the customers’ estimation of the future software quality improvement and network effects play critical roles in the software vendor’s choice of optimal licensing models. If the network effects are weak, the enterprise software vendor should choose the on-premises model when customers have a low estimation of the software quality improvement in the upgrade version. The hybrid model should be implemented if this estimation is in the mid-range, while the SaaS model generates the highest profit when customers believe that the upgrade version will have a significant improvement in software quality. As the network effects become stronger, the on-premises model will be dominated by the other two licensing models and is never optimal. In the event of a high upgrade cost and strong network effects, SaaS becomes the best licensing model...

Journal ArticleDOI
TL;DR: Cloud-native features in information technology (it) systems come with many advantages, but they also come with a cost, which varies greatly, based upon your applications and data.
Abstract: Cloud-native features in your information technology (it) systems come with many advantages, but they also come with a cost. The costs vary greatly, based upon your applications and data. Sometimes being cloud native doesn’t make economic sense, and sometimes it does.

Journal ArticleDOI
TL;DR: Based on the scaling capabilities provided by the tools used on the IaaS level, a strategy to build a dynamically scaling PaaS offering for building and running workflows using Galaxy is devised.

Journal ArticleDOI
01 Dec 2017
TL;DR: The SaaS features compared with each other according to important factors of the CRM providers such as business size, service deployment, ease of use, availability and efficiency, as well as providing some hints for solving their problems.
Abstract: In recent year, cloud computing as a new internet-based computing model provides different service providers dynamically. Today, Software-as-a-service (SaaS) is one of main key points of the computing procedure. However, by raising user interactions, the complexity of the cloud processes is increasing with the advancement of technology. Therefore, providing appropriate services to response the Customer Relationship Management (CRM) applications are challengeable in cloud environments. To the best of our knowledge, there is no any systematic and detailed review in the field of the SaaS based CRM providers in cloud computing. Therefore, this paper categorizes the SaaS features based on key points of the CRM providers. The SaaS features compared with each other according to important factors of the CRM providers such as business size, service deployment, ease of use, availability and efficiency. The advantages and disadvantages of each provider discussed as well as providing some hints for solving their problems.

Patent
15 Mar 2017
TL;DR: In this article, the authors provide an SaaS application construction method based on a microservice architecture, which solves the microservice development, deployment, and management schemes so as to improve the development efficiency of the application.
Abstract: The present invention provides an SaaS application construction method based on a microservice architecture. Aiming at the defects in the construction method based on the traditional SOA architecture in the prior art, the method provided by the invention comprises: formulating the design rule and the attribute model for developing the microservice, and realizing the deployment of the microservice example through a Docker container; building a distributed microservice metadata cluster, and performing unified management of the metadata of the microservice, the microservice providers and the microservice users; aiming at the real-time updating state data and the relatively fixed attribute data, designing a highly available storage scheme; aiming at the real-time highly concurrent reading-write requirement of the metadata, designing a scheme through combination of Redis main and slave server models and a reading-writing separation architecture; and aiming at the microservice example dynamic addition and deletion condition, designing a load balance strategy based on the consistency hash algorithm. The SaaS application construction method based on the microservice architecture solves the microservice development, deployment and management schemes so as to improve the development efficiency of the SaaS application.

Proceedings ArticleDOI
25 Sep 2017
TL;DR: This paper conducts an empirical study that analyzes the behavior of software reuse during the evolution of a multi-tenant SaaS and shows an average software reuse of 62% of lines of code among tenants.
Abstract: In order to achieve economies of scale, a Software as a Service (SaaS) should be configurable, multi-tenant efficient, and scalable. But building SaaS with these characteristics comes at a price of having more complex services. Some works in the literature integrate software product line engineering and service-oriented architecture to tackle the complexity of building multi-tenant SaaS. Most of these works focused on centralized approaches that rely on middleware or platforms, but they do not investigate the use of decentralized architectural style. Microservices architecture is an architectural style that relies on small, decentralized, and autonomous services that work together. Thus, this paper investigates the integrated use of microservices architecture and software produt line techniques to develop multi-tenant SaaS. We conducted an empirical study that analyzes the behavior of software reuse during the evolution of a multi-tenant SaaS. This empirical study showed an average software reuse of 62% of lines of code among tenants. We also provide lessons we learned during the the re-engineering and maintenance of such multi-tenant SaaS.