scispace - formally typeset
Search or ask a question
Topic

Software as a service

About: Software as a service is a research topic. Over the lifetime, 8514 publications have been published within this topic receiving 136177 citations. The topic is also known as: Service as a Software Substitute & SaaSS.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a game theoritic resource management technique that minimises infrastructure energy consumption and costs while ensuring applications performance and suggests that this approach could reduce up to 11.95% energy consumption, and approximately 17.86% user costs with negligible loss in performance.
Abstract: Internet of Things (IoT) is producing an extraordinary volume of data daily, and it is possible that the data may become useless while on its way to the cloud, due to long distances Fog/edge computing is a new model for analysing and acting on time-sensitive data, adjacent to where it is produced Further, cloud services provided by large companies such as Google, can also be localised to improve response time and service agility This is accomplished through deploying small-scale datacentres in various locations, where needed in proximity of users; and connected to a centralised cloud that establish a multi-access edge computing (MEC) The MEC setup involves three parties, ie service-providers (IaaS), application-providers (SaaS), network-providers (NaaS); which might have different goals, therefore, making resource management difficult Unlike existing literature, we consider resource management with-respect-to all parties; and suggest game-theoretic resource management techniques to minimise infrastructure energy consumption and costs while ensuring applications' performance Our empirical evaluation, using Google's workload traces, suggests that our approach could reduce up to 1195% energy consumption, and ~1786% user costs with negligible loss in performance Moreover, IaaS can reduce up-to 2027% energy bills and NaaS can increase their costs-savings up-to 1852% as compared to other methods

34 citations

Journal ArticleDOI
N.J. Drew1, M.M. Dillinger
TL;DR: The likely overall system environment and the key technical challenges to be researched for realizing a reconfigurable terminal to meet the needs of users within that environment are described.
Abstract: To date, research into reconfigurable mobile communications has predominantly focused on the software radio concept, and specifically on the hardware technologies required to move physical layer processing into a programmable environment. Although an interesting and necessary challenge, this only represents a fraction of the overall support and technology required to realize the potential of the concept. Other necessary developments include network/terminal cooperation for seamless interstandard handoff, QoS management, a secure software download mechanism, terminal software architecture supporting reconfiguration, configuration management, capability negotiation, and so on. Summarizing results from early project deliverables from a European Research project, IST-TRUST (Transparently Reconfigurable Ubiquitous Terminal), this article describes the likely overall system environment and the key technical challenges to be researched for realizing a reconfigurable terminal to meet the needs of users within that environment.

34 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: This paper presents a scheduling algorithm which uses tree based data structure called Virtual Machine Tree (VMT) for efficient execution of tasks and shows that algorithm gives better performance compared to other traditional scheduling algorithms.
Abstract: The increasing demand in computing resources and widespread adaptation of Service Oriented Architecture (SOA) has made cloud as a new IT delivery mechanism. In cloud, computing resources are provided to the requester as a service, which include Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Cloud Computing is still in developing stage and faces many challenges. Out of the various issues, scheduling plays a very important role in determining the efficient execution of tasks in cloud environment. In this paper we present a scheduling algorithm which uses tree based data structure called Virtual Machine Tree (VMT) for efficient execution of tasks. The proposed algorithm is tested using CloudSim simulator and the results shows that algorithm gives better performance compared to other traditional scheduling algorithms.

34 citations

Book ChapterDOI
01 Jan 2018
TL;DR: IoT and cloud integration involves several challenges and issues as standardization of machine to machine (M2M) communication and interoperability, power and energy efficiency of devices for data transmission and processing, big data generated by several devices, security and privacy, integration methodology, pricing and billing, network communications, storage, etc.
Abstract: The Internet of Things (IoT) and Cloud Computing both are developing technologies. Cloud Computing blows up to provide support to IoT by working as a sort of front-end and it is based on the concept of permitting users to do computing tasks using services delivered with internet. The cloud computing empower an appropriate, on-demand, and scalable network access to a shared pool of configurable computing resources. The cloud-based IoT architecture includes features of cloud-based IoT platform and its interaction with three main cloud computing models: IaaS (infrastructure as a service), Paas (platform as a service), and SaaS (software as a service). The cloud and IoT integration empowers new scenarios, for smart services and applications, as Sensing as a Service (SaaS), DataBase as a Service (DBaaS), Video Surveillance as a Service (VSaaS), and many more. Various live company products, research projects, and projects with freely available source code in various areas of Cloud Computing and IoT integration are Nimbits, ThingSpeak, Paraimpu, Device Cloud, Sensor Cloud. REpresentational State Transfer (REST) architectural style web services and Constrained Application Protocol (COAP), Message Queue Telemetry Transport (MQTT), web transfer protocols are used for communication for the IoT resource-constrained things. Networking protocols like IPv6 over Low power Wireless Personal Area Network (6LoWPAN) and IPv6 over Bluetooth Low Energy are used for constrained networks in IoT and cloud integration. The data link layer protocols for IoT devices like IEEE 802.15.4, IEEE 802.11ah, Z-Wave, WirelessHART, Bluetooth, Zigbee are used for short range communication for IoT things. The applications of integrated cloud and IoT include agriculture, video surveillance, healthcare, smart city, smart home and smart metering, etc. IoT and cloud integration involves several challenges and issues as standardization of machine to machine (M2M) communication and interoperability, power and energy efficiency of devices for data transmission and processing, big data generated by several devices, security and privacy, integration methodology, pricing and billing, network communications, storage, etc. In this chapter, the introduction of cloud and IoT, their integration architecture, integration applications, and challenges and issues involved are discussed.

34 citations

Journal ArticleDOI
TL;DR: This work shows how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner and constitutes an incentive for software providers to take part in a future cloud computing scenario where software licensing and software payment plays a major role.
Abstract: We present a privacy-friendly architecture for a future cloud computing scenario where software licensing and software payment plays a major role. We show how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers and execute it at computing centres stay anonymous. At the same time, our approach guarantees that software licences are bound to users and that their validity is checked before execution. Thus, digital rights management constitutes an incentive for software providers to take part in such a future cloud computing scenario. We employ a software re-encryption scheme so that computing centres are not able to build profiles of their users - not even under a pseudonym. We make sure that malicious users are unable to relay software to others.

34 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
85% related
Software
130.5K papers, 2M citations
85% related
The Internet
213.2K papers, 3.8M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202375
2022226
2021192
2020306
2019327
2018424