Adaptive Web Services Monitoring in Cloud Environments

2013 ◽  
Vol 5 (1) ◽  
pp. 15-27 ◽  
Author(s):  
Yi Wei ◽  
M. Brian Blake

Cloud computing environments provide flexible infrastructures for third-party management of organizations’ information technology (IT) assets. With web services being a standard for realizing web-based business capabilities, the emergence of cloud computing will bring new challenges to different web service activities. In this paper, the authors propose an agent-based framework that employs a team of management and monitoring agents on different scopes to provides effective service management in a cloud environment. To tackle the dynamism in service operations, an adaptive monitoring algorithm is proposed. The algorithm is inspired by the congestion control approach from the TCP protocol and provides efficient, up-to-date information about service status without exhaustive monitoring. Experimental results show that the monitoring algorithm provides significant benefits when compared to the more exhaustive methods. This approach also facilitates other service activities, such as cross cloud service discovery.

2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


Author(s):  
Rawand Guerfel ◽  
Zohra Sbaï ◽  
Rahma Ben Ayed

Cloud computing is increasingly used so that the number of providers offering services is rapidly increasing. Thus, a need to organize these services and to express relations between them arises. To answer this need, ontologies are used. To query these services, the authors use query languages, such as SPARQL, that return two types of results: either a list of required services, or an empty list. However, the second result is not desired. In fact, if the required service is not available, users want to be offered by a list of similar ones instead of the empty list. It is in this sense that the similarity, which provides more results ranked according to their utilities, is used. This paper first presents the Cloud ontology on which the authors' work is based. It then defines and compares between two Cloud service discovery methods which are: the discovery based on query languages and the discovery based on similarity. To show the efficiency of the search based on similarity, the authors propose a search engine that allows the users to query services using a simple to use interface.


2014 ◽  
Vol 989-994 ◽  
pp. 5498-5503
Author(s):  
Chun Xiao Wang ◽  
Ying Guo ◽  
Xiu Gang Guo

Based on the research in cross-regional resource scheduling and massive data storage, the article built public service platform including IaaS, PaaS and SaaS. It provided all kinds of management software and business software for middle size enterprise users, and provided the development, testing, deployment platform for software vendors, and provided unified resource management, monitoring and maintenance for platform operators which finally become cloud service platform to support enterprise management and software development lifecycle. This helps to form a self-loop and self-development cloud computing ecosystem, to form the linkage of cloud services production, cloud services consumption and cloud service management, and to provide comprehensive information support for the growth and development of middle size enterprise.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


2012 ◽  
Vol 241-244 ◽  
pp. 3177-3183
Author(s):  
Jie Zhang ◽  
Li Wen He ◽  
Fei Yi Huang ◽  
Bin Liu

This paper proposed a service discovery architecture (SDA) that can be applied in cloud computing environments. This architecture supports common service discovery capabilities to achieve cloud service discovery function in cloud computing environments. The main idea is that, cloud services can be divided into different cloud service domains (CSD) according to the characteristics of the functions of cloud services, each CSD has a sub-service directory, and there is also a root service directory above all sub-service directories. Setting of two-level service directories can achieve the most suitable massive cloud services quickly. Finally, through mathematical modeling, theoretical analyses, and numerical simulations, the performance analyses of the architecture are studied. The results show the validity and advantages of the SDA.


2013 ◽  
Vol 760-762 ◽  
pp. 1758-1761
Author(s):  
Ji Ming Lan ◽  
Shu Jie Lu ◽  
Li Ming Zhang

Proposed that idea of cloud computing ecology development, supports and guiding cloud model deployment, the cloud service management and Clouds protocols observes the purification of mix cloud environment. Has designed the multiple dimension data saving structure and real-time mass-data processing of model as well as the asynchronous overall construction distributional ecology cloud structure. It has been shown that this ecology cloud structure is healthy.


Author(s):  
Göran Adamson ◽  
Lihui Wang ◽  
Magnus Holm ◽  
Philip Moore

The ideas of on-demand, scalable and pay-for-usage resource-sharing in Cloud Manufacturing are steadily attracting more interest. For implementing the concept of Manufacturing-as-a-Service in a cloud environment, description models and implementation language for resources and their capabilities are required. A standardized approach for systemized virtualization, servisilisation, retrieval, selection and composition into higher levels of functionality is necessary. For the collaborative sharing and use of networked manufacturing resources there is also a need for a control approach for distributed manufacturing equipment. In this paper, the technological perspective for an adaptive cloud service-based control approach is described, and a supporting information model for its implementation. The control is realized through the use of a network of intelligent and distributable Function Block decision modules, enabling run-time manufacturing activities to be performed according to actual manufacturing conditions. The control system’s integration to the cloud service management functionality is described, as well as a feature-level capability model and the use of ontologies and the Semantic Web.


Sign in / Sign up

Export Citation Format

Share Document