• Title/Summary/Keyword: Cloud Service Providers

Search Result 155, Processing Time 0.021 seconds

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

A Study on the Adoption Behavior of B2C Public Cloud Service in Korea (B2C 클라우드 서비스 채택의도의 영향요인에 관한 연구)

  • Roh, Doo-Hwan;Chang, Suk-Gwon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.57-68
    • /
    • 2012
  • The recent proliferation of various smart devices like the smartphone, tablet PC, and smart TV enables consumers to download various applications from the network and to access private files stored in their desktop server at any time and at any place. The trend of ubiquitous access seems to have become stronger and more diversified toward a ubiquitous network computing environment with the aggressive deployment of commercial cloud services. Recently, many Korean network service providers launched commercial B2C public cloud services, which were widely adopted by smart device users. They include Daum cloud, N drive, ucloud, and uplus box, mostly provided by major Korean telecom companies and portals. This paper aims to explore consumers' adoption behaviors toward the B2C public cloud services that were recently deployed in the Korean market. In order to achieve the goal, we identified key influencing factors that affect the consumers' adoption behaviors, based on an extension of the technology acceptance model (TAM). Several hundred smart device users were surveyed to test the generic regression model with the extended set of TAM variables.

PCIA Cloud Service Modeling and Performance Analysis of Physical & Logical Resource Provisioning (PCIA 클라우드 서비스 모델링 및 자원 구성에 따른 성능 영향도 분석)

  • Yin, Binfeng;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Cloud computing provides flexible and efficient mass data analysis platform. In this paper, we define a new resource provisioning architecture in the public cloud, named PCIA. In addition, we provide a service model of PCIA and its new naming scheme. Our model selects the proper number of physical or virtual resources based on the requirements of clients. By the analysis of performance variation in the PCIA, we evaluate the relationship between performance variation and resource provisioning, and we present key standards for cloud system constructions, which can be an important resource provisioning criteria for both cloud service providers and clients.

A Study on trend Analysis and Future Prospects of Cloud Game Industry - Focus on Device, Platform, Contents - (클라우드 게임산업 동향분석 및 전망에 관한 연구 - 디바이스, 플랫폼, 콘텐츠를 중심으로 -)

  • Doo, Ill Chul;Baek, Jae Yong;Shin, Hyun Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.181-195
    • /
    • 2014
  • The game Industry has been a major leader in business world with its size and volume in terms of profit and culture contents, and ever increasing at the moment. Cloud Game has appeared as a new, combined game format, playable on smart TV and smart phone with its upgraded storage size and fast spreading N-screen. This research studies the present reality of the cloud industry by focusing on three categories which are device type, Platform, and game contents consequently in order to determine the future prospect of cloud games. First, the cloud game business will thrive as devices such as smart TV and smart phone are used widely. Second, the cloud game industry will have a new era when OS systems of Platform are united effectively. Third, the previous platform holders will have to face new challenges brought up by cloud games' service providers. Forth, the gamer, developer, and service provider need each other in order to widen the spectrum of business in cloud game industry.

Selecting the Right ERP System for SMEs: An Intelligent Ranking Engine of Cloud SaaS Service Providers based on Fuzziness Quality Attributes

  • Fallatah, Mahmoud Ibrahim;Ikram, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.35-46
    • /
    • 2021
  • Small and Medium Enterprises (SMEs) are increasingly using ERP systems to connect and manage all their functions, whether internally between the different departments, or externally with customers in electronic commerce. However, the selection of the right ERP system is usually an issue, due to the complexities of identifying the criteria, weighting them, and selecting the best system and provider. Because cost is usually important for SMEs, ERP systems based on Cloud Software as a Service (SaaS) has been adopted by many SMEs. However, SMEs face an issue of selecting the right system. Therefore, this paper proposes a fuzziness ranking engine system in order to match the SMEs requirements with the most suitable service provider. The extensive experimental result shows that our approach has better result compared with traditional approaches.

Investigating the Influence of the Perceived Cloud Service Risks on the Intention to Use the Abandonment Option: The Moderation Effect of IS Maturity and the Mediation Effect of Cloud Service Satisfaction (클라우드 서비스 위험이 포기옵션 사용의도에 미치는 효과에 대한 조절변수와 매개변수 연구: IS성숙도 수준의 조절효과와 클라우드 서비스 만족도의 매개효과)

  • Kang, So Ra;Nam, Seung Hyeon;Yang, Hee Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.65-77
    • /
    • 2017
  • We Investigated the Two Additional Effects Regarding the Causal Relationship between the Perceived Risks of cloud Services on the Intention to use the Abandonment Option. First, we Empirically Tested the Moderation Effect of IS Maturity on the Causal Relationship between these Two Variables. Second, we also Investigated the Mediation Effect of Cloud Service Satisfaction on the same Causal Relationship. We could find the Moderation and Mediation Effect only on the Influence of Relational Risk (Which Occurs from the Power Abuse of Cloud Service Providers) on the Intention to sue the Abandonment Option. So, we have better Understanding when and how the Abandonment Option is Attractive in Reducing the Potential Influence of the Relational Risk in using the Cloud Services.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching approach

  • Rajavel, Rajkumar;Thangarathinam, Mala
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2050-2077
    • /
    • 2015
  • One of the major issues in emerging cloud management system needs the efficient service level agreement negotiation framework, with an optimal negotiation strategy. Most researchers focus mainly on the atomic service negotiation model, with the assistance of the Agent Controller in the broker part to reduce the total negotiation time, and communication overhead to some extent. This research focuses mainly on composite service negotiation, to further minimize both the total negotiation time and communication overhead through the pre-request optimization of broker strategy. The main objective of this research work is to introduce an Automated Dynamic Service Level Agreement Negotiation Framework (ADSLANF), which consists of an Intelligent Third-party Broker for composite service negotiation between the consumer and the service provider. A broker consists of an Intelligent Third-party Broker Agent, Agent Controller and Additional Agent Controller for managing and controlling its negotiation strategy. The Intelligent third-party broker agent manages the composite service by assigning its atomic services to multiple Agent Controllers. Using the Additional Agent Controllers, the Agent Controllers manage the concurrent negotiation with multiple service providers. In this process, the total negotiation time value is reduced partially. Further, the negotiation strategy is optimized in two stages, viz., Classified Similarity Matching (CSM) approach, and the Truncated Negotiation Group Gale Shapely Stable Matching (TNGGSSM) approach, to minimize the communication overhead.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.