{"title":"A New Trust Management Architecture for Cloud Computing Environment","authors":"M. K. Muchahari, S. Sinha","doi":"10.1109/ISCOS.2012.30","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.30","url":null,"abstract":"Cloud Computing is a new emerging computational model. Cloud features like rapid elasticity, pay per use, location independence, on demand infrastructure providing capability and everywhere network access are attracting both Cloud consumers and providers. But there are several concerns relating to security, privacy and trust that hinders the adoption of cloud in spite of several beneficial features. In this paper, we present a trust management architecture which consist of a Cloud Service Registry and Discovery which serves as cloud providers' registry and lists their respective trust values, a Trust Calculator that calculates CSP's trust based on feedbacks of two parameters namely SLA and QoS. A Dynamic Trust Monitor keeps watch on the deviating trust values with time and transactions.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132889532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Integrating Time-Preference and Concession Models Into Cloud Computing Negotiations","authors":"K. Venkataraghavan, R. Sundarraj","doi":"10.1109/ISCOS.2012.9","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.9","url":null,"abstract":"Cloud computing offers information technology resources like infrastructure, platform and software in the form of on-demand services. Adoption of cloud yields several benefits to the consumer and these benefits could be realized to their fullest potential in a market based mechanism. At present, commercial marketplaces for cloud-based services are in their infancy. Nevertheless, we are gradually moving towards marketplaces like Amazon AWS. In future, electronic agents would negotiate on the behalf of consumers in procuring a service from cloud markets. In negotiating a cloud-service, the agents should be capable of representing their principals' preferences. These preferences help the agents to improve the outcome of a negotiation. The possibility of a successful outcome can be enhanced by exploiting trade-offs that are driven by preferences among multiple issues. One such preference is time preference which can modeled using time discount functions and is useful in generating price and time trade-offs. In this paper, we propose a hyperbolic discounting model based on the theory of intertemporal choice to generate price and time trade-offs. Further, we provide an algorithm to integrate hyperbolic discounting function based trade-off model with a time dependent tactic (TDT) based concession model in the negotiation process.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121734317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composing and Maintaining a Pattern-Based Workflow as a Constraint Graph","authors":"Achyanta Sarmah, S. Hazarika, S. Sinha","doi":"10.1109/ISCOS.2012.36","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.36","url":null,"abstract":"The context of any workflow has functional and non functional characteristics. Functional characteristics like ordering of tasks, execution rules etc. give rise to Workflow Patterns (WPs). It is always possible to recognize instances of these patterns in a given workflow and vice versa. The WPs in a given workflow are invariably related to one another. In practice, both run-time and design-time changes may occur to these relationships after the initial enactment. Run-time changes could occur due to roles executing the patterns. Design-time changes could occur due to changing user specifications and subsequent decisions being taken by the workflow composer. An approach of accommodating and propagating such changes is required. Further, these changes are to be accommodated in such a manner that the relationships between the existing patterns remain consistent. This paper proposes an approach that facilitates composition and accommodation of change into the composed workflow.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation","authors":"Purushothama B, B. B. Amberker","doi":"10.1109/ISCOS.2012.16","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.16","url":null,"abstract":"Data outsourcing on to the public cloud faces several security challenges. Ensuring the confidentiality of the outsourced sensitive data is of paramount importance for the adoption of public cloud for data outsourcing. Often the cloud storage servers are untrusted. Encryption method is used for maintaining the confidentiality of the outsourced data. Performing the queries on the encrypted data is a challenging task. Adversary should not gain any significant information other than the minimal information by observing the queries and the query responses. In this work, we provide two solutions which are efficient in processing the queries on the encrypted data. We focus on improving the performance of the query processing without compromising the privacy of the data and the queries. We show that adversary can gain no significant information about the data other than the minimal information which cannot be avoided. We conduct the empirical performance evaluations and compare with the scheme available in the literature. Our experiments show that the proposed schemes are efficient in comparison with the existing scheme.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K. M. Murthy, Y. Patel, H. A. Sanjay, M. N. Ameen
{"title":"Prediction Based Dynamic Configuration of Virtual Machines in Cloud Environment","authors":"M. K. M. Murthy, Y. Patel, H. A. Sanjay, M. N. Ameen","doi":"10.1109/ISCOS.2012.18","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.18","url":null,"abstract":"In cloud world software and computer infrastructure (virtual machine, network, storage etc) are given as metered service. In infrastructure providers (Amazon EC2, Rack Space etc.) The Virtual Machine (VM) size is static. Depending on the capacity of the VM the prices are fixed and pay as you go model is used. Since the VM size is static there is a high possibility of mismatch between application resource requirement and VM capacity. If the VM capacity is more than the application requirement, even though user is not utilizing the entire VM capacity he will be unnecessarily paying the extra money and also in this case resource utilization is not efficient. If the VM capacity is less than the application requirement then the application performance will degrade. With this motivation this work presents a prediction based dynamic configuration framework for virtual machines which predicts the required computing resources of the application and configures the VM as per the application requirement. To capture the characteristic of cloud application RAIN (which is a workload generation toolkit) has been used. To evaluate our prediction model we are using Olio which is a cloud benchmark application. With our approach an average error rate of 8% - 10% is observed.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Diagnostics Using Cloud Computing with Fuzzy Logic and Uncertainty Factors","authors":"V. Aswin, S. Deepak","doi":"10.1109/ISCOS.2012.29","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.29","url":null,"abstract":"Cloud computing being a very effective and enhanced tool puts us to the notion that it can be applied in medical domain to make it useful for the society. Diagnosis of Diabetes can be proven useful by tracking down its symptoms and fuzzification of the classic symptom levels. Compositional rules of inferences are applied to make conclusions about probability of occurrence of the disease. It leads to the chances of getting awareness about diabetes control before health complications. Across the globe every patient has his own unique symptoms which are maintained and retrieved by local hosts via cloud computing. Embedding the mathematical symptom -- disease diagnosis blended with cloud computing leads to results that can be very useful for physicians and medical researchers in the sacrosanct field to make life saving conclusions from the analysis of the database. The software based analysis of symptoms with diseases is carried out according to Encryption Standards to make it more secure avoiding privacy issues.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing","authors":"J. Sujana, T. Revathi","doi":"10.1109/ISCOS.2012.12","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.12","url":null,"abstract":"Cloud computing is an emerging computing technology that allows us to implement their own services using on-demand IT infrastructures.1 The idea behind this approach is to provide a new model of infrastructure provisioning which can create elastic on-demand IT infrastructures according to the changing requirements. In our work we have proposed to use this on-demand service for data storage typically in an Educational Institution. But, this new technology suffers security issues. To solve this problem we have proposed to incorporate public audit ability and data dynamics for Data Storage as a Service with a Trusted Third Party auditor. Thus making the owners of the data to store their data remotely in the cloud data storage and thereby making them to enjoy on-demand high-quality data storage service from the shared pool of data storage.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated License Management and Economic Resource Allocation Model for Cloud Computing","authors":"P. B. Thorat, A. Sarje","doi":"10.1109/ISCOS.2012.31","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.31","url":null,"abstract":"Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. Cloud computing is on-demand computing in which the computing resources are owned and managed by a service provider and the users access the resources via the Internet. But cloud computing potential doesn't begin and end with the personal computer's transformation into a thin client. License management and economic resource allocation is a major issue faced by cloud computing paradigm. In this paper we propose MobiLim, a framework which addresses major problems related to license management and economic resource allocation in cloud computing. This framework named MobiLim is managed by independent software vendor (ISVs), who controls access to the resource provider resources. MobiLim provides a secure and robust license management solution as well as allocate resources economically to the customers.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delivering LBA with LBS Using Service-Oriented Architecture","authors":"Melwyn D'Souza, V. S. Ananthanarayana","doi":"10.1109/ISCOS.2012.15","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.15","url":null,"abstract":"Location-Based Advertising (LBA) is the most happening and latest thing in the marketing process. LBA provides advertisements (ads) based on the mobile user's current geographic position. LBA becomes more effective when advertisements are made available to mobile users according to their choice and taste. This paper covers a simple pull based LBA system which is integrated with a Service-Oriented Architecture (SOA) based Location-Based Services (LBS) system. This system is implemented using open standards based Web services technology which supports dynamic discovery and interoperability. This is a special kind of system which allows service providers to publish both services and their advertisements together at one place. The proposed system is demonstrated using a restaurant finder mobile application.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Thirumaran, D. Ponnurangam, K. Rajakumari, G. Nandhini
{"title":"Evaluation Model for Web Service Change Management Based on Business Policy Enforcement","authors":"M. Thirumaran, D. Ponnurangam, K. Rajakumari, G. Nandhini","doi":"10.1109/ISCOS.2012.13","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.13","url":null,"abstract":"Today organizations in all industries particularly financial services, retail and communications are increasingly dependent upon IT and a highly available network to meet their business objectives. As customer expectations and demands rise, network operations teams are focusing on IT service-quality improvement and achieving higher levels of availability by re-examining processes and procedures particularly in the area of change management because changes to the network are often a source of downtime. Growing complexity of customer needs is one of the prevailing problems faced by IT enterprises at present, leading to increasingly complex IT service management systems. At the same time, quick response to unexpected problems and externally imposed requirements are testing the IT change management. Although there exists many change management issues and solutions, there is no proper support for efficient change evaluation and monitoring. Present change management works are done only in the web service interface such as WSDL Web Service Definition Language and there is no proper support for dynamic nature in them. In order to provide a flexible environment for the Business Analyst to perform the emergency changes over the service business logic without the need of IT staff and also to evaluate changes made, we propose a Finite State Machine based Evaluation Model for Web Service Runtime Change Management and also a set of change factors to evaluate runtime changes of web services. Among which we mainly focus on the factor Business Policy Enforcement which is used for checking whether there is any policy violation with respect to the changes made. We first define the various change factors and derive a mathematical solution for each one. The derived solution is considered as the change measure for individual change factor. A case study from banking domain is provided to validate the proposed framework.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}