Dynamic Cloud Allocation by Managing Web Services and by Implementing Portfolio Thinking and Design Diversity
Web services have gained growing interest due to their importance in developing Business to Business (B2B) or web applications. Simultaneously, cloud computing promises the delivery of reliable, affordable and on-demand services, which can be leased or traded. The popularity of the cloud and its distinctive economies of scale computation advantages make a cloud-based market a plausible and attractive option for publishing and trading web services. Conversely, offering web services through a cloud-based market has underlying risks associated with probable service failure – for instance, because of undependable service provision of the cloud service provider, hardware malfunctions or unpredicted fluctuations in demands for the traded service as a shared resource, etc. All these factors may increase the risks associated with Service Level Agreement (SLA) violations for web applications benefiting from the cloud-based market. Our work views the cloud as a marketplace for trading in-stances of web services, which web applications can explore trade and use as substitutable and compassable entities in the architecture of cloud-based service applications.
L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008.
X. Yu and Q. Wen, “Design of security solution to mobile cloud storage,” in Knowledge Discovery and Data Mining. Springer, 2012, pp. 255–263.
D. Huang, “Mobile cloud computing,” IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 2011.
O. Mazhelis, G. Fazekas, and P. Tyrvainen, “Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage,” in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012, pp. 646–653.
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, “Virtualized in-cloud security services for mobile devices,” in Proceedings of the First Workshop on Virtualization in Mobile Computing. ACM, 2008, pp. 31–35.
J. Oberheide and F. Jahanian, “When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments,” in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. ACM, 2010, pp. 43–48.
A. A. Moffat, T. C. Bell et al., Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann Pub, 1999.
D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.