Skip to main content

Service Insurance: A New Approach in Cloud Brokerage

  • Chapter
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 305))

Abstract

In cloud service domain, an acceptable standard of quality of service (QoS) must be maintained for subscribed services. The performance measurement of those cloud services is based on the satisfaction of customers with respect to the pre-defined QoS. Deviation of QoS as mentioned in SLA results dissatisfaction among users. A large numbers of business entities and consumers are involved in this service delivery process. In business environment, guaranteeing the QoS and establishing the service contracts are essential. However, for the service providers, it is challenging to maintain the QoS at run-time. Moreover, even if it is maintained, additional cost may be needed. Sometime a categorization among the consumers (premium or ordinary) is also required due to the limitation of the resources. Thus, the service management for ensuring the delivery with desired QoS at least for the premium consumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lawler, C.M.: Cloud service broker model-sustainable governance for efficient cloud utilization. Green IT Cloud Summit, Washington, D.C, Sheraton Premier, Tysons Corner, 18 Apr 2012

    Google Scholar 

  2. Hassan, M.M., Song, B., Huh, E.N.: A market-oriented dynamic collaborative cloud services platform. Ann. Telecommun. 65, 669–688 (2010). doi:10.1007/s12243-010-0184-0

    Article  Google Scholar 

  3. Cloud computing vulnerability incidents: a statistical overview. Cloud Vulnerabilities Working Group, Cloud Security Alliance (2013)

    Google Scholar 

  4. Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE (2010)

    Google Scholar 

  5. Cloud computing-benefits, risks and recommendations for information security. European Network and Information Security Agency, December 2012

    Google Scholar 

  6. Gmach, D., Roliat, J., Cherkasovat, L., Belrose, G., Turicchi, T., Kemper; A.: An integrated approach to resource pool management: policies, efficiency and quality metrics. In: International Conference on Dependable Systems & Networks: An-chorage, IEEE, Alaska, 24–27 June 2008

    Google Scholar 

  7. Toosi, A.N., Calheiros, R.N., Thulasiram, R.K., Buyya, R.: Re-source provisioning policies to increase IaaS provider’s profit in a federated cloud environment. In: IEEE International Conference on High Performance Computing and Communications 2011

    Google Scholar 

  8. Ward, B.T., Sipior, J.C.: The Internet jurisdiction risk of cloud computing. Inf. Syst. Manag. 27(4), 334–339 (2010)

    Article  Google Scholar 

  9. Farrell, R.: Securing the cloud—governance, risk, and compliance issues reign supreme. Inf. Secur. J.: A Global Perspect. 19(6), 310–319 (2010)

    Google Scholar 

  10. Cidon, A., et al.: Copysets: reducing the frequency of data loss in cloud storage. Presented as part of the 2013 USENIX Annual Technical Conference. USENIX, (2013)

    Google Scholar 

  11. Wang, C., et al.: Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, Proceedings IEEE, (2010)

    Google Scholar 

  12. Jensen, M., et al.: On technical security issues in cloud computing. IEEE International Conference on Cloud Computing. CLOUD’09. IEEE (2009)

    Google Scholar 

  13. Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol 3(4), 2672–2676 (2011)

    Google Scholar 

  14. Fortis, T.F., Munteanu, V.I., Negru, V.: Steps towards cloud governance. a survey. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), IEEE (2012)

    Google Scholar 

  15. Bezuidenhout, M., Mouton, F., Venter, H.S.: Social engineering attack detection model: SEADM. Information Security for South Africa (ISSA). IEEE (2010)

    Google Scholar 

  16. Raj, H., et al.: Resource management for isolation enhanced cloud services. In: Proceedings of the ACM workshop on Cloud computing security. ACM (2009)

    Google Scholar 

  17. Bakshi, A., Yogesh, B.: Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks. ICCSN’10, IEEE (2010)

    Google Scholar 

  18. http://searchcloudcomputing.techtarget.com/feature/Cloud-computing-licensing-Buyer-beware

  19. Cordell N.: Intellectual property in the cloud. Allen &Overy LLP, May 2013

    Google Scholar 

  20. Vrable, M., Savage, S., Voelker, G.M.: Cumulus: filesystem backup to the cloud. ACM Trans. Storage (TOS) 5(4), 14 (2009)

    Google Scholar 

  21. Marinos, A., Briscoe, G.: Community cloud computing. Cloud computing, pp. 472–484. Springer, Berlin (2009)

    Google Scholar 

  22. Evangelinos, C., Hill, C.: Cloud computing for parallel scientific HPC applications: feasibility of running coupled atmosphere-ocean climate models on amazon’s EC2. Ratio 2(2.40), 2–34 (2008)

    Google Scholar 

  23. Niu, D., et al.: Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. INFOCOM, IEEE (2012)

    Google Scholar 

  24. Crowe, H., Chan, W., Leung, H., Pili, H.: Enterprise risk management for cloud computing. Committee of Sponsoring Organizations of the Treadway Commission, June 2012. http://www.coso.org/documents/Cloud%20Computing%20Thought%20Paper.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adrija Bhattacharya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this chapter

Cite this chapter

Bhattacharya, A., Choudhury, S. (2015). Service Insurance: A New Approach in Cloud Brokerage. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1988-0_3

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1987-3

  • Online ISBN: 978-81-322-1988-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics