Abstract
In cloud service domain, an acceptable standard of quality of service (QoS) must be maintained for subscribed services. The performance measurement of those cloud services is based on the satisfaction of customers with respect to the pre-defined QoS. Deviation of QoS as mentioned in SLA results dissatisfaction among users. A large numbers of business entities and consumers are involved in this service delivery process. In business environment, guaranteeing the QoS and establishing the service contracts are essential. However, for the service providers, it is challenging to maintain the QoS at run-time. Moreover, even if it is maintained, additional cost may be needed. Sometime a categorization among the consumers (premium or ordinary) is also required due to the limitation of the resources. Thus, the service management for ensuring the delivery with desired QoS at least for the premium consumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lawler, C.M.: Cloud service broker model-sustainable governance for efficient cloud utilization. Green IT Cloud Summit, Washington, D.C, Sheraton Premier, Tysons Corner, 18 Apr 2012
Hassan, M.M., Song, B., Huh, E.N.: A market-oriented dynamic collaborative cloud services platform. Ann. Telecommun. 65, 669–688 (2010). doi:10.1007/s12243-010-0184-0
Cloud computing vulnerability incidents: a statistical overview. Cloud Vulnerabilities Working Group, Cloud Security Alliance (2013)
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE (2010)
Cloud computing-benefits, risks and recommendations for information security. European Network and Information Security Agency, December 2012
Gmach, D., Roliat, J., Cherkasovat, L., Belrose, G., Turicchi, T., Kemper; A.: An integrated approach to resource pool management: policies, efficiency and quality metrics. In: International Conference on Dependable Systems & Networks: An-chorage, IEEE, Alaska, 24–27 June 2008
Toosi, A.N., Calheiros, R.N., Thulasiram, R.K., Buyya, R.: Re-source provisioning policies to increase IaaS provider’s profit in a federated cloud environment. In: IEEE International Conference on High Performance Computing and Communications 2011
Ward, B.T., Sipior, J.C.: The Internet jurisdiction risk of cloud computing. Inf. Syst. Manag. 27(4), 334–339 (2010)
Farrell, R.: Securing the cloud—governance, risk, and compliance issues reign supreme. Inf. Secur. J.: A Global Perspect. 19(6), 310–319 (2010)
Cidon, A., et al.: Copysets: reducing the frequency of data loss in cloud storage. Presented as part of the 2013 USENIX Annual Technical Conference. USENIX, (2013)
Wang, C., et al.: Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, Proceedings IEEE, (2010)
Jensen, M., et al.: On technical security issues in cloud computing. IEEE International Conference on Cloud Computing. CLOUD’09. IEEE (2009)
Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol 3(4), 2672–2676 (2011)
Fortis, T.F., Munteanu, V.I., Negru, V.: Steps towards cloud governance. a survey. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), IEEE (2012)
Bezuidenhout, M., Mouton, F., Venter, H.S.: Social engineering attack detection model: SEADM. Information Security for South Africa (ISSA). IEEE (2010)
Raj, H., et al.: Resource management for isolation enhanced cloud services. In: Proceedings of the ACM workshop on Cloud computing security. ACM (2009)
Bakshi, A., Yogesh, B.: Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks. ICCSN’10, IEEE (2010)
http://searchcloudcomputing.techtarget.com/feature/Cloud-computing-licensing-Buyer-beware
Cordell N.: Intellectual property in the cloud. Allen &Overy LLP, May 2013
Vrable, M., Savage, S., Voelker, G.M.: Cumulus: filesystem backup to the cloud. ACM Trans. Storage (TOS) 5(4), 14 (2009)
Marinos, A., Briscoe, G.: Community cloud computing. Cloud computing, pp. 472–484. Springer, Berlin (2009)
Evangelinos, C., Hill, C.: Cloud computing for parallel scientific HPC applications: feasibility of running coupled atmosphere-ocean climate models on amazon’s EC2. Ratio 2(2.40), 2–34 (2008)
Niu, D., et al.: Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. INFOCOM, IEEE (2012)
Crowe, H., Chan, W., Leung, H., Pili, H.: Enterprise risk management for cloud computing. Committee of Sponsoring Organizations of the Treadway Commission, June 2012. http://www.coso.org/documents/Cloud%20Computing%20Thought%20Paper.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this chapter
Cite this chapter
Bhattacharya, A., Choudhury, S. (2015). Service Insurance: A New Approach in Cloud Brokerage. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_3
Download citation
DOI: https://doi.org/10.1007/978-81-322-1988-0_3
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1987-3
Online ISBN: 978-81-322-1988-0
eBook Packages: EngineeringEngineering (R0)