ESaaSA 2014 Abstracts


Full Papers
Paper Nr: 1
Title:

Verifying Cloud Systems using a Bigraphical Maude-based Model Checker

Authors:

Zakaria Benzadri, Chafia Bouanaka and Faiza Belala

Abstract: Formal methods are system design techniques based on rigorous mathematical models to build software systems. Our aim in this paper is to define formal specifications of cloud systems and offer analysis support to formally model check their inherent properties. Hence, we define a formal semantic framework, based on Bigraphical Reactive Systems (BRS), for specifying cloud architectures and their shape shifting to ensure service availability and quick scalability. Then, we propose a Bigraphical Maude-based Model Checker to formally verify some properties.

Paper Nr: 2
Title:

Modelling Financial SaaS as Service Components

Authors:

Muthu Ramachandran and Victor Chang

Abstract: Financial applications demand better performance and accuracy in a cloud than the traditional computing platforms. Therefore, designing financial software as a service (FSaaS) requires engineering and systematic approach. This paper has designed a financial SaaS component model and a service architecture supporting required flexibility, scalability, and allowing change in environment. This paper has proposed an integrated service-oriented architecture and a SaaS component model for financial domain that provides trequired scalability, flexibility and customisation. We have also demonstrated the design and customisation of service component interfaces to the financial simulation so that it provides automatic prediction models for investors to know accurate results in buy and sale prices. Therefore, large-scaled simulations can be achieved within a matter of seconds (13.5 seconds).

Paper Nr: 3
Title:

The Big Data Analysis for Measuring Popularity in the Mobile Cloud

Authors:

Victor Chang

Abstract: This paper presents the Big Data analysis for measuring popularity in the Mobile Cloud, which is an emerging area in the Cloud and Big Data Computing. Organizational Sustainability Modeling (OSM) is the proposed method used in this research. The twelve-month of German consumer data is used for the analysis to investigate the return and risk status associated with the popularity in the Mobile Cloud services. Results show that there is a decline in the usage due to the economic downturn and competitions in the market. Key outputs have been explained and they confirm that all analysis and interpretations fulfil the criteria for OSM. The use of statistical and visualization method proposed by OSM can expose unexploited data and allows the stakeholders to understand the status of return and risk of their Cloud strategies easier than the use of other data analysis.

Paper Nr: 4
Title:

Introduction to the Risk Visualization as a Service

Authors:

Victor Chang

Abstract: This paper introduces the Risk Visualization as a Service (RVaaS) and presents the motivation, rationale, methodology, Cloud APIs used, operations and examples of using RVaaS. Risks can be calculated within seconds and presented in the form of Visualization to ensure that unexploited areas are exposed. RVaaS operates in two phases. The first phase includes the risk modeling in Black Scholes Model (BSM), creating 3D Visualization and Analysis. The second phase consists of calculating key derivatives such as Delta and Theta for financial modeling. Risk presented in visualization allow the potential investors and stakeholders to keep track of the status of risk with regard to time, prices and volatility. Results in experiments show that RVaaS can perform up to 500,000 simulations and complete all simulations within 22 seconds. RVaaS provides a structured way to deploy low cost, high quality risk assessment and support real-time calculations.

Paper Nr: 5
Title:

Citizen Intention to Adopt e-Government Services in Saudi Arabia

Authors:

Sulaiman A. Alateyah, Victor Chang, Richard M. Crowder and Gary B. Wills

Abstract: Although e-Government has been adopted in developed countries, it has not been widely adopted in developing countries particularly in the Arab world. This explains our motivation in identifying factors that can improve the adoption of e-Government in Saudi Arabia. While there are challenges ahead for e-Government adoption, we have identified ten factors that can influence successful delivery. These factors were defined and categorized and followed by an exploratory study to examine the importance of these factors. In order to validate our hypothesis, we used questionnaires to collect the views of three groups of Saudi citizens, and use the triangulation method to validate our results. Our statistical results show that we have very low t-test value in our one sample t-test which supports our hypothesis by identifying ten important factors for Saudi citizen adoption of e-Government services. We conclude that these ten factors can determine the successful adoption of e-Government in Saudi Arabia and meet the strategic plan set by the Saudi government in accessing what is required to increase adoption.

Paper Nr: 7
Title:

Performance Evaluation of Multi-Core Multi-Cluster Architecture (MCMCA)

Authors:

Norhazlina Hamid, Robert J. Walters and Gary B. Wills

Abstract: A multi-core cluster is a cluster composed of numbers of nodes where each node has a number of processors, each with more than one core within each single chip. Cluster nodes are connected via an interconnection network. Multi-cored processors are able to achieve higher performance without driving up power consumption and heat, which is the main concern in a single-core processor. A general problem in the network arises from the fact that multiple messages can be in transit at the same time on the same network links. This paper considers the communication latencies of a multi core multi cluster architecture will be investigated using simulation experiments and measurements under various working conditions.

Paper Nr: 9
Title:

A View at Desktop Clouds

Authors:

Abdulelah Alwabel, Robert Walters and Gary Wills

Abstract: Cloud has emerged as a new computing paradigm that promises to move into computing-as-utility era. Desktop Cloud is a new type of Cloud computing. It merges two computing models: Cloud computing and volunteer computing. The aim of Desktop Cloud is to provide Cloud services out of infrastructure that is not made for this purpose in order to reduce running and maintenance costs. This paper discusses this new type of Cloud by comparing it with current Cloud and Desktop Grid models. It, also, presents several research challenges in Desktop Cloud that require further attention.

Paper Nr: 10
Title:

Cloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework

Authors:

Muthu Ramachandran and Victor Chang

Abstract: This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and feature for CCAF. The CCAF implemen-tations have been illustrated to show how to enforce security and ensure all suers are protected. It provides three layers of security in Access control and firewalls; Intrusion Detection Systems (IDS) and Prevention System; and Isolation Management to maintain a high level of Cloud security. CCAF security offers a framework to serve the Cloud community. The key characteristics have been explained. We will develop more service updates and demonstrations for our forthcoming projects to ensure that CCAF security can provide more use cases and added value to the Cloud community.

Paper Nr: 11
Title:

A Proposed Case for the Cloud Software Engineering in Security

Authors:

Victor Chang and Muthu Ramachandran

Abstract: This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security. While other literature does not provide a proposal for Cloud security as yet, we use Business Process Modeling Notation (BPMN) to illustrate the concept of CSES from its design, implementation and test phases. BPMN can be used to raise alarm for protecting Cloud security in a real case scenario in real-time. Results from BPMN simulations show that a long execution time of 60 hours is required to protect real-time security of 2 petabytes (PB). When data is not in use, BPMN simulations show that the execution time for all data security rapidly falls off. We demonstrate a proposal to deal with Cloud security and aim to improve its current performance for Big Data.

Short Papers
Paper Nr: 8
Title:

Review and Analysis of Cloud Computing Quality of Experience

Authors:

Fash Safdari and Victor Chang

Abstract: Cloud computing is gaining growing interest from industry, organizations and the research community. The technology promises many advantages in terms of cost saving by allowing organizations and users to remotely gain access to a huge pool of data storage and processing power. However, migrating services to cloud computing introduce new challenges in performance and service quality. Quality of service (QoS) is and has been used as a means of monitoring cloud service performance. However, QoS is based on network parameters which do not necessarily reflect users’ quality of experience. This paper discusses cloud computing quality of experience as perceived by the person using the cloud-based applications and services. We also review a selected current contribution to the quality of experience (QoE). We have expert reviews undertaken to identify six key performance indicators (PKIs). Based on these six KPIs, we sent our surveys, collected feedback and analyze data to confirm that QoE measurement can meet organizational goals, user satisfaction and stakeholders’ requirements.