You are on page 1of 7

Volume No. 1 Issue No.

3 International Journal on ISSN: 2456-5695


Fundamentals of Science and Engineering Research

AN ASSESSMENT ON CLOUD COMPUTING


D.Divya [1] G.Sukanya [2]A.Divya [3]
[1,2, 3]
Dept. of Computer Science & Engineering, NBKRIST, Nellore, AP, India
.
divya.dakkili@gmail.com,gurramsukanya940@gmail.com,divya.20150902@gmail.com
ABSTRACT

Cloud computing is basically an Internet-based network made up of large numbers of servers - mostly based on open
standards, modular and inexpensive. Cloud computing applies traditional supercomputing, or high-performance
computing power, normally used by military and research facilities, to perform tens of trillions of computations per
second. In consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data
storage or to power large, immersive online computer games.To do this, cloud computing uses networks of large groups
of servers typically running low-cost consumer PC technology with specialized connections to spread data-processing
chores across them. This shared IT infrastructure contains large pools of systems that are linked together. Often,
virtualization techniques are used to maximize the power of cloud computing. Clouds contain vast amounts of information
and provide a variety of services to large numbers of people. The benefits of cloud computing are Reduced Data Leakage,
Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they Decrease
evidence transfer time the main factor to be discussed is security of cloud computing, which is a risk factor involved in
major computing fields. Cloud Computing can be described as web service oriented computing that provides an
environment which acts as a service in delivering software and information management in a way that would have
typically only been available in product format. This is done through personal devices such as a laptop that would
access the services available through the network of servers that is called the cloud Cloud Computing offers new ways
to provide useful services on demand at a much cheaper make-up. The technology is ever developing and there are many
cases of ongoing research to further improve this technology which inevitably will change the way businesses operate
forever and provide many new opportunities for organizations alike.

Keywords :- Data Leakage , Cloud Computing

I.INTRODUCTION

The appetite for a new generation of network-based applications both for consumers e.g. Twitter, Facebook, YouTube, Hulu,
Animator and for businesses e.g. Webmail, Google Docs, Zoho, is driving the need to reorganize current datacenter infrastructure for
massive scale. Another characteristic of the new web-based network applications is wildly fluctuating demand especially in the mass
consumer market. This need is stretching current IT architectures to their limits in terms of the ability to ensure on-demand service
availability, reliability, performance and security at a reasonable cost. While demand for network services is soaring, the economic
pressure to do more with less is also rising. With virtualization technologies becoming more accepted, public and private cloud
networks are emerging as an attractive means for sharing compute, storage and network resources amongst multiple service
developers and service delivery applications. Such a sharing of resources immediately provides economies of scale through
consolidation, energy savings and improved resource utilization.

More importantly, the ability to dynamically reallocate resources using virtualization technologies can help mitigate the need for
additional investment in infrastructure to meet sudden spikes in demand by temporarily diverting existing resources from low-priority
business applications to high priority businessapplications.While progress is certainly being made today with respect to resource
consolidation and capacity scaling, truly dynamic datacenter that ensures on-demand service creation, availability, reliability,
performance and security is still a vision that is yet to be realized. To that end, we make a case for an open standards appr oach -
similar to the one that has proven successful in establishing Intelligent Networks (IN) for Telecommunications (through ITU) and for
the Internet (through IETF), to enable massive scale and interoperability in all phases of service creation, delivery and assurance.

December 2016 Inside Journal (www.insidejournal.org) Page | 107


Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

Telecommunications Intelligent Networks have already demonstrated how today hundreds of thousands of developers create millions
of services that are consumed by billions of customers - who much like todays Web users, often create wild fluctuations in demand.
After analyzing the evolution of telecommunications networks and comparing it to the current state-of-the-art with respect to IT
datacenters, this paper identifies a key component called Virtual Resource Mediation Layer (VRML) that must be developed to
support scalability and interoperability of various public and private clouds. By analogy with the telecommunications network, this
layer will: x Mediate between networked applications and virtualized computing, network and storage resources with dynamic
provisioning; x Enable development of end-to-end or application to-spindle Fault, Configuration, Accounting, Performance and
Security (FCAPS) management based on business priorities using dynamic monitoring of workloads on computing, network and
storage resources and; x Allow the development of next generation converged service creation, delivery and assurance infrastructure
that is massively scalable and globally interoperable along with a new degree of agility. The VRML essentially mediates the
computing (CPU, and memory), Network (bandwidth) and storage (capacity, throughput and IO per second) resources between
various applications that request them just as the telecommunications network allocates the switching, transmission and access
resources to meet its IN service requirements. Using the VRML services, a Service Collaboration Network (SCN) Platform, can be
developed and provided by multiple service providers. The VRML approach proposed here offers a way to leverage emerging
virtualization technologies in combination with COTS (Commercial off the Shelf) hardware to radically transform the next generation
datacenters by moving more of the intelligence into the network. Additionally, deploying it does not require abandoning any current
IT investments as it can accommodate a gradual migration from todays IT deployments with existing complex management systems
to a more integrated and simplified virtualized computing, network and storage services platform that is massively scalable and
interoperable.

II.BUILDING BLOCKS OF CLOUD COMPUTING

Deployment Models :-Within a Cloud Deployment model as how in Figure 1, networking, platform, storage and software
infrastructure are considered as services which can be further cable up or down as per the consumer demands. The CloudComputing
model has four main deployment models that appendtube:

1. Private Cloud: Private cloud may be the phrase utilized to


Describe a cloud computing platform that's implemented inside the corporate firewall, under the power over the IT department. An
exclusive cloud was designed to provide the same product or service benefits of public cloud systems, but removes numerous
objections on the cloud computing model including control over enterprise and customer data, worries about security, and issues
connected to regulatory compliance . Only the organization and designated stakeholders may have access to operate on a concrete
Private cloud . One of the best examples of a private cloud is Eucalyptus Systems.

2. Public Cloud: A type of cloud computing where a company relies on a third-party cloud company for services including servers,
data storage and applications, which are shipped to the corporation through the Internet. A public cloud can free companies from the
potentially expensive costs of needing to purchase, manage and gaze after on-premises hardware and software infrastructure. Public
clouds could also typically be deployed faster with more scalability and accessibility than you are on-premises infrastructure due to
the population cloud providers expertise and existing infrastructure. Public cloud subscribers may pay pay-as-you-gofees or fixed
monthly fees for your public cloud services they utilize. Public cloud describes cloud computing in the traditional mainstream sense,
whereby resources are dynamically provisioned on a fine-grained, self-accommodation substratum over the Internet, via web
applications/web accommodations, from an off-site third-party provider who apportions resources and Billson a fine-grained utility
computing substratum . It is basically pay-per-use model, similar to a prepaid electricity metering system which is user-flexible to
cater the demand for cloud optimization. Security of public clouds are more vulnerable than the other cloud models because the
measures to prevent malicious attacks on public clouds are technically more difficult and of course expensive to handle. Examples of a
public cloud include Microsoft Azure, Google App Engine.

3. Hybrid Cloud: A combined way of private clouds and public clouds in which some critical data resides within the enterprises
private cloud while other results are held in and accessible at a public cloud. Hybrid clouds seek to offer the advantages of scalability,
reliability, rapid deployment and potential personal savings of public clouds with all the security and increased control and
management of private clouds. An example of a Hybrid Cloud includes Amazon Web Accommodations (AWS).

December 2016 Inside Journal (www.insidejournal.org) Page | 108


Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

Fig 1. Cloud Deployment Model

4.Community Cloud: Infrastructure shared by a few organizations for just a shared cause and may be managed by them or even a
third party service provider and rarely offered cloud model. These clouds tend to be based on an agreement between related business
organizations for instance banking or educational organizations. A cloud environment operating as outlined by this model may exist
locally or remotely. One particular community cloud includes Facebook. Moreover, using the technological advancements, we can
easily see derivative cloud deployment models emerging out of the various demands along with the requirements of users. A similar
example to be a virtual private cloud wherein a public cloud is used in a very private manner, attached to the internal resources from
the customers data-centre .With the emergence of high-end network technologies such as 2G, 3G, Wi-Fi, Wi-Max etc. a new
derivative of cloud computing has been emerged named as Mobile computing. That is popularly referred as Mobile Cloud
Computing (MCC). It can be looked as a composition of mobile technology and cloud computing infrastructure where data along with
the related processing could happen from the cloud simply with very that they be accessed by having a mobile tool and hence known
as mobile cloud computing . Its transforming into a trend now-a-days and a lot of organizations are keen to produce option of their
employees to gain access to office network by having a mobile device from anywhere. Recent advancements in technology including
the emergence of HTML5 and many other browser development tools just have increased the market for mobile cloud-computing. An
ever-increasing trend on the feature-phone adoption has additionally ramped the MCC market

Service Models:- In line with the different types of services offered, cloud computing can be considered to incorporate three layers:
software being a service (SAAS), platform being a Service (PAAS), and infrastructure like a Service (IAAS) Infrastructure as a
Service (IA as) is the lowest layer that delivers basic infrastructure support service. The middle layer is Platform as a Service (PaaS)
which provides environment for hosting end-users applications. Software like a Service (SaaS) may be the topmost layer which
comes with a complete application offered as service at will .

1. Software-as-a-Service (SaaS): Short for Software as a Service, SaaS is usually a software delivery method to provide entry
to software as well as functions remotely to be a Web-based service. Software as a Service allows organizations to access
business functionality at a cost typically less than spending money on licensed applications since SaaS pricing is founded on
a monthly fee. Also, because the software program is hosted remotely, users don't need to put money into additional
hardware. Software as a Service removes the advantages of organizations to deal with the installation, set-up and infrequently
daily upkeep and maintenance. Software as a Service will also be termed as simply hosted applications.
2. Storage-as-a-Service (SaaS): SaaS is often a term used to explain a storage model where a business or organization (you)
rents or leases safe-keeping coming from a third-party provider. Results are transferred on the client to the vendor through the
Internet and also the client would then access their stored data using software supplied by the storage provider. The software
program is used to perform common tasks related to storage, for instance data backups and data transfers. Storage as being a
Service is well-liked by SMBs since there are usually no start-up costs (e.g., servers, devices, IT staff and many others)
involved. Businesses pay for the service based only within the level of space for storing used. Storage to be a Service is often
called hosted storage. Examples of SaaS includes: Salesforce.com, Google Apps .
3. Platform as a Service (PaaS): Platform as a service (PaaS) is really a group of cloud computing services that delivers a
computing platform and also a solution stack being a service. Together with software as being a service (SaaS) and
infrastructure as a service (IaaS), it is a service model of cloud computing. On this model, the individual creates a software or
service using tools and/or libraries in the provider. The patron also controls software deployment and configuration settings.
The provider provides networks, servers, storage, and also other services which can be required to host the consumer's
December 2016 Inside Journal (www.insidejournal.org) Page | 109
Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

application. PaaS offerings facilitate the deployment of applications or services without worrying about cost and complexity
of purchasing andhandling the underlying hardware and software and provisioning hosting capabilities. All "as-a-service"
offerings are characterized as providing low initial cost, marginal cost as the service usage grows, self-service, best practices
built-in, resource sharing, automated deployment, management services, lifecycle management, and reuse. PaaS provides
these capabilities for application and service development. Examples of PaaS includes: Salesforce.com, Google App Engine
and Microsoft Azure .
4. Infrastructure as a Service (IaaS): Infrastructure like a service (IaaS) refers to the sharing of hardware helpful executing
services using Virtualization technology. The main objective of IaaS would be to make readily accessible of resources like
servers, network, storage etc. to the applications and systems more easily. Therefore IaaS includes basic infrastructure on-
demand services by using Application Programming Interfaces (API) for integrations with hosts, switches, routers, also the
capability of adding new equipments in the basic infrastructure in a transparent manner. On the whole, anyone does not
manage the main hardware in the cloud infrastructure, but he controls the systems, storage and deployed applications. The
vendor owns the gear and is liable for housing, running and it. The customer typically pays on the peruse basis. Examples of
IaaS include Amazon Elastic Cloud Computing (EC2), Amazon S3, GoGrid.Combining several kinds of clouds with the
delivery models we obtain an all natural cloud illustration as seen in Figure 2, flanked by connectivity devices along with
information security themes. Virtualized physical resources, virtualized infrastructure, along with virtualized middleware
platforms and business applications are provided and consumed as services in the Cloud [26]. Cloud vendors and clients
should maintainCloud computing security whatsoever interfaces.

Fig 2.Cloud computing models.

III.ENTITIES OF CLOUD COMPUTING

Cloud providers and consumers are the two main entities available market. Service brokers and Service resellers are also classified as
two newly emerging service level entities in the Cloud computing environments. These include discussed the following:
1. Cloud Providers: Cloud Providers includes Internet service providers (ISPs), telecommunication organizations, and large
BPOs that include media (Internet connections) or infrastructure (hosted data centers). This enables end-users to gain access
to cloud services. Companies also can include systems integrators that build and support data centers to host private clouds
and they can offer different services (e.g., SaaS, PaaS, IaaS, and etc.) to their consumers or to the service brokers, resellers,
etc
2. Cloud Service Brokers: Cloud Service Brokers includes technology consultants, business organizations, registered brokers,
agents, service agencies and promoters which guide consumers within the selection of cloud computing services. Service
brokers give full attention to the negotiation from the relationships between consumers and providers without owning or
handling the whole cloud infrastructure. Also, they add extra services together with Cloud providers.
3. Cloud Resellers: Resellers can be a key point through the Cloud market if the Cloud providers will further grow their
business across continents. Cloud providers may also choose local IT consultancy companies or resellers in their existing
products to act as new resellers to promote their Cloud-based products inside of particular region.
4. Cloud Consumers: Customers participate in the sounding Cloud consumers. However, also Cloud service brokers and
resellers can participate in this category as soon as there're customers of another Cloud provider, broker or reseller.

IV.HOW DOES CLOUD COMPUTING WORK?

Supercomputers today are used mainly by the military, government intelligence agencies, universities and research labs, and large
companies to tackle enormously complex calculations for such tasks as simulating nuclear explosions, predicting climate change,
designing airplanes, and analyzing which proteins in the body are likely to bind with potential new drugs. Cloud computing aims to
December 2016 Inside Journal (www.insidejournal.org) Page | 110
Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

apply that kind of powermeasured in the tens of trillions of computations per secondto problems like analyzing risk in financial
portfolios, delivering personalized medical information, even powering immersive computer games, in a way that users can tap
through the Web. It does that by networking large groups of servers that often use low-cost consumer PC technology, with specialized
connections to spread data-processing chores across them. By contrast, the newest and most powerful desktop PCs process only
about3 billion computations a second. Let's say you're an executive at a large corporation. Your particular responsibilities include
making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for
everyone isnt enough -- you also have to purchase software or softwarelicenses to give employees the tools they require. Whenever
you have a new hire, you have to buy more software or make sure your current software license allows another user. It's so stressful
that you find it difficult to go.

Fig 3.Typical Cloud Computing System

Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have
to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user
would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to
complex data analysis programs. It's called cloudcomputing, and it could change the entire computer industry. In a cloud computing
system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running
applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's
side decrease. The only thing the user's computer needs to be able to run is the cloud computingsystem'sinterface software, which
can be as simple as a Web browser, and the cloud's network takes care of the rest. Theres a good chance you've already used some
form of cloud computing. If you have an-mail account with a Web-based e-mail service like Hotmail, Yahoo! Mail or Gmail, then
youve had some experience with cloud computing. Instead of running an e-mail program on your computer, you log in to a Web e-
mail account remotely. The software and storage for your account doesn't exist on your computer -- it's on the service's computer
cloud.

V.SECURITY BENEFITS OF CLOUD


1. CENTRALIZED DATA :-

REDUCED DATA LEAKAGE :this is the benefit I hear most from Cloud providers - and in my view they are right.
How many laptops do we need to lose before we get this? How many backup tapes? The data landmines of today could
be greatly reduced by the Cloud as thin client technology becomes prevalent. Small, temporary caches on handheld
devices or Netbook computers pose less risk than transporting data buckets in the form of laptops. Ask the CISO of any
large company if all laptops have company mandated controls consistently applied; e.g. full disk encryption. Youll
see the answer by looking at the whites of their eyes. Despite best efforts around asset management and endpoint security
we continue to see embarrassing and disturbing misses. And what about SMBs? How many use encryption for sensitive
data, or even have a data classification policy in place?

MONITORING BENEFITS: central storage is easier to control and monitor. The flipside is the nightmare scenario of
comprehensive data theft. However, I would rather spend my time as a security professional figuring out smart ways to
protect and monitor access to data stored in one place (with the benefit of situational advantage) than trying to figure out
all the places where the company data resides across a myriad of thick clients! You can get the benefits of Thin Clients

December 2016 Inside Journal (www.insidejournal.org) Page | 111


Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

today but Cloud Storage provides a way to centralize the data faster and potentially cheaper. The logistical challenge
today is getting Terabytes of data tithe Cloud in the first place

2. INCIDENT RESPONSE / FORENSICS:

FORENSIC READINESS: With Infrastructure as a Service (IaaS) providers, I can build a dedicated forensic server in
the same Cloud as my company and place it offline, ready for use when needed. I would only need pay for storage until
an incident happens and I need to bring it online. I dont need to call someone to bring it online or install some kind of
remote boot software - I just click a button in the Cloud Providers web interface. If I have multiple incident responders,
I can give them a copy of the VM so we can distribute the forensic workload based on the job at hand or as new sources
of evidence arise and need analysis. To fully realize this benefit, commercial forensic software vendors would need to
move away from archaic, physical dongle based licensing schemes to a network licensing model.
DECREASE EVIDENCE ACQUISITION TIME: if a server in the Cloud gets compromised (i.e. broken into), I can
now clone that server at the click of a mouse and make the cloned disks instantly available to my Cloud Forensics
server. I didnt need to find storage or have it ready, waiting and unused - its just there

3. PASSWORD ASSURANCE TESTING(AKA CRACKING) :

Decrease password cracking time: if your organization regularly tests password strength by running password
crackers you can use Cloud Compute to decrease crack time and you only pay for what you use. Ironically,
your cracking costs go up as people choose better passwords.
Keep cracking activities to dedicated machines : if today you use a distributed password cracker to spread the
load across non-production machines, you can now put those agents in dedicated Compute instances and thus stop
mixing sensitive credentials with other workloads

4. LOGGING :

Unlimited, pay per drink storage: logging is often an afterthought, consequently insufficient disk space is allocated
and logging is either non-existent minimal. Cloud Storage changes all this - no more guessing how much storage you
need for standard logs.
Improve log indexing and search: with your logs in the Cloud you can leverage Cloud Compute to index those logs in
real-time and get the benefit of instant search results. What is different here? The Compute instances can be plumbed
inland scale as needed based on the logging load - meaning a true real-time view.
Getting compliant with Extended logging: most modern operating systems offer extended logging in the form of a C2
audit trail. This is rarely enabled for fear of performance degradation and log size. Now you can opt-in easily - if you
are willing to pay for the enhanced logging, you can do so. Granular logging makes compliance and investigations
easier.
IMPROVE THE STATE OF SECURITY SOFTWARE : Drive vendors to create more efficient security software :
Billable CPUcycles get noticed. More attention will be paid to inefficient processes; e.g. poorly tuned security agents.
Process accounting will make a comeback as customers target expensive processes. Security vendors that understand
how to squeeze the most performance from their software will win.

5. SECURE BUILDS:
Pre-hardened, change control builds: this is primarily a benefit of virtualization based Cloud Computing. Now
you get a chance to start secure(by your own definition) - you create your Gold Image VM and clone away. There
are ways to do this today with bare-metal OS installs but frequently these require additional 3rd party tools, are time
consuming to clone or add yet another agent to each endpoint.
Reduce exposure through patching offline : Gold images can be kept up securely kept up to date. Offline VMs
can be conveniently patched off the network.
Easier to test impact of security changes : this is a big one. Spin up a copy of your production environment,
implement a security change and test the impact at low cost, with minimal startup time. This is a big deal and
removes a major barrier to doing security in production environments.

December 2016 Inside Journal (www.insidejournal.org) Page | 112


Volume No. 1 Issue No. 3 International Journal on ISSN: 2456-5695
Fundamentals of Science and Engineering Research

6. SECURITY TESTING: Reduce cost of testing security: A SaaS provider only passes on a portion of their security testing
costs. By sharing the same application as a service, you dont foot the expensive security code review and/or penetration test.
Even with Platform as a Service (PaaS) where your developers get to write code ,there are potential cost economies of scale
(particularly around use of code scanning tools that sweep source code for security weaknesses)

VI.APPLICATION
A cloud application leverages cloud computing in software architecture, often eliminating the need to install and run the
application on the customer's own computer, thus alleviating the burden of software maintenance, ongoing operation, and support.
For example:
Peer-to-peer/volunteer computing(BOINC,Skype)
Webapplications (Webmail,Facebook,Twitter,YouTube,Yammer) Security as a service
(MessageLabs,PureWire,ScanSafe,Zscaler)
Software as a service(Google Apps, Salesforce,Nivio,Learn.com,Zoho)
Storage(Distributed)
1. Content Distribution(BitTorrent,Amazon CloudFront)
2.Synchronisation(Dropbox,LiveMesh,SpiderOak,ZumoDrive)

VII.CONCLUSION

Cloud computing has the possibility to be a frontrunner to advertise a secure, virtual and economically viable IT solution later on.
As being the growth and development of cloud computing technology remains at a young stage, these studies effort will supply a
better perception of the lookchallenges of cloud computing, and pave the best way for more research in this region.

REFERENCES

[1]. J. Gao, P. Pattabhiraman, X. Bai, and W. T. Tsai. Saas performance and scalability evaluation in clouds. 2013 IEEE
Seventh International Symposium on Service-Oriented System Engineering, 0:6171, 2011.
[2]. C. Kaner, J. Falk, and H. Q. Nguyen. Testing Computer Software, 2nd Edition. Wiley, New York, NY, USA, 1999.
[3]. R. Mathew and R. Spraetz. Test automation on a saas platform. In Proceedings of 2009 International Conference on
Software Testing Verification and Validation, (ICST 09), pages 317325, 2009.
[4]. T. Muller and D. Friedenberg. Certified Tester Foundation Level Syllabus. Journal of International Software Testing
Qualifications Board.
[5]. T. Parveen and S. R. Tilley. When to migrate software testing to the cloud? In Proceedings of ICST Workshops, pages 424
427, 2010.
[6]. B. P. Rimal, E. Choi, and I. Lumb. A Taxonomy and Survey of Cloud Computing Systems. In Proceedings of 5th
International Joint Conference INC, IMS and IDCNCM, pages 4451, 2009.
[7]. L. M. Riungu, O. Taipale, and K. Smolander. Proceedings of research issues for software testing in the cloud. In
CloudCom, pages 557564, 2010.
[8]. L. M. Riungu, O. Taipale, and K. Smolander. Software testing as an online service: Observations from practice. In
Proceedings of ICST Workshops, pages 418423, 2010.
[9]. M. Sinnema and S. Deelstra. Classifying Variability Modeling Techniques.Inf. Softw. Technol., 49(7):717739, July 2007.
[10]. W.-T. Tsai, C. Colbourn, J. Luo, G. Qi, Q. Li, and X. Bai. Test Algebra for Combinatorial Testing. In Proceedings of the
2013 8th International Workshop on Automation of Software Test (AST), pages 1925, 2013.
[11]. W.-T. Tsai, Y. Huang, X. Bai, and J. Gao. Scalable Architecture for SaaS. In Proceedings of 15th IEEE International
Symposium on Object Component Service-oriented Real-time Distributed Computing, ISORC 12, Apr. 2012.
[12]. W.-T. Tsai, Y. Huang, and Q. Shao. Testing the Scalability of SaaS Applications. In Proceedings of IEEE
InternationalConference on Service-Oriented Computing and Applications (SOCA), pages 14, Irvine, CA, USA, 2011.
[13]. W.-T. Tsai, Y. Huang, Q. Shao, and X. Bai. Data Partitioning and Redundancy Management for Robust Multi-Tenancy
SaaS. International Journal of Software and Informatics(IJSI), 4(3):437471, 2010.
[14]. W.-T. Tsai, Q. Li, C. J. Colbourn, and X. Bai. Adaptive Fault Detection for Testing Tenant Applications in Multi-
Tenancy SaaS Systems. In Proceedings of IEEE InternationalConference on Cloud Engineering (IC2E), March 2013.
[15]. W.-T. Tsai, J. Luo, G. Qi, and W. Wu. Concurrent Test Algebra Execution with Combinatorial Testing. In Proceedings of
8th IEEE International Symposium on Service-Oriented System Engineering (SOSE2014), 2014.
[16]. W.-T. Tsai, Q. Shao, and W. Li. OIC: Ontology-based Intelligent Customization Framework for SaaS. In Proceedings of
International Conference on Service Oriented Computing and Applications(SOCA10), Perth, Australia, Dec. 2010.
[17]. Wikipedia. Software Testing, 2013.
December 2016 Inside Journal (www.insidejournal.org) Page | 113

You might also like