Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.
Matched MeSH terms: Information Storage and Retrieval/standards
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
Matched MeSH terms: Information Storage and Retrieval/standards
This is a prospective study of clinical questions generated in primary care consultations and a comparison of two approaches to answering those clinical questions. Twenty-one doctors in a university-based primary care clinic submitted 78 clinical questions arising from patient consultations during 24 clinic days (0.01 question per patient encounter). These doctors subsequently found answers to 40% of their questions but were satisfied with only 67% of these answers. The investigators were able to provide answers for 95% of the questions asked and the doctors rated these answers as satisfactory in 86% of instances. Answers obtained by investigators had significantly higher satisfaction score than those obtained by doctors' search (p = 0.002). The two main findings of this study are (1) almost all questions arising in clinic setting could be answered by intensive search; (2) answers found by intensive searches were judged to be more satisfactory than those found routinely by doctors. Provision of an information retrieval service in addition to training in the searching and appraisal of medical literature are possible solutions to the information needs of busy clinicians.
Study site: Primary Care Clinic,
University Hospital Kuala Lumpur i
Matched MeSH terms: Information Storage and Retrieval/standards*