skip to main content
10.5555/2675983.2676035acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
research-article

Modeling and simulation as a cloud service: a survey

Published: 08 December 2013 Publication History

Abstract

Modelling and simulation as a service (MSaaS) is defined, and the differences between MSaaS and Software as a Service are clarified. MSaaS architectures and deployment strategies are surveyed. The top threats to cloud computing and MSaaS, the other security challenges and technical requirements are explained. Accountability, risk and trust modelling are related to each other and also to security and privacy. Those notions and their relations are presented. MSaaS composition in multi-datacenter and/or multi-cloud scenarios is also elaborated on.

References

[1]
Armbrust M., A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia. 2010. A view of Cloud computing. Communications of the ACM, vol. 53, no. 4, pp. 50--58.
[2]
Badger L., T. Grance, R. Patt-Corner and J. Voas. 2012. Draft Cloud Computing Synopsis and Recommendations. National Institute of Standards and Technology, Special Publication 800--146.
[3]
Baran, P., 1964. On Distributed Communications Networks. IEEE Transactions on Communications Systems, Vol. 12, Issue 1, pp. 1--9.
[4]
Buyya R., R. Ranjan, R. N. Calheiros. 2010. InterCloud: Utility-oriented federation of Cloud computing environments for scaling of application services. Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'10), pp. 13--31.
[5]
Cayirci E., and D. Marincic. 2009. Computer Assisted Exercises and Training: A Reference Guide. John Wiley.
[6]
Cayirci, E., C. Rong. Intercloud for Simulation Federations. 2011. The Second International Workshop on Cloud Computing Interoperability and Services (Intercloud 2011).
[7]
Cayirci, E. 2013a. A Joint Trust and Risk Model for MSaaS Mashups. Winter Simulation Conference (WinterSim 2013).
[8]
Cayirci, E. 2013b. Configuration Schemes for Modelling and Simulation as a Service Federations. Simulation Transactions of the Society for Modelling and Simulation. (to appear)
[9]
Cloud Security Alliance (CSA). 2010. Top Threats to Cloud Computing. https://cloudsecurityalliance.org.
[10]
Davis K. and Tolk A., "Observations on new developments in composability and multi-resolution modeling," Proceedings of the 2007 IEEE Winter Simulation Conference, December 2007.
[11]
Ezell, B. C., S. P. Bennet, D. Von Winterfeldt, J. Sokolowski and A. J. Collins. 2010. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis, Vol. 30, No. 4, pp. 575--589.
[12]
Jasti, A., P. Shah, R. Nagaraj and R. Pendse. 2010. Security in Multitenancy. IEEE International Carnahan Conference on Security Technology.
[13]
Hang, C-W. and M. P. Singh. 2011. Trustworthy Service Selection and Composition. ACM Transactions on Autonomous and Adaptive Systems (TAAS), Vol. 6, No. 1, pp. 5:1--5:17.
[14]
Huerta-Capena G. and D. Lee. 2010. A virtual cloud computing provider for mobile devices. ACM Workshop on Mobile Cloud Computing and Services: Social Networks and Beyond.
[15]
Jensen M., J. Schwenk, N. Gruscka and L. L. Iacono. 2009. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing, pp. 109--116.
[16]
Johnson H. and Tolk A., "Evaluating the Applicability of Cloud Computing Enterprises in Support of Next Generation of Modelling and Simulation Architectures," Spring Simulation Multi-Conference, April 2013.
[17]
Kandukuri, B. R., R. Paturi V, A. Rakshit. 2009. Cloud Security Issues. 2009 IEEE International Conference on Services Computing.
[18]
Kapitsaki, G., D. A. Kateros, I. E. Foukarakis, G. N. Prezerakos, D. I. Kaklamani and I. S. Venieris. 2007. Service Composition: State of the art and future challenges. 16th IST Mobile and Wireless Communications Summit, pp. 1--5.
[19]
Kaplan S. and B. J. Garrick. 1981. On The Quantitative Definition of Risk. Risk Analysis, Vol. 1, No. 1, pp. 11--27.
[20]
Laborde R., Barrere F. and Benzekri A., "Toward Authorization as a Service: A Study of the XACML Standard," Spring Simulation Multi-Conference, April 2013.
[21]
Lin, Z. 2011. Virtualization Security for Cloud Computing Services. IEEE International Conference on Cloud and Service Computing.
[22]
Mayer, R. C., J. H. Davis, and F. D. Schoorman. 1995. An integrative model of organizational trust. The Academy of Management Review, Vol. 20, No. 3, pp. 709--734.
[23]
Osterwalder, D. 2001. Trust Through Evaluation and Certification. Social Science Computer Review. Sage Publications, Inc., 19(1), pp 32--46.
[24]
Pearson, S. 2012. Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computting, S. Pearson and G. Yee (eds.), Computer Communications and Networks, Springer.
[25]
Rashidi, A., and N. Movahhedinia. 2012. A Model for User Trust in Cloud Computing. International Journal on Cloud Computing: Services and Architecture(IJCCSA), Vol.2, No.2.
[26]
Rosetti M. And Chen Y., "Cloud Computing Architecture for Supply Chain Network Simulation," Winter Simulation Conference, December 2012.
[27]
Rousseau, D., S. Sitkin, R. Burt, C. Camerer. 1998. Not so Different after All: a Cross-discipline View of Trust. Academy of Management Review, 23(3), pp 393--404.
[28]
Ryan, K. L. K., P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, B. S. Lee. 2011. TrustCloud: A Framework for Accountability and Trust in Cloud Computing. 2nd IEEE Cloud Forum for Practitioners (ICFP).
[29]
Sandikkaya, M. T. and A. E. Harmanci. 2012. Security Problems of Platform as a Service. 31st International Symposium on Reliable Distributed Systems.
[30]
Satyanarayanan, M., P. Bahl, R. Caceres and N. Davies. 2009. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, Vol. 8, pp. 14--23.
[31]
Singh, S., C. Morley. 2009. Young Australians' privacy, security and trust in internet banking. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human interaction Special interest Group: Design: Open 24/7.
[32]
Singhal, M., S. Chandrasekhar, G. Tingjian, R., S. Sandhu, R. Krishnan, G-J. Ahn, E. Bertino. 2013. Collaboration in Multicloud Computing Environments: Framework and Security Issues. IEEE Computer Magazine February 2013, pp 76--84.
[33]
Shi C., V. Lakafosis, M. H. Ammar and E. W. Zagura. 2012. Serendipity: enabling remote computing among intermittently connected mobile devices. ACM International Symposium on Mobile Ad Hoc Networking and Computing.
[34]
Subashini, S. and Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing. Elsevier Journal of Network and Computer Applications, Vol. 34, Issue 1, pp. 1--11.
[35]
Tao, J., D. Franz, H. Marten and A. Streit. 2012. An Implementation Approach for Inter-Cloud Service Combination. International Journal on Advances in Software, Vol. 5, No. 1&2, pp 65--75.
[36]
Tolk, A. 2012. Engineering Principles of Combat Modeling and Distributed Simulation. John Wiley & Sons.
[37]
Toosi A. N., R. N. Calheiros, R. K. Thulasiram, R. Buyya. 2011. Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment. HPCC 2011.
[38]
Wang, Y., K.-J. Lin. 2008. Reputation-Oriented Trustworthy Computing in E-Commerce Environments. Internet Computing, IEEE, 12(4), pp 55--59.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WSC '13: Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World
December 2013
4386 pages
ISBN:9781479920778

Sponsors

  • IIE: Institute of Industrial Engineers
  • INFORMS-SIM: Institute for Operations Research and the Management Sciences: Simulation Society
  • ASA: American Statistical Association
  • SIGSIM: ACM Special Interest Group on Simulation and Modeling
  • SCS: Society for Modeling and Simulation International
  • ASIM: Arbeitsgemeinschaft Simulation
  • IEEE/SMCS: Institute of Electrical and Electronics Engineers/Systems, Man, and Cybernetics Society
  • NIST: National Institute of Standards & Technology

Publisher

IEEE Press

Publication History

Published: 08 December 2013

Check for updates

Qualifiers

  • Research-article

Conference

WSC '13
Sponsor:
  • IIE
  • INFORMS-SIM
  • ASA
  • SIGSIM
  • SCS
  • ASIM
  • IEEE/SMCS
  • NIST
WSC '13: Winter Simulation Conference
December 8 - 11, 2013
D.C., Washington

Acceptance Rates

Overall Acceptance Rate 3,413 of 5,075 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media