| 研究生: |
王香婷 Hsian-ting Wang |
|---|---|
| 論文名稱: |
雲端服務能力成熟度模式之設計 Cloud Service Capability Maturity Model Design |
| 指導教授: | 陳仲儼 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 資訊管理學系 Department of Information Management |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 中文 |
| 論文頁數: | 88 |
| 中文關鍵詞: | 雲端服務 、能力成熟度模式 、制度化 、流程改善 、流程優化 、永續改善 |
| 外文關鍵詞: | Cloud service, Capability Maturity Model (CMM), Institutionalization, Improve, Enhance, Sustainable improvement |
| 相關次數: | 點閱:20 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著社會的進步及市場快速的變化,許多雲端服務業者(Cloud Service Provider)投入雲端服務市場建置雲端服務環境。然而,在如此競爭激烈的雲端服務(Cloud Service)市場中,許多的雲端服務業者宣稱自己提供雲端服務給予顧客。但是,雲端服務的提供會因為服務的範圍、服務的層次與深度的不同,而造成雲端服務提供的深化程度有所不同。由此可以得知,雲端服務市場中尚未有一個清楚表述雲端服務業者之服務提供層級的規範依據。
如果雲端服務建置的改善(Improve)與優化(Enhance)可以著手於流程,將可替雲端服務業者持續及提升雲端服務水準。因此本研究嘗試同樣運用在流程改善及優化的CMM(Capability Maturity Model)作為本研究提出Cloud Service-CMM(Cloud Service-Capability Maturity Model,CS-CMM)的模型基礎。此模型藉由流程的觀點衡量雲端服務的流程領域(Process Area)進行雲端服務流程改善,並且評估雲端服務業者的雲端服務成熟度(Cloud Service Maturity Level)與雲端服務能力度(Cloud Service Capability Level)。再透過制度化(Institutionalization)確保雲端服務業者之各項流程能夠長遠、並且穩定的實施,不會因為不同的服務提供人員、時間等因素,而在執行相同的事物上有所偏差。最後,為了不讓雲端服務業者只專注從事流程的標準化,而忽略創新服務的提供,因此加入永續改善的觀點至CS-CMM中,讓雲端服務業者得以持續優化雲端服務流程。
Due to the rapid advancement of technology, more and more cloud service providers begin to build their cloud service environment in the cloud service market. In the intense competition of the market, every cloud service providers claim that they deliver an up to par service to the customer. However, the overall level of the service differs by the scope and depth of the service provided. At present, the cloud service market still don’t have a clear model to define the level of service of the cloud service providers.
Cloud service provider will be able to increase the level of their cloud service by focusing on the improvement and enhancement of their process. Thus we attempt to apply the CMM (Capability Maturity Model) of process focus as the fundamental of our Cloud Service–CMM (Cloud Service–Capability Maturity Model, CS-CMM). In this research, we design and develop process areas (PAs) which are significantly related to cloud service to improve and evaluate the Cloud Service Maturity Level (CSML) and Cloud Service Capability Level (CSCL) of cloud service provider. Furthermore, institutionalization can also ensure the implementation and stability of processes in the long run. Lastly, we also add sustainable improvement in CS-CMM to avoid overlooking new and innovative services.
[1] 中田敦, 小林雅一, 石田愛, 普本直彥, 高橋秀和, 松尾貴史, 岩上由高, 酒井達明, 西片公一, 森正弥, 太田一樹. (2010). 雲端運算大解密. (鄧瑋敦, 譯者) 台北市: 城邦文化.
[2] 文傑, 陳小軍, 吳玉民, 熊潔, 李平, 米凱, 喬立, 朱濤, 黃薇. (2012). 雲端運算與SaaS佈署應用. 台北市: 上奇資訊股份有限公司.
[3] 方國偉. (2012). 解析 Microsoft Windows Azure 雲端運算平台. 台北市: 上奇資訊股份有限公司.
[4] 王鵬. (2009). 走進雲端運算. 台北市: 佳魁資訊股份有限公司.
[5] 王鵬. (2010). 雲端運算的關鍵技術與應用實例. 台北市: 佳魁資訊股份有限公司.
[6] 吳統雄. (1990). 電話調查: 理論與方法. 台北: 聯經. 頁145.
[7] 廖文良. (2009). 雲端運算. 台北市: 碁峰資訊股份有限公司.
[8] 陳瀅. (2010). 雲端策略. 台北市: 天下雜誌.
[9] 葉世綺, 趙喆, & 王輝. (2012年1月). 基於CMM/CMMI的雲計算能力評價研究. 計算器應用研究, 29(1), 頁 107-111.
[10] Al Falasi, A., & Serhani, M. A. (2011). A Framework for SLA-based cloud services verification and composition. 2011 International Conference on Innovations in Information Technology (IIT) (pp. 287-292). IEEE.
[11] Alhamad, M., Dillon, T., & Chang, E. (2010). Conceptual SLA framework for cloud computing. 4th IEEE International Conference on Digital Ecosystems and Technologies (pp. 606 - 610). IEEE.
[12] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010, 4). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
[13] Basu, S., Graupner, S., Pruyne, J., & Singhal, S. (2010). Control plane integration for cloud services. Proceedings of the 11th International Middleware Conference Industrial track (pp. 29-34). Association for Computing Machinery.
[14] Behrendt, M., Glasner, B., Kopp, P., Dieckmann, R., Breiter, G., Pappe, S., Kreger, H., Arsanjani, A. (2011). IBM Cloud Computing Reference Architecture 2.0. IBM.
[15] Bisong, A., & Rahman, S. M. (2011). An Overview of The Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), pp. 30-45.
[16] Cancian, M. H., Hauck, J. C., Wangenheim, C. G., & Rabelo, R. J. (2010). Discovering Software Process and Product Quality Criteria in Software as a Service. Product-Focused Software Process Improvement (pp. 14). Springer Berlin Heidelberg.
[17] Cayirci, E., Rong, C., Huiskamp, W., & Verkoelen, C. (2009). Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. CloudCom 2009 (pp. 57-68). Beijing, China: Springer Berlin Heidelberg.
[18] Creese, S., Hopkins, P., Pearson, S., & Shen, Y. (2009). Data Protection-Aware Design for Cloud Services. Cloud Computing (pp. 119 - 130). Springer Berlin Heidelberg.
[19] Delone, William H., & Mclean, Ephraim R. (2003). The DeLone and McLean Model of Information Systems Success: A Ten-Year Update. Journal of Management Information Systems, 19(4), pp.9-30.
[20] Dikaiakos, M. D., Pallis, G., Katsaros, D., Mehra, P., & Vakali, A. (2009, 9). Cloud Computing: Distributed Internet Computing for IT and Scientific Research. Internet Computing, IEEE, 13(5), pp. 10-13.
[21] Dowell, S., Barreto, A., Michael, J. B., & Shing, M. T. (2011). Cloud to Cloud Interoperability. 2011 6th International Conference on System of Systems Engineering (pp. 258-263). Albuquerque, NM: Institute of Electrical and Electronics Engineers.
[22] Durkee, D. (2010, 5). Why Cloud Computing Will Never Be Free. Communications of the ACM, 53(5), pp. 62-69.
[23] Espadas, J., Concha, D., & Molina, A. (2008). Application Development over Software-as-a-Service platforms. The Third International Conference on Software Engineering Advances, 2008. ICSEA '08 (pp. 97-104). IEEE.
[24] Forrester, E. (2011, 4). CMMI for Services (CMMI-SVC): Agile Strategy.
[25] Forrester, E. (2012, 2). CMMI for Services (CMMI-SVC): Using multiple models in mixed.
[26] Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, 2008. GCE '08, (pp. 1-10).
[27] Haq, I. U., Brandic, I., & Schikuta, E. (2010). SLA Validation in Layered Cloud Infrastructures. Economics of Grids, Clouds, Systems, and Services (pp. 153-164). Springer Berlin Heidelberg.
[28] Hollenbach, C. R., & Buteau, B. (2007, 3). CMMI for Services: Introducing the CMMI for Service Constellation.
[29] Iosup, A., & Epema, D. (2006). GRENCHMARK: A Framework for Analyzing, Testing, and Comparing Grids., (pp. 313 - 320).
[30] Iosup, A., Ostermann, S., Yigitbasi, M. N., Prodan, R., Fahringer, T., & Epema, D. H. (2011, 6). Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 22(6), pp. 931 - 945.
[31] JansenWayne, & GranceTimothy. (2011). Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology .
[32] JuranM.Joseph, & GodfreyBlantonA. (1999). Juran's Quality Handbook.
[33] Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2010). Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. 2010 IEEE 3rd International Conference on Cloud Computing (pp. 450-457). Miami, FL: IEEE.
[34] Khalidi, Y. A., & Microsoft. (2011, 3). Building a Cloud Computing Platform for New Possibilities. IEEE Computer Society, 44(3), pp. 29-34.
[35] Leitner, P., Inzinger, C., Hummer, W., Satzger, B., & Dustdar, S. (2012). Application-Level Performance Monitoring of Cloud Services Based on the Complex Event Processing Paradigm. 2012 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA) (pp. 1-8). IEEE.
[36] Liu, F., Guo, W., Zhao, Z. Q., & Chou, W. (2010). SaaS Integration for Software Cloud. 2010 IEEE 3rd International Conference on Cloud Computing (pp. 402-409). Miami, FL: Institute of Electrical and Electronics Engineers.
[37] Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST Cloud Computing Reference Architecture. National Institute of Standards and Technology.
[38] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011, 4). Cloud computing — The business perspective. Decision Support Systems, 51(1), pp. 176-189.
[39] Mattoon, S., Hensle, B., & Baty, J. (2011). Cloud Computing Maturity Model – Guiding Success with Cloud. Oracle Corporation.
[40] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (Draft). National Institute of Standards and Technology.
[41] Meng, S., & Liu, L. (2013A, 9). Enhanced Monitoring-as-a-Service for Effective Cloud Management. IEEE TRANSACTIONS ON COMPUTERS, 62(9), pp. 1705 - 1720.
[42] Meng, S., & Liu, L. (2013B). Monitoring-as-a-service in the cloud: spec phd award (invited abstract). ICPE '13 Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (pp. 373-374). ACM.
[43] Nunally, J.C ., & Bernstein, I. H. (1978). Psychometric theory.
[44] Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., & Eperna, D. (2010). A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing. Cloud Computing (pp. 115-131). Springer-Verlag Berlin Heidelberg.
[45] PalsonKennedy, R., & Gopal, T. (2010). Assessing the risks and opportunities of Cloud Computing — Defining identity management systems and maturity models. Trendz in Information Sciences & Computing (TISC) (pp. 138 - 142). IEEE.
[46] Papazoglou, M. P., & van den Heuvel, W.-J. (2011). Blueprinting the Cloud. IEEE Internet Computing, 15(6), pp. 74-79.
[47] Parasuraman, A., Zeithaml, V. A., Berry, L. L. (1985). A Conceptual Model of Service Quality and Its Implications for Future Research. Journal of Marketing, 49(4), pp.41-50.
[48] Paulk, M. C., Curtis, B., Chrissis, M. B., & Weber, C. V. (1993, 7). Capability maturity model, version 1.1. Software, IEEE, 10(4), pp. 18-27.
[49] Pearson, S., & Benameur, A. (2010). Privacy, Security and Trust Issues Arising from Cloud Computing. 2nd IEEE International Conference on Cloud Computing Technology and Science, (pp. 693 - 702).
[50] Petcu, D., Macariu, G., Panica, S., & Crăciun, C. (2013, 8). Portable Cloud Applications—from Theory to Practice. Future Generation Computer Systems, pp. 1417-1430.
[51] Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A Secure Cloud Backup System with Assured Deletion and Version Control. 2011 International Conference on Parallel Processing Workshops (pp. 160-167). IEEE.
[52] Rehman, Z. u., Hussain, O. K., Parvin, S., & Hussain, F. K. (2012). A Framework for User Feedback Based Cloud Service Monitoring. 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (pp. 257 - 262). IEEE.
[53] Sabatier, P.A. (1986,5). Top-Down and Bottom-Up Approaches to Implementation Research: a Critical Analysis and Suggested Synthesis. Journal of Public Policy, 6(1), pp.21-48.
[54] Sakka, M. A., Defude, B., & Tellez, J. (2010). Document Provenance in the Cloud: Constraints and Challenges. Networked Services and Applications - Engineering, Control and Management (pp. 107-117). Springer Berlin Heidelberg.
[55] SEI (Software Engineering Institute). (2010A). CMMI for Development, Version 1.3. Software Engineering Institute, Carnegie Mellon University.
[56] SEI (Software Engineering Institute). (2010B). CMMI for Services, Version 1.3. Software Engineering Institute, Carnegie Mellon University.
[57] Stuart, F. I., & Tax, S. S. (1996). Planning for service quality: an integrative approach. International Journal of Service Industry Management, 7(4), pp. 58-77.
[58] Subashini, S., & Kavitha, V. (2011, 1). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), pp. 1-11.
[59] Takabi, H., Joshi, J. B., & Ahn, G.-J. (2010, 12). Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, IEEE, 8(6), pp. 24 - 31.
[60] Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009, 1). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 39(1), pp. 50-55.
[61] Wei, Y., & Blake, M. B. (2010, 11). Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. Internet Computing, IEEE, 14(6), pp. 72-75.
[62] Wood, T., Cecchet, E., Ramakrishnan, K., Shenoy, P., Merwe, J. v., & Venkataramani, A. (2010). Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges. In 2nd USENIX Workshop on Hot Topics in Cloud Computing.
[63] Yigitbasi, N., Iosup, A., Epema, D., & Ostermann, S. (2009). C-Meter: A Framework for Performance Analysis of Computing Clouds. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (pp. 472 - 477).
[64] Zhang, L.-J., & Zhou, Q. (2009). CCOA: Cloud Computing Open Architecture. 2009 IEEE International Conference on Web Services (pp. 607-616). Los Angeles, CA: IEEE.
[65] Zhang, Z., Wu, C., & Cheung, D. W. (2013, 3). A survey on cloud interoperability: taxonomies, standards, and practice. ACM SIGMETRICS Performance Evaluation Review, 40(4), pp. 13-22.