A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks

Rafael Giordano Vieira, Omir Correia Alves Junior, Adriano Fiorese

2014

Abstract

In an increasingly competitive market place, the development of collaborative networked environments has become a key factor to companies successfully leverage their business activities. Nevertheless, when these companies get involved in more volatile strategic networks, it is necessary to deal with additional risks that need to be identified, measured, and mitigated through a well defined process. In this sense, this paper aims to specify a method for risk analysis comprising a set of service providers (SPs) in a P2P Service Overlay Network (SON). In this applied, qualitative and essentially exploratory work, the proposed method assesses the level of risk present in a set of previously selected SPs using key performance indicators (KPIs), and measures the viability of a Virtual Organization (VO) formation using those selected SPs. A computational prototype was also specified and used to execute a set of tests to assess the proposed risk analysis method.

References

  1. Afsarmanesh, H. and Camarinha-Matos, L. M. (2005). A framework for management of virtual organization breeding environments. In Proceedings of the 6th Working Conference on Virtual Enterprises (PROVE'05), pages 35-48, Valencia, Spain.
  2. Alawamleh, M. and Popplewell, K. (2010). Risk sources identification in virtual organisation. In Enterprise Interoperability IV, pages 265-277. Springer London.
  3. Alawamleh, M. and Popplewell, K. (2012). Analysing virtual organisation risk sources: an analytical network process approach. International Journal of Networking and Virtual Organisations, 10(1):18-39.
  4. Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9):509-517.
  5. Caida (2013). Macroscopic topology project. http://www. caida.org/analysis/ topology/macroscopic/.
  6. Camarinha-Matos, L. M. and Afsarmanesh, H. (2005). Collaborative networks: a new scientific discipline. Journal of Intelligent Manufacturing, 16(4-5):439-452.
  7. Camarinha-Matos, L. M. and Afsarmanesh, H. (2008). On reference models for collaborative networked organizations. International Journal of Production Research, 46(9):2453-2469.
  8. Cooper, W. W., Seiford, L. M., and Tone, K. (2007). Data Envelopment Analysis: A Comprehensive Text with Models, Applications, References and DEA-Solver Software. Springer Verlag, New York, USA.
  9. Duan, Z., Zhang, Z. L., and Hou, Y. T. (2003). Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Transactions on Networking, 11(6):870-883.
  10. Ericson, C. A. (2005). Hazard analysis techniques for system safety. John Wiley & Sons, New York, USA.
  11. Fei, L. and Zhixue, L. (2010). A fuzzy comprehensive evaluation for risk of virtual enterprise. In Proceedings of the 10th International Conference on Internet Technology and Applications, pages 1-4, Corfu, Greece.
  12. Fiorese, A., Simo˜es, P., and Boavida, F. (2010). OMAN a management architecture for P2P service overlay networks. In Proceedings of the 4th international conference on Autonomous infrastructure, management and security (AIMS'10), pages 14-25, Zurich, Switzerland.
  13. Fiorese, A., Simo˜es, P., and Boavida, F. (2012). Peer selection in P2P service overlays using geographical location criteria. In Proceedings of the 12th international conference on Computational Science and Its Applications (ICCSA'12), pages 234-248, Salvador de Bahia, Brazil.
  14. Goranson, H. T. (1999). The agile virtual enterprise cases, metrics, tools. Quorum Books, Westport, CT, USA.
  15. Grabowski, M. and Roberts, K. H. (1998). Risk mitigation in virtual organizations. Journal of ComputerMediated Communication, 3(4):704-721.
  16. Heckerman, D. (1996). A tutorial on learning with bayesian networks. Technical report, Learning in Graphical Models.
  17. Holland, J. H. (1973). Genetic algorithms and the optimal allocation of trials. SIAM J. Comput., 2:88-105.
  18. Junior, O. C. A. and Rabelo, R. J. (2013). A KPI model for logistics partners' search and suggestion to create virtual organisations. International Journal of Networking and Virtual Organisations, 12(2):149-177.
  19. Li, Y. and Liao, X. (2007). Decision support for risk analysis on dynamic alliance. Decision Support Systems, 42(4):2043-2059.
  20. March, J. G. and Shapira, Z. (1987). Managerial perspectives on risk and risk taking. Management Science, 33(11):1404-1418.
  21. Min, H., Xue-Jing, W., Lu, F., and Xing-Wei, W. (2007). Multi-strategies risk programming for virtual enterprise based on ant colony algorithm. In Proceedings of the 1st International Conference on Industrial Engineering and Engineering Management, pages 407- 411, Singapore.
  22. Montgomery, D. C. and Runger, G. C. (2011). Applied Statistics and Probability for Engineers. John Wiley & Sons, New Jersey, USA.
  23. Moskowitz, H. and Bunn, D. (1987). Decision and risk analysis. European Journal of Operational Research, 28(3):247-260.
  24. Mosleh, A., Dias, A., Eghbali, G., and Fazen, K. (2004). An integrated framework for identification, classification, and assessment of aviation systems hazards. In Proceedings of the 6th International Conference on Probabilistic Safety Assessment & Management (PSAM'04), pages 2384-2390, Berlin, Germany.
  25. Mowshowitz, A. (1997). Virtual organization. Communications of the ACM, 40(9):30-37.
  26. Pidduck, A. B. (2006). Issues in supplier partner selection. Journal of Enterprise Information Management, 19(3):262-276.
  27. Stingl, D., Gross, C., Ruckert, J., Nobach, L., Kovacevic, A., and Steinmetz, R. (2011). PeerfactSim.KOM: a simulation framework for peer-to-peer systems. In Proceedings of the 13th International Conference on High Performance Computing and Simulation (HPCS'11), pages 577-584, Istanbul, Turkey.
  28. Vose, D. (2008). Risk analysis: a quantitative guide. John Wiley & Sons, New Jersey, USA.
  29. Zhou, S., Hogan, M., Ardon, S., Portman, M., Hu, T., Wongrujira, K., and Seneviratne, A. (2005). Alasa: When service overlay networks meet peer-to-peer networks. In Proceedings of the 11th Asia-Pacific Conference on Communications (APCC'05), pages 1053-1057, Perth, Australia.
Download


Paper Citation


in Harvard Style

Giordano Vieira R., Correia Alves Junior O. and Fiorese A. (2014). A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks . In Proceedings of the 16th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-028-4, pages 477-488. DOI: 10.5220/0004865804770488


in Bibtex Style

@conference{iceis14,
author={Rafael Giordano Vieira and Omir Correia Alves Junior and Adriano Fiorese},
title={A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks},
booktitle={Proceedings of the 16th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2014},
pages={477-488},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004865804770488},
isbn={978-989-758-028-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 16th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks
SN - 978-989-758-028-4
AU - Giordano Vieira R.
AU - Correia Alves Junior O.
AU - Fiorese A.
PY - 2014
SP - 477
EP - 488
DO - 10.5220/0004865804770488