Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments
Vinita Malik1, Sukhdip Singh2
1Vinita Malik, Information Scientist, Central Library, Central University of Haryana ( Mahendergarh), India.
2Sukhdip Singh, Department of Computer Science and Engineering, D.C.R.U.S.T, Murthal (Haryana), India.
Manuscript received on 24 November 2019 | Revised Manuscript received on 07 December 2019 | Manuscript Published on 14 December 2019 | PP: 119-125 | Volume-9 Issue-1S October 2019 | Retrieval Number: A10241091S19/19©BEIESP | DOI: 10.35940/ijeat.A1024.1091S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The evolution of revolutionary computational paradigms has been witnessed in terms of the pervasive systems which not only offer evolving service portfolio but also integrated sensor data from variable sources but surfaces various challenges of data interaction, integration and adaptation. This research has been provisioned with the comprehensive focus on pervasive devices user interaction, access control modeling, identity management, trust and service discovery modeling. In addition, we also proposed a deep insight into Pervasive computing characteristics, risks, and risks models, environmental, ethical and social impacts. We have explored pervasive computing environment risk models by considering social, human and environmental risks. This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments. The paper has implemented the benchmarking of smart applications by a smart tool by gathering various application and business metrices to improve software performance. This research has also implemented the cloud readiness of a pervasive power reader application for PaaS environment using a smart vendor solution. The cloud readiness score is evaluated by questionnaire qualitative information and source code scan. Various boosters and roadblocks are found out to give score to cloud readiness for any application.
Keywords: Pervasive/Ubiquitous Computing, Risks, Trust, Access Control, Privacy, Identity Management, Cloud Readiness, Benchmarking.
Scope of the Article: Systems and Software Engineering