or purpose of the usage data that the extraction com-
ponent should extract. This understanding of the us-
age data will help in classifying the usage data types
and the formats followed by different components of
the cloud system. Using this classification, the archi-
tect can identify where the usage data resides in the
cloud system and then can decide what methods and
techniques should be used for the extraction.
Data analyst can use this framework to better un-
derstand the nature of the usage data, the source of
each data type, how the data is classified and ex-
tracted. Understanding the source of usage data and
its classification could ease the analysis process. The
software developer can use this usage data to under-
stand the critical application features for an end-user,
thereby prioritizing the features. This can improve the
development time and cost for providing updates for
the application.
The identified criteria for the usage data and the
proposed usage data extraction framework can help
researchers to consider and include all the interfaces
used to access the cloud-based applications as usage
data sources. This would lead to more replicable stud-
ies and results regarding development, instantiation
and evaluation of the usage data extraction artefacts.
5 CONCLUSION AND FUTURE
WORK
In this paper, we identified criteria for the usage data
and analysed usage data extraction techniques accord-
ing to the identified criteria, extraction procedure, and
the considered user interfaces. We proposed usage
data extraction framework with four phases: Data Un-
derstanding; Data classification – we provide an im-
proved usage data classification; Data Sources Identi-
fication – we identified that it is essential to consider
mobile applications and command line interfaces as
usage data sources in addition to the web-browser and
Data collection. As a result of the criteria analysis, the
main contribution of the paper is a novel usage data
extraction framework as shown in Section 4 which
includes an improved usage data classification con-
sisting of multiple interfaces as usage data sources on
client-side for the purpose of usage data extraction,
this framework includes all the usage data sources on
the client-side such as web browser, mobile applica-
tion and command-line interface. Hence, satisfying
the complete criteria of a usage data extraction com-
ponent.
Our future work aims (i) to consider further the
commercial usage data extraction solutions for analy-
sis of the identified criteria, (ii) evaluate the frame-
work using case studies, (iii) further improve the
framework to include the usage data storage and anal-
ysis procedure (iv) design and development of usage
data extraction artefact adhering to the proposed cri-
teria and framework.
ACKNOWLEDGEMENT
This work was supported with the financial support
of the Science Foundation Ireland grant 13/RC/2094
and co-funded under the European Regional Develop-
ment Fund through the Southern & Eastern Regional
Operational Programme to Lero - the Irish Software
Research Centre (www.lero.ie)
REFERENCES
Al-Bayati, B., Clarke, N., and Dowland, P. (2016). Adap-
tive Behavioral Profiling for Identity Verification in
Cloud Computing: A Model and Preliminary Anal-
ysis. GSTF Journal on Computing, 5(1):21–28.
Banerjee, A. and Ghosh, J. (2001). Clickstream clustering
using weighted longest common subsequences. Proc
of the Workshop on Web Mining SIAM Conference on
Data Mining, page 3340.
Bucklin, R. E. and Sismeiro, C. (2009). Click Here for In-
teract Insight: Advances in Clickstream Data Analysis
in Marketing. Journal of Interactive Marketing (Mer-
gent, Inc.), 23(1):35–48.
Cito, J., Leitner, P., Gall, H. C., Dadashi, A., Keller, A., and
Roth, A. (2015). Runtime Metric Meets Developer:
Building Better Cloud Applications Using Feedback.
In 2015 ACM International Symposium on New Ideas,
New Paradigms, and Reflections on Programming and
Software (Onward!), pages 14–27, New York, New
York, USA. ACM Press.
Fabijan, A., Olsson, H. H., and Bosch, J. (2015). Customer
Feedback and Data Collection Techniques in Software
R&D: A Literature Review. (210):139–153.
Gasparetti, F. (2016). Modeling user interests from web
browsing activities. Data Mining and Knowledge Dis-
covery, 31(2):1–46.
Ghezzi, C., Pezz
`
e, M., Sama, M., and Tamburrelli, G.
(2014). Mining behavior models from user-intensive
web applications. Proceedings of the 36th Interna-
tional Conference on Software Engineering - ICSE
2014, pages 277–287.
Helfert, M., Donnellan, B., and Ostrowski, L. (2012). The
case for design science utility and quality-Evaluation
of design science artifact within the sustainable ICT
capability maturity framework. Systems, Signs & Ac-
tions, 6(1):4666.
Junco, R. (2013). Comparing actual and self-reported mea-
sures of Facebook use. Computers in Human Behav-
ior, 29(3):626–631.