People-process-performance benchmarking technique in cloud computing environment

2019 ◽  
Vol 69 (9) ◽  
pp. 1955-1972
Author(s):  
Issam Kouatli

Purpose Cloud computing is relatively a new type of technology demanding a new method of management techniques to attain security and privacy leading to customer satisfaction regarding “Business Protection” measure. As cloud computing businesses are usually composed of multiple colocation sites/departments, the purpose of this paper is to propose a benchmark operation to measure and compare the overall integrated people-process-performance (PPP) among different departments within cloud computing organization. The purpose of this paper is to motivate staff/units to improve the process performance and meet the standards in a competitive approach among business units. Design/methodology/approach The research method was conducted at Cirrus Ltd, which is a cloud computing service provider where a focus group consists of six IT professionals/managers. The objective of the focus group was to investigate the proposed technique by selecting the best practices relevant criteria, with the relevant sub-criteria as a benchmarking performance tool to measure PPP via an analytic hierarchy processing (AHP) approach. The standard pairwise comparative AHP scale was used to measure the performance of three different teams defined as production team, user acceptance testing team and the development team. Findings Based on best practice performance measurement (reviewed in this paper) of cloud computing, the proposed AHP model was implemented in a local medium-sized cloud service provider named “Cirrus” with their single site data center. The actual criteria relevant to Cirrus was an adaptation of the “Best practice” described in the literature. The main reason for the adaptation of criteria was that the principle of PPP assumes multiple departments/datacenters located in a different geographical area in large service providers. As Cirrus is a type of SMEs, the adaptation of performance measurement was based on teams within the same data center location. Irrelevant of this adaptation, the objective of measuring vendors KPI using the AHP technique as a specific output of PPP is also a valid situation. Practical implications This study provides guidance for achieving cloud computing performance measurement using the AHP technique. Hence, the proposed technique is an integrated model to measure the PPP under monitored cloud environment. Originality/value The proposed technique measures and manages the performance of cloud service providers that also implicitly act as a catalyst to attain trust in such high information-sensitive environment leading to organizational effectiveness of managing cloud organizations.

2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2018 ◽  
Vol 2 (2) ◽  
pp. 51-54
Author(s):  
E.O. Opoku

Ghana has attained cloud readiness indices facilitating services adoption by local enterprises through brokerage firms. Accordingto Gartner group by 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages,rather than directly with service providers. It means enterprises must identify local cloud brokerage firms to intermediate for cloudclients and service providers. We aimed at surveying cloud service awareness among enterprises in Ghana. We performed fieldstudy using statistical tool to analyze data collected among 45-participants spread across 20 local enterprises, using purposivesampling in the selection of strategic enterprise managers located in the second largest city, Kumasi, Ghana. We employedDelphi technique involving three Information Technology experts to validate responses in reducing margin of error in the analysis.We found that 67% respondents are unaware of local cloud service brokerage firms. Alternatively, 33% respondents mentioned atleast one local cloud brokerage firm; although experts believed some did a chess guessing to have it correct. Our Delphi expertsattributed this alarming percentile to lack of policy stakeholders involvement in ensuring cloud adoption readiness. We concludedon effective sensitization of cloud computing service adoption in optimizing data center proliferation by enterprises in Ghana.Adopting cloud computing over data center helps in reducing global warming contributed by heat emissions from computingservers.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Aveek Basu ◽  
Sanchita Ghosh

Cloud computing can be considered as one of the leading-edge technological advances in the current IT industry. Cloud computing or simply cloud is attributed to the Service Oriented Architecture. Every organization is trying to utilize the benefit of cloud not only to reduce the cost overhead in infrastructure, network, hardware, software, etc., but also to provide seamless service to end users with the benefit of scalability. The concept of multitenancy assists cloud service providers to leverage the costs by providing services to multiple users/companies at the same time via shared resource. There are several cloud service providers currently in the market and they are rapidly changing and reorienting themselves as per market demand. In order to gain market share, the cloud service providers are trying to provide the latest technology to end users/customers with the reduction of costs. In such scenario, it becomes extremely difficult for cloud customers to select the best service provider as per their requirement. It is also becoming difficult to decide upon the deployment model to choose among the existing ones. The deployment models are suitable for different companies. There exist divergent criteria for different deployment models which are not tailor made for an organization. As a cloud customer, it is difficult to decide on the model and determine the appropriate service provider. The multicriteria decision making method is applied to find out the best suitable service provider among the top existing four companies and choose the deployment model as per requirement.


2015 ◽  
Vol 64 (8/9) ◽  
pp. 567-582 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The paper aims to examine the characteristic elements of various organizational factors to identify whether a favourable climate for implementing and sustaining cloud computing in Banaras Hindu University library system (BHULS) existed. Design/methodology/approach – After reviewing relevant literature on the topic, a list of 20 factors that affected an organization’s adoption to innovation was prepared. A questionnaire was personally administered to the library professionals engaged in BHULS. Respondents were asked to nominate the level of importance of each factor for validation of cloud computing adoption. Findings – Findings of the paper validate the fact that opportune time for the implementation of cloud computing existed in BHULS. Library staff showed high willingness toward the adoption of the cloud computing and were well prepared to grasp the challenges. Practical implications – The paper establishes the fact that the benefits of cloud computing are inadequate to convince organizations to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – Because no empirical study on the cloud computing in conjunction with academic libraries of India has been carried out before, this paper closes this gap and provides guidelines to migrate to cloud environment. Also, it provides the perceptions of library professionals in response to its adoption.


Author(s):  
Tina C Touitou

This paper focuses in examining the distance education, cloud computing and platforms, E- learning and its approaches via cloud computing, benefits and challenges in National Open University (NOUN) in Nigeria.Cloud computing and distance learning are rising speedily and play vital and powerful roles in education and learning in Nigeria today. The use of distance education in learning has come to stay and is being adopted, it needs to be constantly dynamic and innovative. It’s has the potential to transform the way distance education is consumed along with internet resources. It supports the smart phone mobile users to perform their tasks effectively- through paying less cost by utilizing the cloud based applications offered by the cloud service providers. The review of literature shows that the use of cloud computing is the best practice for the present educational situation. Despite the benefits associated with cloud-computing, there are still factors hindering the effective adoption of cloud computing in Nigerian educational system which among others include the epileptic power supply, low bandwidth just to mention a few.Survey study that was conducted  by DAMAR &NUHU 2015, that was adopted to authenticate this study, one hundred and seventy (170) students who indicated knowledge on the importance of cloud computing, but were not very satisfied with the confidentiality and accessibility of the services rendered to them in the cloud computing platform. Some of the reasons could be as a result of poor network and lack of confidence using information technology. The paper recommended among others, steady power supply, guarantee service confidentiality, accessibility and more reduction in cost. 


Author(s):  
Ediz Şaykol ◽  
Ayşe Seçil Başer ◽  
Kazim Sari

Cloud computing, as being one of the trendy topics, provides mechanisms for the companies to meet all the information technology and management requirements at a desired performance level with reduced upfront investments. From the economical perspective, it creates a positive impact by helping them focus on their own business. With this positive impact, it causes a huge increase on the number of user firms, and many service providers try to provide solutions based on the user firms’ needs. There are studies on identifying the factors that are used in selecting cloud service solutions in the literature. Having examined the pivotal points among the Information Technology (IT) sector in Turkey, we conducted a survey among the managers of various firms to gather information about their cloud service provider and the factors that provision their choice. Since that decision is very strategic, and once decided it is very hard to alter, it is worth analyzing the set of factors that are used in the survey further in order to identify the most important ones and help new companies for their selection. We provide statistical evaluations based on the results of the survey in this study.


2020 ◽  
Vol 8 (6) ◽  
pp. 3727-3730

Cloud computing is one of the popular technological advancement in the current IT industry. The multifaceted benefits of cloud computing has attracted huge number of public and industrial customers. There are numerous cloud service providers available with variations in type and cost of resources. This makes it very difficult to select a suitable service provider. The Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) is a popular method used of ranking service providers. However it reuires parameters that belong to a same category and rating scale. In this research we propose M-TOPSIS (Multilayer TOPSIS), a technique for ranking of service providers based on different categories with multiple parameters having different rating scales. The proposed technique applies TOPSIS for each category of input. The ranking of service provider in each category is then used to rank the available service providers, based on the overall performance. The efficiency of the proposed technique is compared with the existing models and the experimental results proved that the M-TOPSIS is able to rank service providers more accurately than the other existing models like E-FPROMTHEN.


In today's era, cloud computing is very popular and the most widly used technique to store the data. As we know more than 75% of the data that is used in internet services and applications is being stored on the maximum cloud only. Where our data is stored in the cloud, it is called data center, there are two important roles in cloud computing technology, one is cloud customer and the other is cloud service provider. The complete control and monitoring at the public data center is of the service provider itself, the user is kept away from the information of the location of the data center and its access credentials. This means that the user has absolutely no information about the virtual machine hard disk, and their access locations. Whenever any forensic inquiry comes in the cloud environment, the Investigator and forensic expert first have to find out about the virtual machine disk and its location in the cloud, which is a very challenging and difficult task in the cloud environment. In this paper we have developed a new process that detects virtual machines using data hiding techniques. To prove this new algorithm, we have performed an experiment using Oracle VirtualBox 6.0 on OpenSUSE virtual machine.


2021 ◽  
Author(s):  
Rebecca Parry

Behind technology service suppliers lie companies that are subject to the risk of business failure due to market conditions and trading risks. Such failures could suddenly stop customers accessing services or content, with potentially devastating business and personal impacts, given the rising importance of digital economies. The risk can be illustrated by reference to cloud computing insolvencies but similar issues may affect other service providers. The insolvency of a cloud service provider would be likely to present problems of access to infrastructure, platforms, services and data and insolvency laws are not always designed to enable a managed closedown of a business, which would be needed to enable replacement services to be sourced and data recovered. This cybersecurity risk has barely been touched upon in literature, since it lies at the intersection between law and computer science, both areas requiring high levels of specialist understanding, and this chapter is part of initial attempts to identify the threats presented.


Sign in / Sign up

Export Citation Format

Share Document