Perception of cloud computing in developing countries

2016 ◽  
Vol 65 (1/2) ◽  
pp. 33-51 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The purpose of this paper is to explore the perceptions of librarians engaged in Indian academic libraries towards cloud computing. Design/methodology/approach – A structured questionnaire was used to collect responses from the library professionals engaged in Indian academic libraries. Overall, 339 respondents participated in the survey. Descriptive survey method was used in the study. Findings – The findings of the study reveal that library professionals are using cloud-computing tools in their daily works. They want to adopt cloud computing in the libraries to improve library services and avoid redundancy of works. Ubiquitous availability, economy and the various service layers are the core drivers of its adoption in the libraries. The respondents showed their concern over security and data privacy in cloud. Practical implications – The study establishes the fact that the benefits of cloud computing are inadequate to convince the libraries to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – The paper provides the perceptions of library professionals in response to the adoption of cloud computing.

2015 ◽  
Vol 64 (8/9) ◽  
pp. 567-582 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The paper aims to examine the characteristic elements of various organizational factors to identify whether a favourable climate for implementing and sustaining cloud computing in Banaras Hindu University library system (BHULS) existed. Design/methodology/approach – After reviewing relevant literature on the topic, a list of 20 factors that affected an organization’s adoption to innovation was prepared. A questionnaire was personally administered to the library professionals engaged in BHULS. Respondents were asked to nominate the level of importance of each factor for validation of cloud computing adoption. Findings – Findings of the paper validate the fact that opportune time for the implementation of cloud computing existed in BHULS. Library staff showed high willingness toward the adoption of the cloud computing and were well prepared to grasp the challenges. Practical implications – The paper establishes the fact that the benefits of cloud computing are inadequate to convince organizations to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – Because no empirical study on the cloud computing in conjunction with academic libraries of India has been carried out before, this paper closes this gap and provides guidelines to migrate to cloud environment. Also, it provides the perceptions of library professionals in response to its adoption.


Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don’t support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of information in cloud forensic investigations. Generally, Cloud service providers have access to activity logs of cloud user and CSP can tamper the logs so that investigator cannot reach to the real culprit. In such an environment, log security is one of challenge in the cloud. Logging technique is used to monitor employee’s behavior, to keep track of malicious activities and prevent cloud networks from intrusion by well-known organizations. Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment. In the proposed framework secure logging environment is provided by storing and processing activity logs and encrypting using advanced encryption method. It detects DDoS (distributed denial of service) attack on cloud infrastructure by using the published logs on cloud and thus helpful in cloud forensics. It is detected by the investigator using available application activity logs in the cloud server. Searchable encryption algorithm will be used to increase the security of the logging mechanism and to maintain confidentiality and privacy of user data. Proof of past (PPL) logs is created by storing logs at more than one place. This PPL helps in the verification process of changed logs by CSP the actual implementation of this application on AWS Infrastructure as a service ( IAAS ) cloud shows real-time use of this structure


2019 ◽  
Vol 27 (5) ◽  
pp. 601-620
Author(s):  
Lamya Abdullah ◽  
Juan Quintero

Purpose The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. Design/methodology/approach An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. Findings Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained. Originality/value A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).


Author(s):  
N. Krishnadas ◽  
R. Radhakrishna Pillai

Cloud Computing is emerging as a promising cost efficient computing paradigm which professionals believe is an absolutely new trend and will represent next level of internet evolution. Though the presence of Cloud computing is ubiquitous, it still lacks consensus on a proper definition and classification of the major Clouds in effect today. It also suffers from major criticism of being a hype/fad and some researchers claim that it is just an extension of already established computing paradigms. This chapter attempts to deal with such criticisms by comprehensively analyzing the Cloud definitions and diagnose the components of the same. It performs a comprehensive study of more than 30 definitions given by Cloud computing professionals and published in research papers. These definitions are then analyzed under more than fifteen components, each of which is discussed in the chapter. This study is backed by empirical work, to understand Cloud computing from different angles and come up with a comprehensive definition. It also analyses the present Cloud service providers and the level of services they provide to bring about a clear picture of Cloud computing. Based on the comparison, the pending issues in Cloud computing are discussed.


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


Author(s):  
Y. Kiran Kumar ◽  
R. Mahammad Shafi

<span lang="EN-US">Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers.  Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud. </span>


2020 ◽  
Vol 8 (6) ◽  
pp. 3727-3730

Cloud computing is one of the popular technological advancement in the current IT industry. The multifaceted benefits of cloud computing has attracted huge number of public and industrial customers. There are numerous cloud service providers available with variations in type and cost of resources. This makes it very difficult to select a suitable service provider. The Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) is a popular method used of ranking service providers. However it reuires parameters that belong to a same category and rating scale. In this research we propose M-TOPSIS (Multilayer TOPSIS), a technique for ranking of service providers based on different categories with multiple parameters having different rating scales. The proposed technique applies TOPSIS for each category of input. The ranking of service provider in each category is then used to rank the available service providers, based on the overall performance. The efficiency of the proposed technique is compared with the existing models and the experimental results proved that the M-TOPSIS is able to rank service providers more accurately than the other existing models like E-FPROMTHEN.


Author(s):  
Ishan Senarathna ◽  
Carla Wilkin ◽  
Matthew Warren ◽  
William Yeoh ◽  
Scott Salzman

Cloud computing is a recent computing paradigm enabling organizations to have access to sophisticated computing services via the Internet on a fee-for-service basis. It provides Small and Medium-sized Enterprises (SMEs) with opportunities to become as technologically advanced as their larger counterparts, without significant financial outlays. This paper examined the important factors that influence SMEs’ adoption of cloud computing technology. Drawing upon aspects of the Technology, Organization and Environment framework and Diffusion of Innovation Theory, we developed a research model of SMEs’ adoption of cloud computing and tested it through an online survey of 149 Australian SMEs. Data was analyzed using multiple regression methods, with results showing that SMEs were influenced by factors related to advantaging their organizational capability (i.e., relative advantage, quality of service and awareness) rather than risk-related factors (i.e., security, privacy and flexibility). The findings offer insights to SMEs owners, Cloud service providers and government in establishing Cloud computing adoption strategies for SMEs.


Author(s):  
Sapana Sanjay Bhuskute ◽  
◽  
Sujata Kadu ◽  

Federated cloud computing is the advancement in the area of the general cloud computing paradigm. In a federated cloud environment, multiple cloud service providers share their computing assets, servers, and various facilities to fulfill customer demands. Federated cloud computing terminology consists of the aggregation of services considered by interoperability characteristics and creates the integration of several cloud service providers regardless of any geographical location. It improves the performance, utilization of facilities, minimizes response time and pricing model by partial subcontracting various computing resources and facilities from the nearby cost-efficient province. Customers also get profited from service level agreements signed between the cloud service providers through intermediator cloud brokers. This work aims to survey the federated cloud environment, its various architectural types, advantages associated with the federation, challenges associated with a federated cloud environment, and future research directions in the federated cloud computing research area.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mohammad Aslam

Purpose This paper aims to discover the key challenges and identifies reasons for the changing behavior of academic libraries and the role of library professionals, and how can they manage those challenges in a time of change. The paper reveals the most important competencies in a reshaping environment of libraries and the best ways of dealing with change. Library professionals are struggling to reform their traditional ways of working and trying to boost their knowledge and skills as current demand for higher education. Organizations can play an important role to develop willingness for accepting change and reduce stress among employees and prepare them to accept new systems and reality by creating collaborative and supporting environments that provide opportunities for growth and improvement. All library professionals must have the eagerness to keep up with the emerging trends and prepare themselves to accept changes that would have a direct impact on the libraries and the role of library professionals. Academic libraries have similar issues and challenges around the world, those are outcomes of technological advancement, digital resources, innovative services and diversity in higher education; therefore, the role of library professionals is changing. Design/methodology/approach The research method is built on literature reviews from offline and online. The systematic literature review method is used to review full-text databases such as EBSCO, ProQuest, Library Literature and Information Science databases. Basic search options for keyword searching and advanced searching options have been used to retrieve the relevant papers on the right topic. A total of 113 papers were collected at the initial stage, but after their analysis in detail, they were reduced to 52 scholarly and peer-reviewed papers because the rest of the papers did not exactly express relevant content on the topic. Findings Library professionals are struggling to keep up with the new competencies and adopt the innovative system and reality because diversity is rapidly changing. The best ways of dealing with change include reform the traditional ways to new ways of working and create collaboration at all levels. Librarians are under pressure to develop new skills to deal with the current scenarios that are affecting the role of library professionals. Academic libraries have similar challenges in a rapidly reshaping environment that are needed to address by researchers and library professionals for the present and future of academic libraries. Research limitations/implications This paper is a piece of opinion, 52 appropriate papers on the topic have been reviewed from the peer-reviewed journals, not all publications were included. The existing literature described that there is a need for growth and improvement of academic libraries and workforce in financial crises because they play fundamental roles in society by offering services and information resources, so library professionals need to be very aware of these implications. Originality/value The literature on this particular topic is relatively limited. Therefore, this paper is the first to offer a systematic literature review on the changing behavior of academic libraries and the role of library professionals. This paper provides insights into the concept of adopting change and dealing with challenges in a time of change. It adds value to the library and information sciences literature and delivers outlines for the library professionals.


Sign in / Sign up

Export Citation Format

Share Document