scholarly journals Investigation on the Services of Private Cloud Computing by Using ADAM Method

Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>

Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2019 ◽  
Vol 8 (4) ◽  
pp. 12522-12528

The purpose of the study was to explore the Cloud computing Practicing level, Cloud computing Satisfaction level and the Preferred Cloud service provider among the Online Business SMEs (OBSMEs) in Sri Lanka that have adopted Cloud services. Prior studies have shown that SMEs significantly benefit due to the adoption of Cloud computing services. The study was conducted among 260 randomly selected OBSMEs using self-administered questionnaires from managerial and ICT professionals who were capable of making ICT decision at OBSMEs under this study. However only 247 questionnaires were returned with complete data required for the purpose of analysis. A descriptive analysis was used to analyse the data. The findings have revealed that 31% of the OBSMEs are frequently Practicing Cloud computing for their ICT needs, while 69% of them relies on Cloud computing for their different ICT needs usually. Findings reveals that 35% of the OBSMEs are moderately Satisfied in this study, while 61% of OBSMEs have been reported that they are very Satisfied with Cloud computing services, at the same time 4% of the OBSMEs are reported that they have extremely Satisfied with Cloud computing services. In the context of OBSMEs it has been reported that 78% of the Cloud service providers are rendering reliability of services and OBSMEs are very satisfied, while 12% of the OBSMEs are moderately satisfied with the reliability of services and other 10% of the OBSMEs are extremely satisfied with the reliability of services provided by Cloud Service Providers in Sri Lanka. This study extends the existing body of knowledge by providing empirical support for explaining cloud computing adoption by OBSME in Sri Lanka. The study add value for various parties engaging in promoting the adoption of cloud computing among various business industries in Sri Lanka. Therefore, the researchers are able to recommend that cloud computing technology is playing a significant role for the improvement of business industries in Sri Lanka and the software vendors, policy makers and technological service providers should consider the findings of this study if they have intention to adopt this technology in future. Moreover, the findings of this research would assist and enhance service providers to consider their investment in information technology when adopting and implementing Cloud computing in Sri Lanka.


2016 ◽  
Vol 30 (3) ◽  
pp. 173-189 ◽  
Author(s):  
Pamela J. Schmidt ◽  
Jason T. Wood ◽  
Severin V. Grabski

ABSTRACTCloud computing services are finding rapid adoption as organizations seek cost reduction, technical expertise, flexibility, and adaptable mechanisms to attain advantages in fast-moving business environments. The related considerations of governance, audit, and assurance of cloud computing services might be inadvertently overlooked in a rush to adopt these cloud services. This paper focuses on cloud computing governance and audit issues by presenting research questions informed by both practice and research. A cloud computing ecosystem is presented and an IT Governance framework (Wilkin and Chenhall 2010) is referenced as a means to structure research questions. Key issues of risk, security, monitoring, control, and compliance should be considered early in the cloud services decision process. The tight coupling of intercompany operations between the cloud client and cloud provider(s) forms an interdependent, operationally coupled ecosystem. Planned governance is needed to achieve a well-governed, functional, and secure cloud computing environment. The audit role is complicated when the organization's financial data and/or critical applications are hosted externally with a cloud service provider that may use other cloud service providers.


Symmetry ◽  
2020 ◽  
Vol 12 (8) ◽  
pp. 1354
Author(s):  
Fathey Mohammed ◽  
Abdullah Marish Ali ◽  
Abdullah Saad Al-Malaise Al-Ghamdi ◽  
Fawaz Alsolami ◽  
Siti Mariyam Shamsuddin ◽  
...  

Cloud computing offers new features of sharing resources and applications to meet users’ computing requirements. It is a model by which the users can access computing resources as services offered on the Internet (cloud services). Cloud service providers offer a highly diverse range of asymmetric cloud services with heterogeneous features, which makes it difficult for the users to find the best service that fits his needs. Many research studies have been done on cloud service discovery, and several models and solutions that applied different techniques have been proposed. This paper aims at presenting the state of the art in the area of cloud services discovery by exploring the current approaches, techniques, and models. Furthermore, it proposes a taxonomy of cloud service discovery approaches. An integrative review approach was used to explore the related literature. Then, by analyzing the existing cloud service discovery solutions, a taxonomy of discovery approaches was suggested based on several perspectives including the discovery environment and the discovery process methods. The proposed taxonomy allows easily classifying and comparing cloud services discovery solutions. Moreover, it may reveal issues and gaps for further research and expose new insights for more innovative and effective cloud services discovery solutions.


The proliferation of Cloud Computing has opened new and attractive offerings for consumers. Cloud Service Providers promote and market packages of cloud computing services that cater to diverse opportunities and user applications. While this has obvious advantages, there are certain factors that are a cause for concern. Monitoring the underlying infrastructure that supports the entire fabric of cloud computing is an aspect that requires a great deal of attention. The aspect of monitoring takes on a great deal of significance when performance and robustness of cloud service on offer is taken into consideration. Although research has been conducted into various cloud computing monitoring techniques, there is scope and room yet for an integrated cloud monitoring solution that can fulfill the requirements of cloud administrators to ensure optimal performance of the underlying infrastructure of a cloud computing network. In this paper, we propose a unified monitoring model that is essentially a composite framework involving hardware and network layers. Studies conducted during our experiments suggest that our unified cloud monitoring approach can significantly aid in reducing overall carbon emissions while helping meeting compliance and audit norms by ensuring that the underlying cloud infrastructure is monitored closely


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


2015 ◽  
Vol 28 (6) ◽  
pp. 788-807 ◽  
Author(s):  
Anabel Gutierrez ◽  
Elias Boukrami ◽  
Ranald Lumsden

Purpose – The purpose of this paper is to determine the factors influencing managers’ decision to adopt cloud computing in the UK using the “Technology-Organisation-Environment” (TOE) framework. Design/methodology/approach – Data were collected through a self-created questionnaire based survey that was completed by 257 mid-to-senior level decision-making business and information technology (IT) professionals from a range of UK end-user organisations. The derived hypotheses were tested using various data analysis techniques including principal component analysis and logistic regression. Findings – The results show that four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK. Those key factors include competitive pressure, complexity, technology readiness and trading partner pressure. The latter predictor; trading partner pressure, was the most significant factor for the adoption decision of cloud services reflecting organisations’ concerns on legal regulations, co-creation and customisation, service linkage and vendor locking which adds complexity to the process of selecting an appropriate vendor. Research limitations/implications – This research found trading partners (cloud service providers) significantly influence managers’ decisions to adopt cloud services, however, further research is required to fully understand all the aspects involved especially with the growing number of vendors available. Although over 250 usable responses to the questionnaire were received and analysed, there was not a sufficient quantity of responses from each industry sector or organisation size to conduct further analysis. Practical implications – The findings reveal the important role of cloud computing service providers to enable end-users to better evaluate the use of cloud computing. It also reveals that top management support is no longer a driver as organisations are starting to adopt cloud computing services on the basis of cheaper and more agile IT resources in order to support business growth. Originality/value – This research provides original insight for cloud computing adoption within the UK from a managerial perspective.


2020 ◽  
Vol 34 (2) ◽  
pp. 23-46
Author(s):  
Kimberly Swanson Church ◽  
Pamela J. Schmidt ◽  
Kemi Ajayi

ABSTRACT To engage theory and practice of cloud computing in business, the third annual Journal of Information Systems Conference (JISC) brought together 29 academic researchers and 14 practitioners. This commentary reviews and synthesizes discussions and insights provided by three keynote presentations and panel discussions. In addition to sharing insights from the conference, this commentary identifies major themes, incorporates relevant current literature, and suggests potential research questions expressed by practitioners. The JISC emphasized the impact of the rapid maturing of cloud computing services on accounting information systems (AIS). Several recurring themes emerged throughout the conference: (1) rapid growth and evolution of cloud managed services, (2) security, privacy, and risk in the cloud ecosystem, (3) impact of cloud computing for data analytics, and (4) emerging and disruptive financial technologies and trends for the cloud. Most of the discussion surrounding these themes predominantly focused on the perspectives of cloud assurance and cloud service providers.


2021 ◽  
Vol 13 (1) ◽  
pp. 9-17
Author(s):  
Mohamad Iqbal Suriansyah ◽  
Iyan Mulyana ◽  
Junaidy Budi Sanger ◽  
Sandi Winata

Analyzing compute functions by utilizing the IAAS model for private cloud computing services in packstack development is one of the large-scale data storage solutions. Problems that often occur when implementing various applications are the increased need for server resources, the monitoring process, performance efficiency, time constraints in building servers and upgrading hardware. These problems have an impact on long server downtime. The development of private cloud computing technology could become a solution to the problem. This research employed Openstack and Packstack by applying one server controller node and two servers compute nodes. Server administration with IAAS and self-service approaches made scalability testing simpler and time-efficient. The resizing of the virtual server (instance) that has been carried out in a running condition shows that the measurement of the overhead value in private cloud computing is more optimal with a downtime of 16 seconds.


Sign in / Sign up

Export Citation Format

Share Document