scholarly journals Debesų kompiuterija: darbas, bendradarbiavimas ir komunikacija. Ar debesis tenkina studentų ir mokslininkų poreikius?

2011 ◽  
Vol 55 ◽  
pp. 117-130
Author(s):  
Angelė Pečeliūnaitė

Informacinės komunikacinės technologijos sparčiai vystosi ir tobulėja. Debesų kompiuterija (Cloud Computing) yra dar viena naujovė, sparčiai pradėjusi plisti XXI a. pradžioje. Debesų kompiuterija – tai galimybė naudotis kompiuterine ir programine įranga internete ir mokėti tik už tai, kiek teikiama paslauga buvo pasinaudota. Debesų kompiuterijos paslaugos pirmiausia buvo orientuotos į verslą. Šio straipsnio tikslas – apžvelgti debesų technologijas ir jų teikiamas galimybes akademinei bendruomenei – studijoms, mokslui, bendradarbiavimui ir mokslinei komunikacijai. Analizuojamos trijų korporacijų siūlomos paslaugos, kreipiant dėmesį į paslaugų įvairovę, galimybes rengti projektus, konferencijas etc., technologijos saugumą, mobilumą ir paslaugų kainą. Tyrimo išvadose pabrėžiama, kad debesų kompiuterija yra patraukli mokslui ir studijoms. Debesį galima panaudoti studijoms, moksliniam darbui, bendradarbiavimui ir mokslinėje komunikacijoje, tik svarbu pasirinkti poreikius tenkinantį atitinkamą debesį.Pagrindiniai žodžiai: debesų technologijos, debesų kompiuterija, viešas ir privatus debesis, virtualus privatus tinklas, SaaS, PaaS, IaaS, virtualizacijos procesai, duomenų centrai, Microsoft Office 365, Microsoft Web Apps, Zoho debesis, Google Apps studijoms, mokslo komunikacija.Cloud Computing: The job, co-operation and communication Does Cloud Meet the Needs of Students and Scholars?Angelė Pečeliūnaitė SummaryThe information and communication technologies are rapidly evolving and progressing. Cloud computing is one of the innovations that began rapidly spreading from the beginning of the 21st century. The article summarizes the cloud computing paradigm, an introduction to cloud computing platforms, the cloud service offered by the cloud providers, and highlights the attractive features of this technology. The collaboration and communication methods in the cloud are discussed. The cloud computing services were primarily focused on business. The aim of the article is an overview of the cloud technologies and opportunities for the academic community – in studies, research, col-laboration and scientific communication.Delic divides research into three significant periods: empirical, theoretical, and experimental/simulation (Delic et al., 2010, p. 3). This article falls within the third study phase: an experimen-tal study comparing the services of three selected cloud providers. We analyze the cloud services of Zoho Web Apps, Microsoft Web Apps and Google Apps for Education according to the selected five categories (information gathered from web sites and company experts speaking): education in a variety of services offered working with documents and projects, scientific communication and col-laboration, data protection, mobility and price.The results have shown that cloud services are attractive to the educational community. The largest variety of service diversity and performance improvements are offered by the Microsoft and Zoho clouds on the SaaS and PaaS platforms. Zoho is a leader of these cloud services. The most attractive environment for scientific communication and collaboration (including mobility) is the Microsoft cloud. Data protection takes care of all service providers: SLA of 99.9% guarantee. Zoho uses web encryption for 256-bit SSL, and Microsoft 128-bit SSL / TSL. Google Apps for Education is in many ways behind the above-mentioned corporations, while Google's cloud services are offered to meet students' needs; services are provided free of charge.The investigation was conducted in December 1–15, 2010.

2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Lifa Wu ◽  
Shengli Zhou ◽  
Zhenji Zhou ◽  
Zheng Hong ◽  
Kangyu Huang

In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.


2017 ◽  
Vol 36 (1) ◽  
pp. 29 ◽  
Author(s):  
Rebecca Zuege Kuglitsch ◽  
Natalia Tingle ◽  
Alexander Watkins

The increasing complexity of the information ecosystem means that research consultations are increasingly important to meeting library users' needs. Yet librarians struggle to balance escalating demands on their time. How can we embrace this expanded role and maintain accessibility to users while balancing competing demands on our time? One tool that allows us to better navigate this shifting landscape is Google Appointment Calendar, part of Google Apps for Education. It makes it easier than ever for students to book a consultation with a librarian, while at the same time allowing the librarian to better control their schedule. Our research suggests that both students and librarians felt it was a useful, efficient system.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahak Sharma ◽  
Ruchita Gupta ◽  
Padmanav Acharya ◽  
Karuna Jain

PurposeCloud computing (CC) services have given a tremendous boost to the creation of efficient and effective solutions. With developing countries at a slow pace of adoption, this research aims to identify factors and their interrelationships influencing the adoption of CC in a developing country context. The developing countries are enjoying numerous benefits from CC services; however, its low adoption is still a question in developing economies; hence, the authors have selected the context of information and communication technology (ICT) firms in India.Design/methodology/approachThe qualitative research method is used where experts from thirteen ICT firms in India are interviewed.FindingsSixteen factors, twenty-eight subfactors, and 25 interrelationships are revealed through content analysis. Further, causal loop diagrams are proposed to display the behavior of cause and effect of these factors from a system's perspective. This will help to understand the relationships among the factors in order to enhance the speed of CC adoption. Possible financial loss and resistance to change are found as the key barriers to adoption. The proposed interrelationships can guide both policymakers and service providers for designing effective CC policies.Originality/valueThis is the first scholarly work that identifies interrelationships among factors and subfactors, thereby providing a holistic picture to decision-makers while making a choice on whether to adopt cloud services or continue with on premise data centers and servers.


Author(s):  
Rosiah Ho

Cloud Computing is a prevalent issue for organizations nowadays. Different service providers are starting to roll out their Cloud services to organizations in both commercial and industrial sectors. As for an enterprise, the basic value proposition of Cloud Computing includes but not limit to the outsourcing of the in-house computing infrastructure without capitalizing their investment to build and maintain these infrastructures. Challenges have never been ceased for striking a balance between Cloud deployment and the need to meet the continual rise in demand for computing resources. It becomes a strategic tool to increase the competitive advantage and to survival in the market for an enterprise. To reconcile this conflict, IT leaders must find a new IT operating model which can enhance business agility, scalability, and shifts away from traditional capital-intensive IT investments.


Author(s):  
Sanjay P. Ahuja ◽  
Thomas F. Furman ◽  
Kerwin E. Roslie ◽  
Jared T. Wheeler

There are several public cloud providers that provide service across different cloud models such as IaaS, PaaS, and SaaS. End users require an objective means to assess the performance of the services being offered by the various cloud providers. Benchmarks have typically been used to evaluate the performance of various systems and can play a vital role in assessing performance of the different public cloud platforms in a vendor neutral manner. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes. The results show that the scalability of the cloud is achieved by increasing resources when applicable. This chapter also looks at the economic model and other cloud services offered by Amazon's EC2, Microsoft's Azure, and Google's App Engine.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2019 ◽  
Vol 7 (2) ◽  
pp. 220-248
Author(s):  
Björn Lundqvist

Abstract In the Internet of Things (IoT), the amount and smart use of data will determine whether or not a firm can compete successfully. Manufacturing firms will collect data through sensors in their devices and, at least in the cases of SMEs, likely store the collected data in the cloud, purchasing cloud services and storage from the large e-platform providers doubling as cloud providers. The e-platform providers will also collect data from users of their other services. These data are often generated by the same firms that purchase cloud services when they use the e-platforms to sell goods and services. Access to the data and to data analytics on fair business terms, and the possibility to switch cloud and service providers are vital for the SMEs and, in general, to create a competitive and vibrant IoT. However, cloud and e-platform customers seem to be facing difficulties. According to the EU Commission, SMEs are finding it particularly hard to engage cloud and e-platform providers, and to gain access to cloud services on reasonable, transparent terms. The contracts are skewed in favour of the cloud providers. The customers get locked in and may be obliged to agree not to assert any of their intellectual property rights vis-à-vis the cloud provider or the cloud provider’s network. Moreover, the cloud and e-platform providers may under certain circumstances access and make use of the users’ data, and that may give them a competitive advantage vis-à-vis the users, since the providers may have access to much more data, even data originating from the users’ competitors, suppliers, customers, etc. They can thus use all the data available to them to obtain a fuller picture of whole industries, and they may use that advantage in data to leverage and enter users’ markets. Indeed, they may use the data in the cloud for data-driven business strategies to enter the core market of the firms that have provided them with data in the first place. This article discusses whether competition law can address the conduct of the cloud and e-platform providers, so that firms may access and make use of all the possibilities that the IoT harbours.


Sign in / Sign up

Export Citation Format

Share Document