scholarly journals Legal problems of using cloud services of foreign providers by Russian banks

Lex Russica ◽  
2019 ◽  
pp. 108-115
Author(s):  
V. A. Kanashevskiy

The paper examines the legal aspects of the use of cloud solutions by Russian banks of foreign providers. Despite the obvious advantages, there are many obstacles to such a use in the Russian legislation, including the lack of general regulation of cloud computing services, requirements for information security (licensing of encryption activities, certification of information systems), requirements of legislation on the localization of personal data databases, electronic databases of banks, etc. Based on the analysis of existing regulations, in particular the industry regulators, the author comes to the conclusion that foreign cloud service providers have the right to provide services to Russian financial institutions under certain conditions: cloud solutions should not include outsourcing of business functions entirely and should not involve the production of internal (domestic) money transfers (payments); foreign cloud provider has taken measures to protect the protected information; cross-border transfer of personal data and bank secrecy should be carried out in an impersonal form, etc.

2016 ◽  
Vol 30 (3) ◽  
pp. 173-189 ◽  
Author(s):  
Pamela J. Schmidt ◽  
Jason T. Wood ◽  
Severin V. Grabski

ABSTRACTCloud computing services are finding rapid adoption as organizations seek cost reduction, technical expertise, flexibility, and adaptable mechanisms to attain advantages in fast-moving business environments. The related considerations of governance, audit, and assurance of cloud computing services might be inadvertently overlooked in a rush to adopt these cloud services. This paper focuses on cloud computing governance and audit issues by presenting research questions informed by both practice and research. A cloud computing ecosystem is presented and an IT Governance framework (Wilkin and Chenhall 2010) is referenced as a means to structure research questions. Key issues of risk, security, monitoring, control, and compliance should be considered early in the cloud services decision process. The tight coupling of intercompany operations between the cloud client and cloud provider(s) forms an interdependent, operationally coupled ecosystem. Planned governance is needed to achieve a well-governed, functional, and secure cloud computing environment. The audit role is complicated when the organization's financial data and/or critical applications are hosted externally with a cloud service provider that may use other cloud service providers.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Author(s):  
T.P. Popovych

The article is devoted to the analysis of theoretical and legal aspects of the human right to the protection of personal data on the Internet. The author believes that at the present stage the field of personal data protection on the Internet is becoming especially important, linking it with the universal importance of communication that occurs within the Internet, as well as the threat of unauthorized dissemination of information through it. The right to the protection of personal data is considered as one of the forms of realization of the human right to the respect for his private, family life, in the context of his inviolability on the Internet. Scientific intelligence begins with a review of information protection models that have emerged in the world. Yes, we are talking about the American, European and mixed models. However, the article provides an overview of the acts adopted by the relevant European institutions in this area. In addition, the article examines the experience of some foreign countries in ensuring the human right to the protection of personal data on the Internet, in particular Brazil, France and the Republic of Belarus. The author notes that the protection of personal data involves a number of positive and negative obligations of the state and individuals. Negative obligations are aimed at prohibiting the processing of personal data without the consent of the person to whom the specific information relates. The positive obligations of public organizations and individuals (organizations) are to comply with the established legal regime of personal data processing, including the use of appropriate technical means. That is, the author emphasizes that the legal obligations in the context of ensuring the right to protection of personal data on the Internet are imposed not only on the state, but also on Internet service providers, owners of online services and websites, etc., given the possibility that they have access to personal information.


Author(s):  
Srimanyu Timmaraju ◽  
Vadlamani Ravi ◽  
G. R. Gangadharan

Cloud computing has been a major focus of business organizations around the world. Many applications are getting migrated to the cloud and many new applications are being developed to run on the cloud. There are already more than 100 cloud service providers in the market offering various cloud services. As the number of cloud services and providers is increasing in the market, it is very important to select the right provider and service for deploying an application. This paper focuses on recommendation of cloud services by ranking them with the help of opinion mining of users' reviews and multi-attribute decision making models (TOPSIS and FMADM were applied separately) in tandem on both quantitative and qualitative data. Surprisingly, both TOPSIS and FMADM yielded the same rankings for the cloud services.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2017 ◽  
Vol 7 (1.2) ◽  
pp. 166
Author(s):  
Uma Rani ◽  
Surjeet Dalal ◽  
Jugnesh Kumar

In today’s world, technological trend offers computing resources as services through the internet in on-demand or pay-as-you-go approach. These services are provided by different cloud service providers. Due to which trust on the any service provider is a choice of any customer. In order to choose a reputed cloud service provider a new method using the concept of fuzzy has proposed in this paper. This method enhanced the customer’s satisfaction level of using cloud services by avoiding ambiguities in fuzzy interface system (FIS) through optimization.Proposed fuzzy rule-based decision support system is collaborating with advanced fuzzy system optimized using a swarm intelligent firefly algorithm that facilitates the consumers in selecting right CSP based upon their rating value. It conducts three different reviews of three different components, i.e. customer review, service provider review and public review. Results are carried out on the basis of both simple and the optimized fuzzy, and it is found that the optimized fuzzy surpasses the simple fuzzy logic.


2019 ◽  
Vol 8 (4) ◽  
pp. 12522-12528

The purpose of the study was to explore the Cloud computing Practicing level, Cloud computing Satisfaction level and the Preferred Cloud service provider among the Online Business SMEs (OBSMEs) in Sri Lanka that have adopted Cloud services. Prior studies have shown that SMEs significantly benefit due to the adoption of Cloud computing services. The study was conducted among 260 randomly selected OBSMEs using self-administered questionnaires from managerial and ICT professionals who were capable of making ICT decision at OBSMEs under this study. However only 247 questionnaires were returned with complete data required for the purpose of analysis. A descriptive analysis was used to analyse the data. The findings have revealed that 31% of the OBSMEs are frequently Practicing Cloud computing for their ICT needs, while 69% of them relies on Cloud computing for their different ICT needs usually. Findings reveals that 35% of the OBSMEs are moderately Satisfied in this study, while 61% of OBSMEs have been reported that they are very Satisfied with Cloud computing services, at the same time 4% of the OBSMEs are reported that they have extremely Satisfied with Cloud computing services. In the context of OBSMEs it has been reported that 78% of the Cloud service providers are rendering reliability of services and OBSMEs are very satisfied, while 12% of the OBSMEs are moderately satisfied with the reliability of services and other 10% of the OBSMEs are extremely satisfied with the reliability of services provided by Cloud Service Providers in Sri Lanka. This study extends the existing body of knowledge by providing empirical support for explaining cloud computing adoption by OBSME in Sri Lanka. The study add value for various parties engaging in promoting the adoption of cloud computing among various business industries in Sri Lanka. Therefore, the researchers are able to recommend that cloud computing technology is playing a significant role for the improvement of business industries in Sri Lanka and the software vendors, policy makers and technological service providers should consider the findings of this study if they have intention to adopt this technology in future. Moreover, the findings of this research would assist and enhance service providers to consider their investment in information technology when adopting and implementing Cloud computing in Sri Lanka.


Author(s):  
Aparna Vijaya ◽  
Neelanarayanan V

<p class="Abstract">Cloud Computing is an evolving technology as it offers significant benefits like pay only for what you use, scale the resources according to the needs and less in-house staff and resources. These benefits have resulted in tremendous increase in the number of applications and services hosted in the cloud which inturn has resulted in increase in the number of cloud providers in the market. Cloud service providers have a lot of heterogeneity in the resources they use. They have their own servers, different cloud infrastructures, API’s and methods to access the cloud resources. Despite its benefits; lack of standards among service providers has caused a high level of vendor lock-in when a software developer tries to change its cloud provider. In this paper we give an overview on the ongoing and current trends in the area of cloud service portability and we also propose a new cloud portability platform. Our new platform is based on establishing feature models which offers the desired cloud portability. Our solution DSkyL uses feature models and domain model analysis to support development, customization and deployment of application components across multiple clouds. The main goal of our approach is to reduce the effort and time needed for porting applications across different clouds. This paper aims to give an overview on DSkyL.</p>


End the age of digitalization, data generated from numerous online and offline sources in every second. The Data are having a considerable amount of size and several properties termed as Bigdata. It is challenging to store, manage processes, analyze, visualize, and extract useful information from Bigdata using traditional approaches in local machines. To resolve this cloud computing platform is the solution. Cloud computing has high-level processing units, storage, and applications that do not depend on user devices' performance. Many users can access resources and demanded services remotely from the cloud on a pay-as-use basis. That is why users are not needed to buy and install costly resources locally. Some cloud services providers are Google, AWS, IBM, and Microsoft, and they have their Bigdata analyzing robust systems and products in a cost-efficient manner. There are many Cloud Service Providers (CSP's) having different services of Bigdata analyzing filed. However, we discuss in the paper about an excellent service BigQuery in the Data warehouse product of Google to analyze and represent numerous samples of datasets in real-time for making the right decisions within a short time.


Sign in / Sign up

Export Citation Format

Share Document