scholarly journals Cloud Computer Management From The Small Business Perspective

Author(s):  
Yvette Ghormley

Cloud computing is a relatively new concept that is attracting much attention from both small businesses and CEOs of large corporations. However, for the novitiate, the decision to implement a cloud computing service and then how to manage it is not straightforward because there is no universal road map. In this review several issues are discussed that should have a bearing on how to bring cloud computing into a business organization and how it should be managed. These issues include, the elasticity performance of cloud computing, the lack of standards in cloud computing, whether cloud computing should be sole sourced, security issues, legal and regulatory compliance of data that may cross national borders, and what the function of the IT department should be in this venture.

Author(s):  
Lech Janczewski

Developments in multimedia technology and in networking offer to organizations new and more effective ways of conducting their businesses. That includes both internal as well as external contacts. Practically every business person owns a mobile phone, has PDA/laptop with wireless capabilities, and is able to communicate with colleagues/clients all over the world and from every place on the globe. As a result, well defined barriers between different organizations are becoming less and less visible. This technical progress intensifies the competing forces. In the past, an organization was directly exposed to competition located within their city or region. Now, due to easy communication, their competitor could be located on the opposite side of the globe. The advantage of using multimedia technology and networking could be accomplished only if data handled by a company are secure, that is, are available only to the authorised persons (confidentiality), represent true values (i.e., had not been changed during storage, processing, or transport), and are available on demand (availability). Thus, managing security of information becomes an obligatory part of running any modern IT system. There is not absolute IT system security. If a system is accessible by authorised people, by definition it is impossible to eliminate chances of unauthorised access. However, proper means exist to dramatically decrease the probability of occurrence of such unauthorised activities. This article illustrates the importance of proper managing in information security processes in an organization and presents a first level guidance on how to approach this problem. The most widely known document on information security is an annual Computer Crime and Security Survey (CCSS), conducted by San Francisco’s Computer Security Institute in cooperation with the FBI (CSI, 2006). It is based on responses from over 500 professionals representing all types and sizes of organizations from huge international corporations to small businesses from nationwide government agencies to small community centres. The message the survey is conveying is frightening: • Total losses for 2006 were $52,494,290 (USD) for the 313 respondents that were willing and able to estimate losses. • Losses due to virus contamination caused the most significant loss (over $15 million). • Unauthorised access to information was the second-most expensive computer crime among survey respondents. • As in previous years, virus incidents (65.2%) and insider abuse of network access (47%) were the most cited forms of attack or abuse. • The impact of the Sarbanes–Oxley Act on information security continues to be substantial. In fact, in open-ended comments, respondents noted that regulatory compliance related to information security is among the most critical security issues they face.


Author(s):  
Mohammed Banu Ali

Universities worldwide are starting to turn to cloud computing. The quality characteristics, which include access to a wider network of computing resources, pay-as-you-go services, self-services, agile services, and resource centralisation provide a convincing argument for HEIs to adopt cloud services. However, the risks leading to non-adoption range from security issues to a lack of cloud vendor support. The findings suggest that security, privacy, and trust are the key determinants to non-adoption as stakeholders felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Key determinants to cloud adoption include improving relationships between students and teachers via collaborative tools and proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, university stakeholders are still unconvinced about adopting cloud services, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential.


Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


2011 ◽  
Vol 145 ◽  
pp. 272-276 ◽  
Author(s):  
Chiang Lung Liu ◽  
Wei Hsiu Chen ◽  
Der Kuo Tung

Cloud computing is a new service style with many significant advantages and becoming a trend in the world nowadays. Although cloud computing can provide many significant advantages, it also brings us new security problems which present strong barriers for individuals/enterprises to adapt into cloud computing. Including European Network and Information Security Agency (ENISA), many international organizations have issued their reports on the issue of cloud computing security. However, the identification of risks the cloud computing faces also mix with traditional security problems. In this paper, we aim at identifying the critical security issues which are cloud computing-designated. The results of our identification are divided into three categories, namely, policy and organizational, technical, and legal issues, which were adopted by ENISA. We also carefully analyzed the literature on cloud computing security to identify critical cloud computing-designated risk items for each category. Detailed explanations about how the risk items were identified as the critical cloud computing-designated ones are also given to show the adequacy of the proposed identifications. Most of the cloud computing-designated security issues pointed out in this paper is still open and can be taken into consideration for cloud computing service providers when designing a new cloud computing technique.


2005 ◽  
Vol 4 (2) ◽  
pp. 340-344
Author(s):  
Bohar Singh ◽  
Mandeep Kaur ◽  
Chetan Batra

Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional”computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.


2015 ◽  
Vol 8 (2) ◽  
Author(s):  
Hitesh Marwaha ◽  
Dr. Rajeshwar Singh

Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud Computing is a computing model, in which customer plug into the “cloud” to access IT resources which are priced and provided “on-demand”. The major challenges that prevent Cloud Computing from being adopted are recognized by organizations are security issues. Many techniques for securing the data in cloud are proposed by researcher but almost all methods have some drawbacks and till date no appropriate method has not been proposed that Cloud service providers can win the trust of customer. In this research paper the various security issues are reviewed along with cloud computing service providers which will give a deep insight for cloud service providers as well as researchers to work on the areas and make cloud computing a“trusted computing “and hardening the confidence of organizations towards cloud computing migration.


2019 ◽  
Vol 16 (10) ◽  
pp. 4389-4393 ◽  
Author(s):  
Mani Goyal ◽  
Avinash Sharma

Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implement a novel architecture, the first of its kind, providing an enhanced level of security for outsourcing data in a cloud computing environment consisting of multiple independent cloud providers. The framework consists of dual encryption combining Homomorphic encryption at the client end and Blowfish cryptographic technique at the server side for authorization. The diverse security issues associated with information integrity, security, confidentiality, and authenticationmust be addressed. Simulations and analysis were performed on an Oracle virtual machine Virtual-Box and a Fog environment on Ubuntu 12.04 platform. Extensive safety measures and performance analysis considering the Encrypted file size and Encryption time demonstrate that our projected proposal is vastly proficient and satisfies the requirements for secure data sharing.


Author(s):  
A. Jsv Sai Bhargav ◽  
Advin Manhar

Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and discussed various cryptography algorithms present in the existing work.


2014 ◽  
Vol 962-965 ◽  
pp. 2756-2759
Author(s):  
Dong Dong Weng ◽  
Xiao Fang Wang ◽  
Si Lv

Cloud computing mode under Internet environment construction is a new financial management information construction mode,The accounting issues of cloud computing based on derivative, through the research of cloud computing in the cloud computing platform, safety precautions in the cloud era, measurement and the ratio of income and cost of cloud cloud in cloud business model and how to make accounting voucher valid etc.To provide advice for the enterprise Accounting information construction of our country implementation of cloud computing service model, provides the countermeasure for cloud security issues, so that enterprises can better meet the arrival of the era of cloud.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Sign in / Sign up

Export Citation Format

Share Document