scholarly journals Analisa Studi Literatur Manfaat Implementasi Komputasi Awan untuk Perusahaan

Author(s):  
Sulistyo Heripracoyo

Cloud computing is a phenomenon that is currently a lot of attention from practitioners of information technology. Cloud computing can be composed of several types of services that are known to Saas, PaaS and IaaS, public and private cloud computing. Companies that do not invest themselves in the information technology infrastructure to use cloud computing services as a solution. By adopting and implementing a cloud computing services company can shift the cost of information technology infrastructure investments become operational costs by purchasing cloud computing services. Nevertheless, cloud computing, especially for the type of private cloud is still a bit of adopting it, whether it is caused by the absence of reference to the implementation or caused by something else. The purpose of this study was to analyze the adoption of cloud computing that suitable and beneficial for the company in its operational activities. The study was conducted by analysis of some of the literature related to cloud computing, benefits and barriers. According to the analysis of the literature can be explained some of the benefits associated with the adoption of cloud computing. Based on several studies that have been done, the benefits of implementing cloud computing is primarily financial savings and benefits of resource management that is the flexibility and scalability of the company's operations. However, some considerations still need to be done for a company that will implement cloud computing and those things are data security issues,  legal issues and the implications for the company.

2011 ◽  
Vol 1 (3) ◽  
pp. 1-11 ◽  
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


2017 ◽  
Vol 17 (4) ◽  
pp. 3-31 ◽  
Author(s):  
P. Ravi Kumar ◽  
P. Herbert Raj ◽  
P. Jelciana

AbstractCloud computing is emerging as one of the powerful computing technologies in the field of Information Technology due to its flexibility and cost reduction. This paper provides a detailed survey on security issues of the services provided by cloud computing and solutions to mitigate them. The main objective of this paper is to empower a new researcher to figure out the concepts of cloud computing, the services provided by them, and the security issues in the services. It also provides solutions to avoid or mitigate the different security issues which occur in the services provided by cloud computing. Additionally, it provides insight into the cloud computing model proposed by the National Institute of Standards and Technology (NIST), data stages and data security basics in a multi-tenant environment. This paper explores the different security methods proposed by different researchers and analyzes them.


2012 ◽  
pp. 1644-1655
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


2013 ◽  
Vol 8 (2) ◽  
pp. 845-847 ◽  
Author(s):  
Syed Mubashir Ali

Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Fitriana Fajrin ◽  
Ahmad Sabiq

The development of information technology indirectly require changes to the computational needs. In achieving the expected computing needs, some emerging computing paradigm, referred to as Cloud Computing. Private Cloud is a cloud-computing services are provided to meet the internal needs of an organization / company. By using Proxmox OS as the main foundation, the server private cloud built on virtual technology that can provide the computing needs of Academic Information Systems at the Politeknik Purbaya. Besides virtual technology capable of providing support to the Private Cloud to produce the most effective alternative solutions for the development of an integrated system.


2012 ◽  
Vol 43 (4) ◽  
pp. 73-81 ◽  
Author(s):  
R. Von Solms ◽  
M. Viljoen

This paper aims to alert the board to their duty of adding value to the organizations they represent by recognizing opportunities presented by new developments in information technology. Cloud computing is one such development, which is associated with opportunities and benefits. The service value that can be achieved by using this computing model will be influential in the adoption of cloud computing services. Service value is determined by the warranty and utility associated with that service. Thus, if an organization can associate itself with the utility and warranty on offer via cloud computing, it should consider the adoption of these services. Cloud computing is discussed in terms of service value. This promotes an understanding of factors to be considered when making decisions about the adoption of cloud computing.


Author(s):  
Abílio Cardoso ◽  
Fernando Moreira ◽  
Paulo Simões

Public and federal agencies from countries around the world are increasingly providing information technology based services via the Internet - known as e-government. Several of the general requirements of e-government services are satisfactorily met by the emerging Cloud Computing paradigm that promises a number of benefits such as service elasticity (the ability to handle peaks and troughs of demands); optimization of costs; capacity to handle large volumes of data; and a generalized model of Internet-based access for end-users. For this reason, it is no surprise that Cloud related technologies are gradually leveraging e-government platforms. In this chapter, a support framework is outlined that complies with and extends the well-known ITIL (Information Technology Infrastructure Library) set of best practices for IT (Information Technology) service management. It is suggested that the proposed framework can be usefully deployed to assist in the process of migrating e-government services provision to the Cloud Computing environment.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Sign in / Sign up

Export Citation Format

Share Document