scholarly journals Confidence Crisis in the Application of Cloud Computing in the Industrial Companies in Jordan a Field Study

Author(s):  
Abdullah Mohammed Al-Zoubi ◽  
Ibtissam Al-Masaiid

The current study aimed at determining the extent to which the industrial companies in Jordan have a confidence crisis in applying cloud computing. This crisis is divided into three different categories: a confidence crisis in programs and operations, a confidence crisis in service providers and a confidence crisis in the security and protection offered by service providers. In order to achieve the purpose of the research, a questionnaire was designed covering the three areas of confidence crisis. (120) questionnaires were distributed on a stratified random sample of (81) industrial companies in Al Hassan industrial estate in Irbid; (104) valid questionnaires were retrieved. The results of the study show that there is indeed a confidence crisis in the application of cloud computing in the Jordanian industrial companies within the three aforementioned domains. The researchers recommend that the service providers should educate on the cloud computing mechanisms and how the systems, applications and stored data are protected, so as to avoid such a confidence crisis in the industrial companies.

2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


2018 ◽  
Vol 24 (1) ◽  
pp. 161-181 ◽  
Author(s):  
Yashar Abed ◽  
Meena Chavan

Data protection and data privacy are significant challenges in cloud computing for multinational corporations. There are no standard laws to protect data across borders. The institutional and regulatory constraints and governance differ across countries. This article explores the challenges of institutional constraints faced by cloud computing service providers in regard to data privacy issues across borders. Through a qualitative case study methodology, this research compares the institutional structure of a few host countries, with regard to data privacy in cloud computing and delineates a relative case study. This article will also review the cloud computing legal frameworks and the history of cloud computing to make the concept more comprehensible to a layman.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Cloud Computing is a new way of delivering computing resources and services. It is a model for on-demand network access to a shared pool of configurable computing resources like, networks, servers, storage, applications, and services that can be provided with minimal management effort or service provider interaction. The cloud model is composed of five essential characteristics, four service models, and four deployment models. Healthcare is faster growing way to adopt cloud computing. It is very important for every individual and essential for every country in the Globe. Electronic healthcare systems in the world are moving towards a more accessible, collaborative and more proactive way in reaching out to the public. The delivering of public health solutions can lead to increased efficiencies in health related data. Many nations across the globe have launched aggressive stimulus programs aimed at solving public healthcare problems in efficient way. This review article mainly focus on different ICT based infrastructure facilities available in various hospitals in India, abroad with cost effective manner using cloud computing technologies, services and this will be a best solutions for healthcare systems in rural areas. In this paper analyzed and presented about various cloud service providers, investment in healthcare, IT adoption in Indian Healthcare sector, Major benefits of Cloud-based Patient Management System [PMS], about SADA systems, Top ten cloud storage companies in healthcare and Pros and Cons of EHR systems, comparison of Indian healthcare systems with US system, and various Cloud Simulators.


Sign in / Sign up

Export Citation Format

Share Document