Security Issues in Cloud Computing

2012 ◽  
pp. 1644-1655
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.

2011 ◽  
Vol 1 (3) ◽  
pp. 1-11 ◽  
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


2013 ◽  
Vol 11 (6) ◽  
pp. 2641-2647 ◽  
Author(s):  
Vartika Kulshrestha ◽  
Dr. Seema Verma

The use of cloud computing is becoming widespread, but systematic study of its managerial implications is lacking. This paper examines cloud computing in the context of other major changes in Information Technology (IT) and explores the revolutionary transformations and challenges which bring to IT management. Cloud computing has a high reliability, low cost and good availability. With the increasing use of technology in modern era, there is a growing requirement of information technology infrastructure management. Over some decades in the past, organizations have put their efforts in the development and application of information technology to collect, analyze and process the data. Various computing paradigms have been employed for the purpose and needs have emerged for enormous infrastructure.Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructure, software application and business processes. Virtualization is a core technology for enabling cloud resources sharing (Liang et al. 2009). Virtualization refers to the abstracting of a form of technology away from its original environment. The benefit derives from being able to redeliver it in a virtual (or “logical”) form capable of the same functionality as the original, but with greater flexibility (Tata Communication White Paper 2012). This paper presents how Cloud Computing service model – Infrastructure as a Service (IaaS) can be used to meet the increasing demands of the Information Technology Infrastructure Management and how Cloud Computing paradigm can prove to be future solution for such systems. With IaaS, IT services can be delivered as a subscription service, eliminating up-front costs and driving down ongoing support costs.


Author(s):  
Sulistyo Heripracoyo

Cloud computing is a phenomenon that is currently a lot of attention from practitioners of information technology. Cloud computing can be composed of several types of services that are known to Saas, PaaS and IaaS, public and private cloud computing. Companies that do not invest themselves in the information technology infrastructure to use cloud computing services as a solution. By adopting and implementing a cloud computing services company can shift the cost of information technology infrastructure investments become operational costs by purchasing cloud computing services. Nevertheless, cloud computing, especially for the type of private cloud is still a bit of adopting it, whether it is caused by the absence of reference to the implementation or caused by something else. The purpose of this study was to analyze the adoption of cloud computing that suitable and beneficial for the company in its operational activities. The study was conducted by analysis of some of the literature related to cloud computing, benefits and barriers. According to the analysis of the literature can be explained some of the benefits associated with the adoption of cloud computing. Based on several studies that have been done, the benefits of implementing cloud computing is primarily financial savings and benefits of resource management that is the flexibility and scalability of the company's operations. However, some considerations still need to be done for a company that will implement cloud computing and those things are data security issues,  legal issues and the implications for the company.


2013 ◽  
Vol 8 (2) ◽  
pp. 845-847 ◽  
Author(s):  
Syed Mubashir Ali

Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.


Author(s):  
R. Todd Stephens

In the context of cloud computing, the service catalog is a critical component of the cloud computing architecture. Most cloud computing projects will invariably begin with a discussion of what IT services an enterprise needs. Even when end users have a cloud environment, the business still wants to know which cloud services we need and how much does it costs. Information Technology Infrastructure Library (ITIL) service design defines a service catalog as a list of technology-enabled services that an organization provides, often to its employees or customers. More specifically, the service catalog is an expression of the operational capability of a service provider or enterprise within the context of an end customer, a market space, or an internal business unit stakeholder. Unfortunately, most service catalogs are built by technologists for technologists. This design methodology is fine assuming the user of the catalog is an information technology professional.


Author(s):  
Abílio Cardoso ◽  
Fernando Moreira ◽  
Paulo Simões

Public and federal agencies from countries around the world are increasingly providing information technology based services via the Internet - known as e-government. Several of the general requirements of e-government services are satisfactorily met by the emerging Cloud Computing paradigm that promises a number of benefits such as service elasticity (the ability to handle peaks and troughs of demands); optimization of costs; capacity to handle large volumes of data; and a generalized model of Internet-based access for end-users. For this reason, it is no surprise that Cloud related technologies are gradually leveraging e-government platforms. In this chapter, a support framework is outlined that complies with and extends the well-known ITIL (Information Technology Infrastructure Library) set of best practices for IT (Information Technology) service management. It is suggested that the proposed framework can be usefully deployed to assist in the process of migrating e-government services provision to the Cloud Computing environment.


2020 ◽  
Vol 39 (6) ◽  
pp. 8091-8102
Author(s):  
Rasbihari Dayal ◽  
V. Vijayakumar ◽  
Rahul Chandra Kushwaha ◽  
Abhishek Kumar ◽  
V. D. Ambeth Kumar ◽  
...  

This research paper presents a cognitive model which manages to minimize the issues of the Information Technology Infrastructure by incorporation of service management practices. The importance of this research is that this model can be replicated in other companies for the distribution of products that wish to implement improvements in their management process technological services. This work introduces the use of Information Technology Infrastructure Library or ITIL as best practice, essential methodologies for IT Management, historical evolution, methodology, service life cycle, and ITIL certifications. Service automation is widely regarded as the usefulness and improves service guarantee. One of the most useful features of automation services is that the process will run the same way every time. Such precision in the execution of repetitive executions is virtually impossible when it comes to human labor. Therefore, the automation is the best way to improve the efficiency of the service provider and the next steps of the process.


2021 ◽  
Author(s):  
◽  
Michael Hsu

<p>Information Technology Infrastructure Library (ITIL) is a framework and an integrated set of process orientated best practices for providing IT infrastructure support, managing and delivering IT services. As organisations in the digital age rely on Information Technology for their daily operations as well as future growth and success, the ITIL framework is widely adopted. The Problem Management process is one of the Service Operation processes defined by the ITIL framework. Whilst the adoption of the ITIL framework is often for the benefit of both the organisations that provide IT support and services and the organisations which consume them, the challenges of implementing this framework and its processes is often left to the IT support organisations. This paper focuses on the ITIL Problem Management process; it reviews the principles and objectives of this IT Service Management process from an IT Governance stand point, and its implementation in the context of organisational IT services and operations. This paper collects and presents the views and insights from IT professionals who routinely worked with ITIL processes. As empirical research, this paper seeks to identify and prioritize the challenges associated with implementing the ITIL Problem Management process by the IT support organisations; it also seeks to understand the ways and methods to overcome these challenges. This paper identifies 23 unique challenges in 6 categories including “the understanding”, “the buy-in”, “the investment”, “the interrelation”, the “execution” and “the organisational factors” which are associated with implementing the ITIL Problem Management process. The ranking of these challenges is also finalized. This paper further offers suggestions for IT support organisations to overcome these challenges. It suggests that IT support organisations may first address and overcome the challenges associated with the understanding and the buy-in of the ITIL Problem Management process, and use an overall top-down approach and effective organisational communication as they try to implement the ITIL Problem Management process.</p>


2021 ◽  
Vol 5 (2) ◽  
pp. 590
Author(s):  
Reni Septiyanti ◽  
Darius Antoni ◽  
M Izman Herdiansyah ◽  
Widya Cholil

As it is known that the Government of Palembang has implemented e-government, but how much e-government can help the Palembang city government to interact between the government and all levels of society including the poor in the city of Palembang. In its application, the condition of e-government services is still insufficient infrastructure that supports                e-government services for the poor in palembang. To design a good e-government service, it is necessary to design SI/IT services for the community in Palembang with service design stages in the Framework Information Technology Infrastructure Library (ITIL) Version 2011 in order to be accepted in all levels of society including the poor in the city of Palembang. SI/IT service design based on the results of analysis of the condition and needs of SI/IT services to the business process of community service. This research uses qualitative approach method and analysis with reference standard approach using ITIL standard version 2011 in Service Design. The result of this research is in the form of the design of information system of digital service of population such as administration and population services, Family of Hope Program (PKH) services and digital archive storage services based on the Stages of Service Design in ITIL Version 2011 that has been done, namely the Service Level Management process in the form of Service Level Requirement, Service Level Agreement and Operational Level Agreement documents.


Sign in / Sign up

Export Citation Format

Share Document