Comparative Study of Amazon Web Services (AWS) and Online Computer Library Services (OCLC) Web Players

Author(s):  
Ravikant M. Deshpande ◽  
Suvarna H. Paunikar ◽  
Nilima D. Likhar

Cloud computing is a model to provide on-demand access of configurable computing services and resources to the network users without direct service provider interaction. Cloud computing is one of the new buzzwords in the business world. It is a generic term for computing solution where software and services are provided over the Internet. Also the cloud computing delivered and managed IT services in several different forms such as Platform, Infrastructure, and to publish Web services for the patrons. In this chapter we discuss technology, benefits, and initiatives and mainly compare about the Amazon Web Services (AWS) and Online Computer Library Centre (OCLC) cloud service players.

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Se-Joon Park ◽  
Yong-Joon Lee ◽  
Won-Hyung Park

Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Dayu Wang ◽  
Daojun Zhong ◽  
Liang Li

PurposeInformation technology infrastructure library (ITIL) is a commonly utilized IT service management execution technique that helps IT services to be planned, designed, selected, operated and continuously improved. ITIL procedures are utilized to measure the efficiency of IT service management procedures and their association with the accelerated system development of cloud systems. The challenges faced in IT deployment and maintenance management significantly restrict cloud computing services' reliability. Therefore, this article aims to review a comprehensive study of the role of cloud computing on the ITIL processes.Design/methodology/approachEach enterprise strives to stay competitive in the market and offers the services its consumers are looking for, all in line with cost-effectiveness and client needs. The ITIL framework provides best practice guidance for IT service management that includes a collection of ample publications supplying detailed guidelines on the management of IT functions, processes, responsibilities and roles associated with IT service management. On the other hand, the way companies employ IT services with an effect on the role of enterprise infrastructure is altered by cloud computing. Hence, the investigation makes utilization of a systematic literature review (SLR) detailing crucial success factors of cloud computing execution in ITIL. The authors have recognized 35 valuable contributions, providing a comprehensive view of study in this field, of which 22 papers were found according to some filters that have been analyzed in this article. Selected articles are presented in two groups, including cloud service and cloud service providers.FindingsOwing to the overall expense of execution and problems with combining the ITIL approach with the existing organizational IT strategic strategy, ITIL adoption has begun to wane over the last few years. An established methodology for ITIL deployment that will assure long-term success for those wanting to use private cloud procurement will be the most important inference that can be taken from this article. ITIL offers a perfect platform to execute and support cloud applications effectively. IT will prevent cloud sprawl and instability, reduce the likelihood of service interruption and optimize customer loyalty by merging humans, procedures and technologies into hybrid environments.Research limitations/implicationsThis survey is more aimed at specialists such as IT experts; so, further evaluations must also be carried out in order to understand the company's views on the risks and advantages of adopting ITIL. In addition, non-English articles are not discussed in this article.Practical implicationsThe study outcomes would help suppliers of cloud computing services assess their service quality and ensure customer satisfaction with the quality of cloud computing services. The outcomes will also supply a reference for cloud infrastructure customers to assess and choose various kinds of cloud computing services.Originality/valueAn SLR with perspectives from ITIL professionals and business studies is the benefit of this report. By offering a more thorough framework that helps companies achieve efficiency, effectiveness and creativity in ITIL execution, this article would be useful for ITIL clients, decision-makers and developers.


2020 ◽  
Vol 10 (24) ◽  
pp. 9148
Author(s):  
Germán Moltó ◽  
Diana M. Naranjo ◽  
J. Damian Segrelles

Cloud computing instruction requires hands-on experience with a myriad of distributed computing services from a public cloud provider. Tracking the progress of the students, especially for online courses, requires one to automatically gather evidence and produce learning analytics in order to further determine the behavior and performance of students. With this aim, this paper describes the experience from an online course in cloud computing with Amazon Web Services on the creation of an open-source data processing tool to systematically obtain learning analytics related to the hands-on activities carried out throughout the course. These data, combined with the data obtained from the learning management system, have allowed the better characterization of the behavior of students in the course. Insights from a population of more than 420 online students through three academic years have been assessed, the dataset has been released for increased reproducibility. The results corroborate that course length has an impact on online students dropout. In addition, a gender analysis pointed out that there are no statistically significant differences in the final marks between genders, but women show an increased degree of commitment with the activities planned in the course.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Md Whaiduzzaman ◽  
Mohammad Nazmul Haque ◽  
Md Rejaul Karim Chowdhury ◽  
Abdullah Gani

Cloud computing is currently emerging as an ever-changing, growing paradigm that models “everything-as-a-service.” Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.


2011 ◽  
Vol 7 (8) ◽  
pp. e1002147 ◽  
Author(s):  
Vincent A. Fusaro ◽  
Prasad Patil ◽  
Erik Gafni ◽  
Dennis P. Wall ◽  
Peter J. Tonellato

2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


Author(s):  
Marcus Tanque

Cloud computing consists of three fundamental service models: infrastructure-as-a-service, platform-as-a service and software-as-a-service. The technology “cloud computing” comprises four deployment models: public cloud, private cloud, hybrid cloud and community cloud. This chapter describes the six cloud service and deployment models, the association each of these services and models have with physical/virtual networks. Cloud service models are designed to power storage platforms, infrastructure solutions, provisioning and virtualization. Cloud computing services are developed to support shared network resources, provisioned between physical and virtual networks. These solutions are offered to organizations and consumers as utilities, to support dynamic, static, network and database provisioning processes. Vendors offer these resources to support day-to-day resource provisioning amid physical and virtual machines.


Author(s):  
Rizik M. H. Al-Sayyed ◽  
Wadi’ A. Hijawi ◽  
Anwar M. Bashiti ◽  
Ibrahim AlJarah ◽  
Nadim Obeid ◽  
...  

Cloud computing is one of the paradigms that have undertaken to deliver the utility computing concept. It views computing as a utility similar to water and electricity. We aim in this paper to make an investigation of two highly efficacious Cloud platforms: Microsoft Azure (Azure) and Amazon Web Services (AWS) from users’ perspectives the point of view of users. We highlight and compare in depth the features of Azure and AWS from users’ perspectives. The features which we shall focus on include (1) Pricing, (2) Availability, (3) Confidentiality, (4) Secrecy, (5) Tier Account and (6) Service Level Agreement (SLA). The study shows that Azure is more appropriate when considering Pricing and Availability (Error Rate) while AWS is more appropriate when considering Tier account. Our user survey study and its statistical analysis agreed with the arguments made for each of the six comparisons factors.


Sign in / Sign up

Export Citation Format

Share Document