Brokering Cloud Computing

Author(s):  
Georgia Dede ◽  
George Hatzithanasis ◽  
Thomas Kamalakis ◽  
Christos Michalakelis

Cloud computing is a rapidly evolving computational model, which has succeeded in transforming the ICT industry and the economy's production techniques by making corresponding services even more accessible to businesses, offering cost-effective solutions. The cloud broker is a new business model, derived from the necessity of finding the best provider, or the best bundle for the end user. It is a third-party business that assists clients in making the best decision in choosing the most suitable cloud provider and the most effective service bundle for their needs, in terms of performance and price. This chapter analyzes the cloud broker business model and highlights the broker's vital role and the benefits that arise from the use of its services. In that context, it describes cloud brokering and a market analysis, together with the most popular pricing models, together with a comparison among them, concluding with future directions for the expansion of the brokerage model.

Author(s):  
Georgia Dede ◽  
George Hatzithanasis ◽  
Thomas Kamalakis ◽  
Christos Michalakelis

Cloud computing is a rapidly evolving computational model, which has succeeded in transforming the ICT industry and the economy's production techniques by making corresponding services even more accessible to businesses, offering cost-effective solutions. The cloud broker is a new business model, derived from the necessity of finding the best provider, or the best bundle for the end user. It is a third-party business that assists clients in making the best decision in choosing the most suitable cloud provider and the most effective service bundle for their needs, in terms of performance and price. This chapter analyzes the cloud broker business model and highlights the broker's vital role and the benefits that arise from the use of its services. In that context, it describes cloud brokering and a market analysis, together with the most popular pricing models, together with a comparison among them, concluding with future directions for the expansion of the brokerage model.


2019 ◽  
Vol 2 (4) ◽  
pp. 260-266
Author(s):  
Haru Purnomo Ipung ◽  
Amin Soetomo

This research proposed a model to assist the design of the associated data architecture and data analytic to support talent forecast in the current accelerating changes in economy, industry and business change due to the accelerating pace of technological change. The emerging and re-emerging economy model were available, such as Industrial revolution 4.0, platform economy, sharing economy and token economy. Those were driven by new business model and technology innovation. An increase capability of technology to automate more jobs will cause a shift in talent pool and workforce. New business model emerge as the availabilityand the cost effective emerging technology, and as a result of emerging or re-emerging economic models. Both, new business model and technology innovation, create new jobs and works that have not been existed decades ago. The future workers will be faced by jobs that may not exist today. A dynamics model of inter-correlation of economy, industry, business model and talent forecast were proposed. A collection of literature review were conducted to initially validate the model.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2018 ◽  
Vol 1 (2) ◽  
pp. 37-39
Author(s):  
Lin Li

The concept of “sharing economy” was first proposed jointly by American Marcos Felson and Joan Spence. They described a new way of life consumption with “collaborative consumption”. The main feature of sharing economy is individuals achieve point-to-point direct transactions of goods and services through third-party platforms [1]. However, the objective conditions at that time made it difficult to put into practice. With the development of network technology, it is possible to integrate offline idle goods or personal services and provide them to users at a lower price, and become a viable new business model. As a Ride-sharing platform, Uber has become the leading enterprise in the sharing economy, its successful experience is the learning target of other sharing economic platforms, and the business model is also representative in sharing economic industry. However, Uber naively believes that the leading business model and business methods in the US market can be seamlessly extended to other countries and regions, without paying attention to localization for the users, in China and even Southeast Asia, Uber suffered a huge defeat and was replaced by DiDi and Grab. As the largest ride-sharing platform in China, DiDi was pushed to the turmoil in the second half of 2018 due to security issues, two women were raped and killed by DiDi driver while riding, and the call to shut down DiDi was endless in China. In China, Ride-sharing Platform, from Uber to DiDi, from DiDi's strong development to the current endless call to shut down, what kind of key external environmental factors affect the development of the ride-sharing platform? This paper attempts to clarify the external environmental factors that affect the development of shared travel platforms, and use the ISM model to clarify their levels and relevance.


2021 ◽  
Author(s):  
Ahmed Bentajer ◽  
Mustapha Hedabou ◽  
Sara Ennaama ◽  
Abderrahim Tahiri

The aim of this paper is to propose a model to strengthen the security of key management in cloud computing, where the model is shared or entirely controlled by a non-trusted third party provider. Key management is not a straightforward matter for IT-teams, in addition to critical issues related to properly managing and securing the keys on providers’ infrastructures, they have to deal with concerns specific to multi-cloud key management. Hardware Security Module (HSM) solution that offers a secure on-premise encryption key management turned out be impracticable for widespread cloud deployment. HSM as a Service seems to be the best approach for key management in multi-cloud, but the service is wholly owned and managed by another cloud provider. In This paper, we present an efficient and secure cloud key management that fulfills the requirements of multi-cloud deployment. The proposed design splits the key into a blinded version of n shares that will be stored in encrypted format at the cloud provider side. To demonstrate the efficiency of the proposed design, we implement a fully featured prototype and evaluate its performance. Results analysis shows that the proposed design is highly efficient and can serve as a groundwork for using secret share as a way to protect keys in a multi-cloud environment.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1253
Author(s):  
Palos-Sanchez ◽  
Robina-Ramirez ◽  
Velicia-Martin

This paper aims to investigate the factors which promote the adoption of cloud-based technology. It strives for a better understanding of the impact of corporate governance on the adoption of this technology. This study concentrated on executives in companies where the use of cloud computing may give a competitive advantage. The main contribution of this work is to propose a model for the influence of corporate governance and other factors that determine the adoption of this technology. A questionnaire was prepared after taking into consideration the reviewed literature. The sample consisted of 164 technology companies from Southern Spain that already use the new economic models for digital solutions. The methodology used to analyze the structural model was the Structural Equation Model (SEM). The results of the survey showed the influence of Corporate Governance and the procedures and practices of the organization on the adoption of cloud computing and the associated business model. This study aims to point out the importance of corporate support and Knowledge Management for the correct and successful adoption of this technology and to show the effects on the new business model of billing for the use of available resources.


2020 ◽  
Vol 1 (2) ◽  
pp. 78-83
Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwane

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2011 ◽  
pp. 31-56 ◽  
Author(s):  
Markus Böhm ◽  
Stefanie Leimeister ◽  
Christoph Riedl ◽  
Helmut Krcmar

Author(s):  
Isaac Okoth Randa

Hybrid Value Chain (HVC) has emerged both as a business model and development innovation that leverages joint capabilities of the business and citizen sectors to enable the delivery of essential goods and services to low income consumers in cost effective ways. In Namibia, especially in Windhoek, limited access to affordable housing for the low-medium income households is a major concern. Adopting an interpretivist perspective, an in-depth literature review of published records, and using hybrid value chain analysis; this chapter aims to identify an effective and efficient strategy for the delivery of affordable housing in Windhoek using the stakeholder engagement approach. HVC provides mechanisms to analyse the roles and duties of the public, private and community institutions, and thereby suggests possible policy interventions for a viable affordable housing delivery strategy. Presently, there are several non-integrated housing initiatives in Windhoek; however, the proposed Public-Private-Social-Sector Partnership model represents a new business model in the affordable housing sector.


Author(s):  
Isaac Okoth Randa

Hybrid Value Chain (HVC) has emerged both as a business model and development innovation that leverages joint capabilities of the business and citizen sectors to enable the delivery of essential goods and services to low income consumers in cost effective ways. In Namibia, especially in Windhoek, limited access to affordable housing for the low-medium income households is a major concern. Adopting an interpretivist perspective, an in-depth literature review of published records, and using hybrid value chain analysis; this chapter aims to identify an effective and efficient strategy for the delivery of affordable housing in Windhoek using the stakeholder engagement approach. HVC provides mechanisms to analyse the roles and duties of the public, private and community institutions, and thereby suggests possible policy interventions for a viable affordable housing delivery strategy. Presently, there are several non-integrated housing initiatives in Windhoek; however, the proposed Public-Private-Social-Sector Partnership model represents a new business model in the affordable housing sector.


Sign in / Sign up

Export Citation Format

Share Document