SOHO Users' Perceptions of Reliability and Continuity of Cloud-Based Services

2019 ◽  
pp. 1631-1662
Author(s):  
Cornel L. Levy ◽  
Nilsa I. Elias

The adaptation of cloud computing services is continually growing because of its popularity, its ubiquitous, ease-of-use, and inexpensive nature. Small office/home office (SOHO) businesses are joining large organizations and purchasing cloud services to help with the continuity of their business services. However, cloud computing and its effect in business continuity and information security by SOHO users is not well understood. A qualitative case study was conducted to examine the perspectives of SOHO users of cloud services during Hurricane Sandy in the states of New York and New Jersey. SOHO cloud users were questioned about their understanding of cloud services for business continuity, the services provided by cloud vendors, and their perceptions about cloud data management and security services. The results of this study demonstrated that SOHO users gravitate to the cloud because it of its ubiquitous nature, however, they lack understanding of the business continuity and disaster recovery features and their impact in data security and, their business endurance.

Author(s):  
Cornel L. Levy ◽  
Nilsa I. Elias

The adaptation of cloud computing services is continually growing because of its popularity, its ubiquitous, ease-of-use, and inexpensive nature. Small office/home office (SOHO) businesses are joining large organizations and purchasing cloud services to help with the continuity of their business services. However, cloud computing and its effect in business continuity and information security by SOHO users is not well understood. A qualitative case study was conducted to examine the perspectives of SOHO users of cloud services during Hurricane Sandy in the states of New York and New Jersey. SOHO cloud users were questioned about their understanding of cloud services for business continuity, the services provided by cloud vendors, and their perceptions about cloud data management and security services. The results of this study demonstrated that SOHO users gravitate to the cloud because it of its ubiquitous nature, however, they lack understanding of the business continuity and disaster recovery features and their impact in data security and, their business endurance.


2016 ◽  
pp. 823-848 ◽  
Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2021 ◽  
Author(s):  
Olena Ponomaryova ◽  
◽  
Sergy Ponomaryiov ◽  

The current problem of transition to the use of "Cloud Computing" in the process of assessing possible use has been reflected in this study. Assessments of the capabilities of cloud services have been conducted, which are part of a group study of cloud computing as a platform for creating a communication environment in the scientific activities of the Free Economic Zone. The essence of the concept of cloud computing is to provide end users with remote dynamic access to services, computing resources and applications via the Internet. The main possibilities and functions of the information space of scientific communications have been considered. In the process of evaluating the possible use of cloud solutions, the main properties, capabilities and characteristics have also been considered. Web-services based on cloud computing technology in terms of meeting the goals of the scientific community have been analyzed. The most widely used and widely used cloud storage services today that can be used to build a research communication platform are cloud infrastructure providers Google, Amazon and Microsoft. When using the capabilities of these services, favorable conditions are created for the translation of all necessary functions into cyberspace. Today, no more than 37% of domestic organizations actually use cloud technologies to optimize their IT infrastructures, although the COVID-19 pandemic has significantly accelerated this process. Experts claim that Cloud Computing opens access to powerful resources, as well as provides a real opportunity to overcome the technological gap that separates Ukraine from more developed countries. With the successful implementation of such a transition, it is possible to organize a platform of communication environment with new features that meet modern requirements for safety and ease of use in scientific activities. Thus, "cloud computing" is a new approach that reduces the complexity of IT systems, through the use of a wide range of efficient technologies, self-managed and available on demand within the virtual infrastructure, as well as consumed as services.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Abdulelah Alwabel ◽  
Robert John Walters ◽  
Gary B. Wills

Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing that aims at providing Cloud capabilities at low or no cost. Desktop Clouds harness non dedicated and idle resources in order to provide Cloud services. However, the nature of such resources can be problematic because they are prone to failure at any time without prior notice. This research focuses on the resource allocation mechanism in Desktop Clouds.The contributions of this chapter are threefold. Firstly, it defines and explains Desktop Clouds by comparing them with both Traditional Clouds and Desktop Grids. Secondly, the paper discusses various research issues in Desktop Clouds. Thirdly, it proposes a resource allocation model that is able to handle node failures.


Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


Sign in / Sign up

Export Citation Format

Share Document