Selection of Cloud Delivery and Deployment Models

Author(s):  
Mustafa I.M. Eid ◽  
Ibrahim M. Al-Jabri ◽  
M. Sadiq Sohail

Research interests on cloud computing adoption and its effectiveness in terms of cost and time has been increasing. However, one of the challenging decisions facing management in adopting cloud services is taking on the right combinations of cloud service delivery and deployment models. A comprehensive review of literature revealed a lack of research addressing this selection decision problem. To fill this research gap, this article proposes an expert system approach for managers to decide on the right combination of service delivery and deployment model selection. The article first proposes a rule-based expert system prototype, which provides advice based on a set of factors that represent the organizational conditions and requirements pertaining to cloud computing adoption. Next, the authors evaluate the system prototype. Lastly, the article concludes with a discussion of the results, its practical implications, limitations, and further research directions.

2018 ◽  
Vol 10 (4) ◽  
pp. 17-32
Author(s):  
Mustafa I.M. Eid ◽  
Ibrahim M. Al-Jabri ◽  
M. Sadiq Sohail

Research interests on cloud computing adoption and its effectiveness in terms of cost and time has been increasing. However, one of the challenging decisions facing management in adopting cloud services is taking on the right combinations of cloud service delivery and deployment models. A comprehensive review of literature revealed a lack of research addressing this selection decision problem. To fill this research gap, this article proposes an expert system approach for managers to decide on the right combination of service delivery and deployment model selection. The article first proposes a rule-based expert system prototype, which provides advice based on a set of factors that represent the organizational conditions and requirements pertaining to cloud computing adoption. Next, the authors evaluate the system prototype. Lastly, the article concludes with a discussion of the results, its practical implications, limitations, and further research directions.


2022 ◽  
Vol 30 (1) ◽  
pp. 655-689
Author(s):  
Osama Abied ◽  
Othman Ibrahim ◽  
Siti Nuur-Ila Mat Kamal

Cloud computing in governments has become an attraction to help enhance service delivery. Improving service delivery, productivity, transparency, and reducing costs necessitates governments to use cloud services. Since the publication of a review paper on cloud adoption elements in e-governments in 2015, cloud computing in governments has evolved into discussions of cloud service adoption factors. This paper concentrates on the adoption of cloud computing in governments, the benefits, models, and methodologies utilized, and the analysis techniques. Studies from 2010 up to 2020 have been investigated for this paper. This study has critically peer-reviewed articles that concentrate on cloud computing for electronic governments (e-Governments). It exhibits a systematic evaluation of the empirical studies focusing on cloud adoption studies in e-governments. This review work further categorizes the articles and exhibits novel research opportunities from the themes and unexhausted areas of these articles. From the reviewed articles, it has been observed that most of the articles have employed the quantitative approach, with few utilizing qualitative and mixed-method approaches. The results reveal that cloud computing adoption could help solve problems in learning, such as infrastructure issues, cost issues, and improve service delivery and transparency. This review gives more information on the future directions and areas that need attention, like the trust of cloud computing in e-governments.


In this chapter, the authors consider cloud computing as a core topic and various models emerging around it such as its services and delivery models, its economic aspects, applications, usages, challenges, and so on. Cloud computing covers a range of delivery and service models. In this chapter, cloud service delivery models (i.e., Software-as-a-Service, Platform-as-a-Service and Infrastructure-as-a-Service) and cloud deployment models (private cloud, community cloud, public cloud, and hybrid cloud) are described. The right service delivery and deployment option have to be chosen for an organization’s cloud application, according to organizational needs.


10.29007/j2nc ◽  
2019 ◽  
Author(s):  
Kenneth Ayong ◽  
Rennie Naidoo

The adoption of cloud computing among SMEs in developing countries, particularly South Africa, is still very low. The purpose of this study is to develop a conceptual model to assess the critical factors that influences South African SMEs to adopt cloud services. This paper proposes an integrated conceptual model that incorporates critical factors from the diffusion of innovation (DOI) theory, institutional theory, transaction cost theory, organisation theory, information security theory, and trust theories. Cloud computing adoption research dominated by the DOI perspective, can benefit from further cross- fertilization with different theories to explain and predict patterns of cloud services use in the SME context. This model is expected to offer deeper insights and practical value to SME decision makers, cloud service providers, regulatory agencies and government responsible for establishing cloud computing adoption strategies for SMEs in South Africa. We intend to apply this model to survey research in future studies.


2019 ◽  
pp. 574-591
Author(s):  
Anas M.R. Alsobeh ◽  
Aws Abed Al Raheem Magableh ◽  
Emad M. AlSukhni

Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.


2019 ◽  
Vol 8 (4) ◽  
pp. 12522-12528

The purpose of the study was to explore the Cloud computing Practicing level, Cloud computing Satisfaction level and the Preferred Cloud service provider among the Online Business SMEs (OBSMEs) in Sri Lanka that have adopted Cloud services. Prior studies have shown that SMEs significantly benefit due to the adoption of Cloud computing services. The study was conducted among 260 randomly selected OBSMEs using self-administered questionnaires from managerial and ICT professionals who were capable of making ICT decision at OBSMEs under this study. However only 247 questionnaires were returned with complete data required for the purpose of analysis. A descriptive analysis was used to analyse the data. The findings have revealed that 31% of the OBSMEs are frequently Practicing Cloud computing for their ICT needs, while 69% of them relies on Cloud computing for their different ICT needs usually. Findings reveals that 35% of the OBSMEs are moderately Satisfied in this study, while 61% of OBSMEs have been reported that they are very Satisfied with Cloud computing services, at the same time 4% of the OBSMEs are reported that they have extremely Satisfied with Cloud computing services. In the context of OBSMEs it has been reported that 78% of the Cloud service providers are rendering reliability of services and OBSMEs are very satisfied, while 12% of the OBSMEs are moderately satisfied with the reliability of services and other 10% of the OBSMEs are extremely satisfied with the reliability of services provided by Cloud Service Providers in Sri Lanka. This study extends the existing body of knowledge by providing empirical support for explaining cloud computing adoption by OBSME in Sri Lanka. The study add value for various parties engaging in promoting the adoption of cloud computing among various business industries in Sri Lanka. Therefore, the researchers are able to recommend that cloud computing technology is playing a significant role for the improvement of business industries in Sri Lanka and the software vendors, policy makers and technological service providers should consider the findings of this study if they have intention to adopt this technology in future. Moreover, the findings of this research would assist and enhance service providers to consider their investment in information technology when adopting and implementing Cloud computing in Sri Lanka.


2018 ◽  
Vol 15 (1) ◽  
pp. 71-88
Author(s):  
Anas M.R. Alsobeh ◽  
Aws Abed Al Raheem Magableh ◽  
Emad M. AlSukhni

Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.


End the age of digitalization, data generated from numerous online and offline sources in every second. The Data are having a considerable amount of size and several properties termed as Bigdata. It is challenging to store, manage processes, analyze, visualize, and extract useful information from Bigdata using traditional approaches in local machines. To resolve this cloud computing platform is the solution. Cloud computing has high-level processing units, storage, and applications that do not depend on user devices' performance. Many users can access resources and demanded services remotely from the cloud on a pay-as-use basis. That is why users are not needed to buy and install costly resources locally. Some cloud services providers are Google, AWS, IBM, and Microsoft, and they have their Bigdata analyzing robust systems and products in a cost-efficient manner. There are many Cloud Service Providers (CSP's) having different services of Bigdata analyzing filed. However, we discuss in the paper about an excellent service BigQuery in the Data warehouse product of Google to analyze and represent numerous samples of datasets in real-time for making the right decisions within a short time.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Sign in / Sign up

Export Citation Format

Share Document