Choosing Clouds for an Enterprise

2013 ◽  
Vol 4 (2) ◽  
pp. 38-53
Author(s):  
Ruay-Shiung Chang ◽  
Chih-Shan Liao ◽  
Chuan-Yu Liu

The development of cloud computing has advanced rapidly over the past few years. Benefiting from the dynamic characteristics of cloud computing, enterprises can purchase cloud services based on different aspects in order to save operating expenses. Many companies have seen the opportunities and changes in either cloud service providers or cloud service consumers. For the latter, with so many cloud providers to choose from, there is a need for an evaluation of standards to help find the most suitable service provider. In this paper, the essential factors of enterprise clouds are discussed. An evaluation model is defined, and a web-based enterprise cloud selection application is implemented.

2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2020 ◽  
Vol 31 (4) ◽  
pp. 411-424
Author(s):  
Han Lai ◽  
Huchang Liao ◽  
Zhi Wen ◽  
Edmundas Kazimieras Zavadskas ◽  
Abdullah Al-Barakati

With the rapid growth of available online cloud services and providers for customers, the selection of cloud service providers plays a crucial role in on-demand service selection on a subscription basis. Selecting a suitable cloud service provider requires a careful analysis and a reasonable ranking method. In this study, an improved combined compromise solution (CoCoSo) method is proposed to identify the ranking of cloud service providers. Based on the original CoCoSo method, we analyze the defects of the final aggregation operator in the original CoCoSo method which ignores the equal importance of the three subordinate compromise scores, and employ the operator of “Linear Sum Normalization” to normalize the three subordinate compromise scores so as to make the results reasonable. In addition, we introduce a maximum variance optimization model which can increase the discrimination degree of evaluation results and avoid inconsistent ordering. A numerical example of the trust evaluation of cloud service providers is given to demonstrate the applicability of the proposed method. Furthermore, we perform sensitivity analysis and comparative analysis to justify the accuracy of the decision outcomes derived by the proposed method. Besides, the results of discrimination test also indicate that the proposed method is more effective than the original CoCoSo method in identifying the subtle differences among alternatives.


2019 ◽  
Vol 8 (3) ◽  
pp. 4978-4982

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Cloud computing theoretically provides all computing needs as services. Accordingly, a large number of cloud service providers exist and the number is constantly increasing. This presents a significant problem for a user to find a relevant service provider, and calls for developing a specialized search engine to help users select suitable services matching their needs. Towards this goal, we developed a search engine that crawls the web sites of various service providers, extracts service attributes from their JavaScript Object Notation (JSON) files and normalizes the attributes in a service table. Those attributes are clustered using one of three different algorithms (K-means, K-medoids, and ISODATA). The requirements of a given user are then matched against the centroids of the various clusters to help obtain the closest match. In this paper, we compared the three algorithms with respect to time and accuracy. The ISODATA algorithm exhibited the best performance.


Author(s):  
Alpana M. Desai ◽  
Kenrick Mock

Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of cloud computing. Enterprises that plan to utilize cloud services for their infrastructure, platform, and/or software needs must understand the security risks and privacy issues related to cloud computing. This chapter discusses the technical, legal, and policy/organizational security risks of cloud computing, and reviews recommendations/strategies for managing and mitigating security threats in cloud computing. It also presents vendor-specific solutions and strategies that cloud service providers are implementing for mitigating security risks in cloud computing.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Aveek Basu ◽  
Sanchita Ghosh

Cloud computing can be considered as one of the leading-edge technological advances in the current IT industry. Cloud computing or simply cloud is attributed to the Service Oriented Architecture. Every organization is trying to utilize the benefit of cloud not only to reduce the cost overhead in infrastructure, network, hardware, software, etc., but also to provide seamless service to end users with the benefit of scalability. The concept of multitenancy assists cloud service providers to leverage the costs by providing services to multiple users/companies at the same time via shared resource. There are several cloud service providers currently in the market and they are rapidly changing and reorienting themselves as per market demand. In order to gain market share, the cloud service providers are trying to provide the latest technology to end users/customers with the reduction of costs. In such scenario, it becomes extremely difficult for cloud customers to select the best service provider as per their requirement. It is also becoming difficult to decide upon the deployment model to choose among the existing ones. The deployment models are suitable for different companies. There exist divergent criteria for different deployment models which are not tailor made for an organization. As a cloud customer, it is difficult to decide on the model and determine the appropriate service provider. The multicriteria decision making method is applied to find out the best suitable service provider among the top existing four companies and choose the deployment model as per requirement.


2019 ◽  
Vol 12 (3) ◽  
pp. 27
Author(s):  
Sara Moazzezi Eftekhar ◽  
Witold Suryn

In recent years, we have witnessed a marked rise in the number of cloud service providers with each offering a plethora of cloud services with different objectives. Gaining confidence for cloud technology adoption as well as selecting a suitable cloud service provider, both require a proper evaluation of cloud service trust characteristics. Hence, the evaluation of cloud services before used by the customer is of utmost importance. In this article, we adapt the extracted trust characteristics from both system and software quality standards and cloud computing standards, for evaluating cloud services. Moreover, we derive measures for each trust characteristics to evaluate the trustworthiness of different cloud service providers, and generalize these trust measures for any type of cloud services (e.g. Software as a Service, Platform as a Service, and Infrastructure as a Service). Our work thereby demonstrates a way to apply generalized trust measures for cloud services and therefore contributes to a better understanding of cloud services to evaluate their quality characteristics. As part of our ongoing research, the results of this study will be used to develop a comprehensive cloud trust model.


2020 ◽  
pp. 519-546
Author(s):  
Mohammad Shalan

Cloud Computing (CC) services have made substantive advances in the past few years. It is rapidly changing the landscape of technology, and energizing the long-held promise of utility computing. Successful jump into CC is a considerable task, since the surroundings are not yet mature and the accompanied risk and governance frameworks are still evolving. This effort aims to portray an identity for CC services by employing risk and governance directions among other elements and techniques. Cloud Service Footprint (CSF) is considering practical aspects surrounding the CC paradigm and prescribing the associated directions. CSF will help Cloud Service Providers (CSPs) to characterize their service and benchmark themselves. The Client Enterprises (CEs) can utilize CSF dimensions to find a better way to navigate through CC service arena and to understand its parameters. Along with cost and functional capabilities, the Cloud Service Footprint (CSF) can provide enough information for business executives to evaluate CC services and make informed decisions.


2020 ◽  
Vol 8 (6) ◽  
pp. 3727-3730

Cloud computing is one of the popular technological advancement in the current IT industry. The multifaceted benefits of cloud computing has attracted huge number of public and industrial customers. There are numerous cloud service providers available with variations in type and cost of resources. This makes it very difficult to select a suitable service provider. The Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) is a popular method used of ranking service providers. However it reuires parameters that belong to a same category and rating scale. In this research we propose M-TOPSIS (Multilayer TOPSIS), a technique for ranking of service providers based on different categories with multiple parameters having different rating scales. The proposed technique applies TOPSIS for each category of input. The ranking of service provider in each category is then used to rank the available service providers, based on the overall performance. The efficiency of the proposed technique is compared with the existing models and the experimental results proved that the M-TOPSIS is able to rank service providers more accurately than the other existing models like E-FPROMTHEN.


Sign in / Sign up

Export Citation Format

Share Document