Cloud Computing Security of E-Commerce Environment

2013 ◽  
Vol 347-350 ◽  
pp. 3377-3380
Author(s):  
Xiao Feng Wang

Cloud computing is a hot technology now, is a new business model. The use of cloud computing to businesses in many industries, especially e-commerce has brought new opportunities, However, due to the characteristics of its own cloud computing and the Internet network security flaws, Resulting in e-commerce system security weaknesses. This paper describes the cloud computing and security issues of cloud computing in the e-commerce, through e-commerce security needs analysis, proposed ensuring e-commerce security methods in the cloud.

Author(s):  
Hamisu Alhaji Ali

In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy continually understand that by just outsourcing or tapping the cloud  resources, a package of virtualise, elastic, instant on-demand provision, and scalable; infrastructure, platform, and software can be access fast and easy inform of services at a negligible amount via the internet. However, as individuals and organizations embarked on the course of deploying their information and data into the cloud, anxieties are beginning to develop on whether the cloud environment is safe. This research provides an overview of the cloud deployment model, the services they offer and discusses the security issues and challenges of cloud computing in both data storage and virtual applications/servers.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


for organizations green cloud computing is a new computational architecture which provides a business model; organization can acquire it without paying upfront investments. Cloud computing provide the potential gain but providing security in cloud computing is very necessary. Under the cloud model, security issue is become more complicated as new dimensions entered into the security scenario


2018 ◽  
Vol 2 (4-2) ◽  
pp. 293 ◽  
Author(s):  
Marry Teo ◽  
Hairulnizam Mahdin ◽  
Lee Jia Hwee ◽  
Haezel Ann Dicken ◽  
Tay Xin Hui ◽  
...  

Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software. However cloud computing still has many issues concerning securities, such as privacy issues, loss of data and stolen of data. Some security issues over cloud services including confidentiality, integrity, availability, privacy and attacks are concerned by the users. This paper reviews some of the issues and its current solutions.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


Author(s):  
Ainul Azila Che Fauzi ◽  
A. Noraziah ◽  
Tutut Herawan ◽  
Noriyani Mohd. Zin

Web Services ◽  
2019 ◽  
pp. 351-376
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing has recently emerged as a new paradigm of computing for hosting and delivering services over the Internet. It replaces computing as a personal commodity by computing as a public utility. It is attractive solution to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the significant benefits, these technologies present many challenges including lack of security. The chapter presents an advanced survey focusing on cloud computing concept. It highlights its key concepts and presents a physical architecture of this environment. Finally, the chapter defines virtualization technology as a factor for cloud computing surge and discuses security issues that damage these systems. The aim of this chapter is to provide a better understanding of the design challenges of cloud computing.


Author(s):  
Georgia Dede ◽  
George Hatzithanasis ◽  
Thomas Kamalakis ◽  
Christos Michalakelis

Cloud computing is a rapidly evolving computational model, which has succeeded in transforming the ICT industry and the economy's production techniques by making corresponding services even more accessible to businesses, offering cost-effective solutions. The cloud broker is a new business model, derived from the necessity of finding the best provider, or the best bundle for the end user. It is a third-party business that assists clients in making the best decision in choosing the most suitable cloud provider and the most effective service bundle for their needs, in terms of performance and price. This chapter analyzes the cloud broker business model and highlights the broker's vital role and the benefits that arise from the use of its services. In that context, it describes cloud brokering and a market analysis, together with the most popular pricing models, together with a comparison among them, concluding with future directions for the expansion of the brokerage model.


Sign in / Sign up

Export Citation Format

Share Document