scholarly journals Cloud Computing Models for Business

Author(s):  
Irina Alekseevna Vorobeva ◽  
◽  
Alexander Vladimirovich Panov ◽  
Alexander Arkadyevich Safronov ◽  
Alexey Ivanovich Sazonov

The idea of cloud computing is not a new one, it has been developed and discussed for many years. Cloud computing is a model which allows to get access to the network upon request from the set of adjustable computing services, such as infrastructure, applications and storages. Cloud services and data storage products allow their users to store and share any type of document and file from any device connected to Internet. There are several types of cloud services, which can be subdivided into: SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service). Besides, there are several deployment models, such as public, residential, hybrid or community cloud. Cloud computing models are based on modern process paradigm, which offers new alternatives to the companies of various ranges for implementation of innovative business models. With the help of these new business models small companies will be able to use cloud computing platforms and to increase gradually their computation capacities and data storage capacities depending on the requirements in real time mode, which creates a unique opportunity for market competition. Keywords— cloud computing, IaaS, OpenStack, PaaS, SaaS.

2016 ◽  
pp. 823-848 ◽  
Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


Author(s):  
Ute Riemann

Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.


Compiler ◽  
2015 ◽  
Vol 4 (2) ◽  
Author(s):  
Hero Wintolo ◽  
Lalu Septian Dwi Paradita

Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Author(s):  
Abdulelah Alwabel ◽  
Robert John Walters ◽  
Gary B. Wills

Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing that aims at providing Cloud capabilities at low or no cost. Desktop Clouds harness non dedicated and idle resources in order to provide Cloud services. However, the nature of such resources can be problematic because they are prone to failure at any time without prior notice. This research focuses on the resource allocation mechanism in Desktop Clouds.The contributions of this chapter are threefold. Firstly, it defines and explains Desktop Clouds by comparing them with both Traditional Clouds and Desktop Grids. Secondly, the paper discusses various research issues in Desktop Clouds. Thirdly, it proposes a resource allocation model that is able to handle node failures.


Author(s):  
Hallah Shahid Butt ◽  
Sadaf Jalil ◽  
Sajid Umair ◽  
Safdar Abbas Khan

Mobile cloud computing is the emerging field. Along-with different services being provided by the cloud like Platform as a Service, Infrastructure as a Service, Software as a Service; Game as a Service is new terminology for the cloud services. In this paper, we generally discussed the concept of mobile cloud gaming, the companies that provide the services as GaaS, the generic architecture, and the research work that has been done in this field. Furthermore, we highlighted the research areas in this field.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


Author(s):  
Khadija Akherfi ◽  
Hamid Harroud ◽  
Michael Gerndt

With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a middleware that will contribute to providing mobile users data storage and processing services based on their mobile devices capabilities, availability, and usage. A prototype of the middleware is developed and three scenarios are described to demonstrate how the middleware performs in adapting the provision of cloud web services by transforming SOAP messages to REST and XML format to JSON, in optimizing the results by extracting relevant information, and in improving the availability by caching. Initial analysis shows that the mobile cloud middleware improves the quality of service for mobiles, and provides lightweight responses for mobile cloud services.


Sign in / Sign up

Export Citation Format

Share Document