Cloud Computing Applications and Techniques for E-Commerce - Advances in Systems Analysis, Software Engineering, and High Performance Computing
Latest Publications


TOTAL DOCUMENTS

7
(FIVE YEARS 7)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799812944, 9781799812968

Author(s):  
Ravindra Kumar Singh Rajput ◽  
Dinesh Goyal

Every software application has its own minimum set of requirements like CPU, storage, memory, networking, and power. These have to be integrated into a specific configuration to allow the smooth functioning of the software application. When data traffic becomes higher than expected, higher resources are required. There may not be enough time to provision new resources manually; in such cases, an auto-scaling system is required for managing these situations. Cloud computing means using data, programs, and other resources pooled in the data center and accessed through the internet instead of the user's computer. In the chapter, the authors discussed some aspects related to cloud computing like cloud workload, load balancing, load balancing algorithms, scaling techniques, and auto-scaling to fulfill cloud workload balancing requirements.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.


Author(s):  
Shah Rukh Malik ◽  
Mujahid Rafiq ◽  
Muhammad Ahmad Kahloon

In this chapter, the authors focus on the most fundamental barrier in the e-commerce application's adoption: security. The most significant or important aspect to explore in cloud computing is how to keep the data secure in the most efficient way with cutting-edge technologies. Cloud computing has taken its place by providing its convenient services like on-demand service, pay-per-use, rapid elasticity, resource pooling, and other lucrative facilities. In this chapter, the authors will firstly describe the introduction related to cloud computing, major characteristics, types, and a few security concerns and issues in cloud computing. Furthermore, they discuss the introduction of e-commerce applications, how it is interlinked with cloud computing, and what the possible threats are. Moreover, what the possible solutions could be are discussed, so that we can secure data on both user side as well as on the server side. The authors suggest some existing solutions at the end of the chapter.


Author(s):  
Saikat Gochhait ◽  
Shariq Aziz Butt ◽  
Tauseef Jamal ◽  
Arshad Ali

The software industries follow some patterns (i.e., process model to develop any software product). Agile methodology is the most famous and used process model. It is a trend to develop efficient software products with high client satisfaction. In this chapter, the authors discuss agile methodology and its components, benefits, and drawbacks while using the cloud computing in agile software development, existing frameworks for agile-cloud combination, and some security measures.


Author(s):  
Reimar Weissbach ◽  
Alexander Bogislav Herzfeldt ◽  
Sebastian Floerecke ◽  
Christoph Ertl

In the complex and opaque cloud business ecosystem, service providers face several challenges. The fastest growing field of IaaS is evolving towards a commodity market, resulting in an increasing price competition. By first examining current challenges for cloud service providers, giving a theoretical background on value facilitation with a focus on the areas of value creation, and describing a state-of-the-art cloud ecosystem model, a sound understanding of the current situation is established. The role of value facilitation and standardization as core capabilities for successful IaaS providers are discussed and identified as being crucial for successful long-term survival in the competitive ecosystem. Additionally, learnings from expert interviews are analyzed, and five concrete recommendations for IaaS providers are derived. These recommendations should serve the management of IaaS providers in order to compare, challenge, and potentially adapt their current business models.


Author(s):  
Saadia Karim ◽  
Tariq Rahim Soomro

Cloud computing is a distributed environment for multiple organizations to use remotely and get high scalability, reliability on anytime, anywhere, and pay-as-you-go concepts. An organization has to create data centres to store, manage, and process the information to achieve benefits from data and make decisions. Cloud gives organizations a successful approach that leads to profit without maintaining the cost of data centres and technical staff to manage the services. Cloud has different types of architectures, types of clouds, and cost packages for using the cloud. These services can be scaled up or down when required by an organization. Cloud has unbeatable future because IT world is acquiring it and giving a boost to their businesses. Many cloud providers are using it and the remaining are moving to cloud. Cloud computing also gives birth to edge computing, fog computing, and many more zero downtime solutions.


Author(s):  
Abhineet Anand ◽  
Arvindhan Muthusamy

Cloud computing is a new technique that has been widely spread recently due to the services provided to users according to their need. Being a pay-for-what-you-use service, it provides a much-encapsulated set of services. Cloud computing acts as a main attraction for the business owners. Whether they are big or small, they can choose from the required services. Management of heavy flow data is very likely to be managed under this with the confidentiality and security of the data attached. Having all these features may attract everyone, but every technique always comes with some issues. The main aim of this survey chapter is to gain a better understanding of security issues that can occur in cloud computing.


Sign in / Sign up

Export Citation Format

Share Document