scholarly journals A Comprehensive Review on Cloud Computing and Cloud Security Issues

Author(s):  
Supongmen Walling

Cloud computing is a type of computing where computing services such as applications, storage, infrastructure, processing power are hosted by some vendors (cloud vendors) over the Internet and delivered to users on on-demand basis. A company can benefit from cloud computing in the sense that they can rent access to anything from applications to storage to processing power rather than owning their own IT infrastructure. By using cloud-computing services, companies can avoid the various costs and complexities associated with owning and maintaining their own IT infrastructure as everything is taken care of by the service providers. Cloud computing is a paradigm in which both the users and the service providers are benefited. Service providers are greatly benefited from cloud computing by providing cloud services to a wide range of customers. The primary objective of this paper is to give an overview on cloud computing encompassing its features, the pros and cons of cloud computing and the challenges that comes with it. Furthermore, this paper also presents a list of security concerns in cloud computing which stands in the way of wide spread adoption of cloud computing thereby motivating researchers to devise competent solutions to tackle these ongoing security issues.

2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2015 ◽  
Vol 28 (6) ◽  
pp. 788-807 ◽  
Author(s):  
Anabel Gutierrez ◽  
Elias Boukrami ◽  
Ranald Lumsden

Purpose – The purpose of this paper is to determine the factors influencing managers’ decision to adopt cloud computing in the UK using the “Technology-Organisation-Environment” (TOE) framework. Design/methodology/approach – Data were collected through a self-created questionnaire based survey that was completed by 257 mid-to-senior level decision-making business and information technology (IT) professionals from a range of UK end-user organisations. The derived hypotheses were tested using various data analysis techniques including principal component analysis and logistic regression. Findings – The results show that four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK. Those key factors include competitive pressure, complexity, technology readiness and trading partner pressure. The latter predictor; trading partner pressure, was the most significant factor for the adoption decision of cloud services reflecting organisations’ concerns on legal regulations, co-creation and customisation, service linkage and vendor locking which adds complexity to the process of selecting an appropriate vendor. Research limitations/implications – This research found trading partners (cloud service providers) significantly influence managers’ decisions to adopt cloud services, however, further research is required to fully understand all the aspects involved especially with the growing number of vendors available. Although over 250 usable responses to the questionnaire were received and analysed, there was not a sufficient quantity of responses from each industry sector or organisation size to conduct further analysis. Practical implications – The findings reveal the important role of cloud computing service providers to enable end-users to better evaluate the use of cloud computing. It also reveals that top management support is no longer a driver as organisations are starting to adopt cloud computing services on the basis of cheaper and more agile IT resources in order to support business growth. Originality/value – This research provides original insight for cloud computing adoption within the UK from a managerial perspective.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2019 ◽  
Vol 8 (4) ◽  
pp. 12522-12528

The purpose of the study was to explore the Cloud computing Practicing level, Cloud computing Satisfaction level and the Preferred Cloud service provider among the Online Business SMEs (OBSMEs) in Sri Lanka that have adopted Cloud services. Prior studies have shown that SMEs significantly benefit due to the adoption of Cloud computing services. The study was conducted among 260 randomly selected OBSMEs using self-administered questionnaires from managerial and ICT professionals who were capable of making ICT decision at OBSMEs under this study. However only 247 questionnaires were returned with complete data required for the purpose of analysis. A descriptive analysis was used to analyse the data. The findings have revealed that 31% of the OBSMEs are frequently Practicing Cloud computing for their ICT needs, while 69% of them relies on Cloud computing for their different ICT needs usually. Findings reveals that 35% of the OBSMEs are moderately Satisfied in this study, while 61% of OBSMEs have been reported that they are very Satisfied with Cloud computing services, at the same time 4% of the OBSMEs are reported that they have extremely Satisfied with Cloud computing services. In the context of OBSMEs it has been reported that 78% of the Cloud service providers are rendering reliability of services and OBSMEs are very satisfied, while 12% of the OBSMEs are moderately satisfied with the reliability of services and other 10% of the OBSMEs are extremely satisfied with the reliability of services provided by Cloud Service Providers in Sri Lanka. This study extends the existing body of knowledge by providing empirical support for explaining cloud computing adoption by OBSME in Sri Lanka. The study add value for various parties engaging in promoting the adoption of cloud computing among various business industries in Sri Lanka. Therefore, the researchers are able to recommend that cloud computing technology is playing a significant role for the improvement of business industries in Sri Lanka and the software vendors, policy makers and technological service providers should consider the findings of this study if they have intention to adopt this technology in future. Moreover, the findings of this research would assist and enhance service providers to consider their investment in information technology when adopting and implementing Cloud computing in Sri Lanka.


2016 ◽  
Vol 30 (3) ◽  
pp. 173-189 ◽  
Author(s):  
Pamela J. Schmidt ◽  
Jason T. Wood ◽  
Severin V. Grabski

ABSTRACTCloud computing services are finding rapid adoption as organizations seek cost reduction, technical expertise, flexibility, and adaptable mechanisms to attain advantages in fast-moving business environments. The related considerations of governance, audit, and assurance of cloud computing services might be inadvertently overlooked in a rush to adopt these cloud services. This paper focuses on cloud computing governance and audit issues by presenting research questions informed by both practice and research. A cloud computing ecosystem is presented and an IT Governance framework (Wilkin and Chenhall 2010) is referenced as a means to structure research questions. Key issues of risk, security, monitoring, control, and compliance should be considered early in the cloud services decision process. The tight coupling of intercompany operations between the cloud client and cloud provider(s) forms an interdependent, operationally coupled ecosystem. Planned governance is needed to achieve a well-governed, functional, and secure cloud computing environment. The audit role is complicated when the organization's financial data and/or critical applications are hosted externally with a cloud service provider that may use other cloud service providers.


Symmetry ◽  
2020 ◽  
Vol 12 (8) ◽  
pp. 1354
Author(s):  
Fathey Mohammed ◽  
Abdullah Marish Ali ◽  
Abdullah Saad Al-Malaise Al-Ghamdi ◽  
Fawaz Alsolami ◽  
Siti Mariyam Shamsuddin ◽  
...  

Cloud computing offers new features of sharing resources and applications to meet users’ computing requirements. It is a model by which the users can access computing resources as services offered on the Internet (cloud services). Cloud service providers offer a highly diverse range of asymmetric cloud services with heterogeneous features, which makes it difficult for the users to find the best service that fits his needs. Many research studies have been done on cloud service discovery, and several models and solutions that applied different techniques have been proposed. This paper aims at presenting the state of the art in the area of cloud services discovery by exploring the current approaches, techniques, and models. Furthermore, it proposes a taxonomy of cloud service discovery approaches. An integrative review approach was used to explore the related literature. Then, by analyzing the existing cloud service discovery solutions, a taxonomy of discovery approaches was suggested based on several perspectives including the discovery environment and the discovery process methods. The proposed taxonomy allows easily classifying and comparing cloud services discovery solutions. Moreover, it may reveal issues and gaps for further research and expose new insights for more innovative and effective cloud services discovery solutions.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user&#039;s creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Sign in / Sign up

Export Citation Format

Share Document