98 research outputs found

    Security in Cloud Computing: Evaluation and Integration

    Get PDF
    Au cours de la dernière décennie, le paradigme du Cloud Computing a révolutionné la manière dont nous percevons les services de la Technologie de l’Information (TI). Celui-ci nous a donné l’opportunité de répondre à la demande constamment croissante liée aux besoins informatiques des usagers en introduisant la notion d’externalisation des services et des données. Les consommateurs du Cloud ont généralement accès, sur demande, à un large éventail bien réparti d’infrastructures de TI offrant une pléthore de services. Ils sont à même de configurer dynamiquement les ressources du Cloud en fonction des exigences de leurs applications, sans toutefois devenir partie intégrante de l’infrastructure du Cloud. Cela leur permet d’atteindre un degré optimal d’utilisation des ressources tout en réduisant leurs coûts d’investissement en TI. Toutefois, la migration des services au Cloud intensifie malgré elle les menaces existantes à la sécurité des TI et en crée de nouvelles qui sont intrinsèques à l’architecture du Cloud Computing. C’est pourquoi il existe un réel besoin d’évaluation des risques liés à la sécurité du Cloud durant le procédé de la sélection et du déploiement des services. Au cours des dernières années, l’impact d’une efficace gestion de la satisfaction des besoins en sécurité des services a été pris avec un sérieux croissant de la part des fournisseurs et des consommateurs. Toutefois, l’intégration réussie de l’élément de sécurité dans les opérations de la gestion des ressources du Cloud ne requiert pas seulement une recherche méthodique, mais aussi une modélisation méticuleuse des exigences du Cloud en termes de sécurité. C’est en considérant ces facteurs que nous adressons dans cette thèse les défis liés à l’évaluation de la sécurité et à son intégration dans les environnements indépendants et interconnectés du Cloud Computing. D’une part, nous sommes motivés à offrir aux consommateurs du Cloud un ensemble de méthodes qui leur permettront d’optimiser la sécurité de leurs services et, d’autre part, nous offrons aux fournisseurs un éventail de stratégies qui leur permettront de mieux sécuriser leurs services d’hébergements du Cloud. L’originalité de cette thèse porte sur deux aspects : 1) la description innovatrice des exigences des applications du Cloud relativement à la sécurité ; et 2) la conception de modèles mathématiques rigoureux qui intègrent le facteur de sécurité dans les problèmes traditionnels du déploiement des applications, d’approvisionnement des ressources et de la gestion de la charge de travail au coeur des infrastructures actuelles du Cloud Computing. Le travail au sein de cette thèse est réalisé en trois phases.----------ABSTRACT: Over the past decade, the Cloud Computing paradigm has revolutionized the way we envision IT services. It has provided an opportunity to respond to the ever increasing computing needs of the users by introducing the notion of service and data outsourcing. Cloud consumers usually have online and on-demand access to a large and distributed IT infrastructure providing a plethora of services. They can dynamically configure and scale the Cloud resources according to the requirements of their applications without becoming part of the Cloud infrastructure, which allows them to reduce their IT investment cost and achieve optimal resource utilization. However, the migration of services to the Cloud increases the vulnerability to existing IT security threats and creates new ones that are intrinsic to the Cloud Computing architecture, thus the need for a thorough assessment of Cloud security risks during the process of service selection and deployment. Recently, the impact of effective management of service security satisfaction has been taken with greater seriousness by the Cloud Service Providers (CSP) and stakeholders. Nevertheless, the successful integration of the security element into the Cloud resource management operations does not only require methodical research, but also necessitates the meticulous modeling of the Cloud security requirements. To this end, we address throughout this thesis the challenges to security evaluation and integration in independent and interconnected Cloud Computing environments. We are interested in providing the Cloud consumers with a set of methods that allow them to optimize the security of their services and the CSPs with a set of strategies that enable them to provide security-aware Cloud-based service hosting. The originality of this thesis lies within two aspects: 1) the innovative description of the Cloud applications’ security requirements, which paved the way for an effective quantification and evaluation of the security of Cloud infrastructures; and 2) the design of rigorous mathematical models that integrate the security factor into the traditional problems of application deployment, resource provisioning, and workload management within current Cloud Computing infrastructures. The work in this thesis is carried out in three phases

    Security measurement as a trust in cloud computing service selection and monitoring

    Get PDF
    With the increase in the number of cloud service offerings by the cloud service providers nowadays, selecting the appropriate service provider becomes difficult for customers. This is true since most of the cloud service providers offer almost similar services at different costs. Thus, making cloud service selection a tedious process for customers. The selection of the cloud services from the security standpoint needs a distinct consideration from both the academia and the industry. Security is an important factor in cloud computing. Thus, any exploited vulnerability will have a negative effect on cloud computing adoption by customers. Hence, little attention has been paid to cloud service monitoring and selection from a security perspective. To solve this issue, we propose a security measurement as a trust (SMaaT) in the cloud computing selection. Finally, we propose Analytical Hierarchical Process (AHP) for service selection from the customers’ perspective

    Pemilihan Produk Database pada Google Cloud Platform Menggunakan Metode Analytical Hierarchy Process untuk Aplikasi XYZ

    Get PDF
    Aplikasi XYZ merupakan aplikasi yang dikembangkan untuk pengguna gawai dengan operating system Android. Aplikasi ini berfungsi untuk mengidentifikasi berbagai jenis buah dari foto yang diambil secara langsung maupun dari galeri penguna. Dalam pengembangannya, aplikasi diharapkan dapat menyimpan informasi dan gambar hasil identifikasi pada penyimpanan cloud. Google Cloud Platform, yang ditawarkan oleh Google, merupakan penyedia layanan cloud computing. Terdapat setidaknya tiga produk yang ditawarkan oleh Google Cloud Platform untuk mengembangkan database aplikasi XYZ, yakni Cloud Firestore, Cloud SQL, dan Cloud Spanner. Tujuan penelitian ini adalah untuk menentukan prioritas pemilihan produk database, guna pengembangan aplikasi XYZ dengan metode Analytical Hierarchy Process (AHP). Digunakan empat kriteria, yakni user needs, easy to use, security, dan cost. Berdasarkan pengolahan data, cost menjadi prioritas utama untuk dipertimbangkan dalam memilih database, sementara disaster recovery menempati prioritas terakhir. Berdasarkan analisis menggunakan metode AHP, dapat disimpulkan produk database yang paling direkomendasikan untuk mengembangkan aplikasi XYZ adalah Cloud Firestore

    Cloud Service Provider Evaluation System using Fuzzy Rough Set Technique

    Get PDF
    Cloud Service Providers (CSPs) offer a wide variety of scalable, flexible, and cost-efficient services to cloud users on demand and pay-per-utilization basis. However, vast diversity in available cloud service providers leads to numerous challenges for users to determine and select the best suitable service. Also, sometimes users need to hire the required services from multiple CSPs which introduce difficulties in managing interfaces, accounts, security, supports, and Service Level Agreements (SLAs). To circumvent such problems having a Cloud Service Broker (CSB) be aware of service offerings and users Quality of Service (QoS) requirements will benefit both the CSPs as well as users. In this work, we proposed a Fuzzy Rough Set based Cloud Service Brokerage Architecture, which is responsible for ranking and selecting services based on users QoS requirements, and finally monitor the service execution. We have used the fuzzy rough set technique for dimension reduction. Used weighted Euclidean distance to rank the CSPs. To prioritize user QoS request, we intended to use user assign weights, also incorporated system assigned weights to give the relative importance to QoS attributes. We compared the proposed ranking technique with an existing method based on the system response time. The case study experiment results show that the proposed approach is scalable, resilience, and produce better results with less searching time.Comment: 12 pages, 7 figures, and 8 table

    Virtual assistants in customer interface

    Get PDF
    This thesis covers use of virtual assistants from a user organization’s perspective, exploring challenges and opportunities related to introducing virtual assistants to an organization’s customer interface. Research related to virtual assistants is spread over many distinct fields of research spanning several decades. However, widespread use of virtual assistants in organizations customer interface is a relatively new and constantly evolving phenomenon. Scientific research is lacking when it comes to current use of virtual assistants and user organization’s considerations related to it. A qualitative, semi-systematic literature review method is used to analyse progression of research related to virtual assistants, aiming to identify major trends. Several fields of research that cover virtual assistants from different perspectives are explored, focusing primarily on Human-Computer Interaction and Natural Language Processing. Additionally, a case study of a Finnish insurance company’s use of virtual assistants supports the literature review and helps understand the user organization’s perspective. This thesis describes how key technologies have progressed, gives insight on current issues that affect organizations and points out opportunities related to virtual assistants in the future. Interviews related to the case study give a limited understanding as to what challenges are currently at the forefront when it comes to using this new technology in the insurance industry. The case study and literature review clearly point out that use of virtual assistants is hindered my various practical challenges. Some practical challenges related to making a virtual assistant useful for an organization seem to be industry-specific, for example issues related to giving advice about insurance products. Other challenges are more general, for example unreliability of customer feedback. Different customer segments have different attitudes towards interacting with virtual assistants, from positive to negative, making the technology a clearly polarizing issue. However, customers in general seem to be becoming more accepting towards the technology in the long term. More research is needed to understand future potential of virtual assistants in customer interactions and customer relationship management.Tämä tutkielma tutkii virtuaaliassistenttien käyttöä käyttäjäorganisaation perspektiivistä, antaen käsityksen mitä haasteita ja mahdollisuuksia liittyy virtuaaliassistenttien käyttöönottoon organisaation asiakasrajapinnassa. Virtuaaliassistentteihin liittyvä tutkimus jakautuu monien eri tutkimusalojen alaisuuteen ja useiden vuosikymmenien ajalle. Laajamittainen virtuaaliassistenttien käyttö asiakasrajapinnassa on kuitenkin verrattain uusi ja jatkuvasti kehittyvä ilmiö. Tieteellinen tutkimus joka liittyy virtuaaliassistenttien nykyiseen käyttöön ja käyttäjäorganisaation huomioon otetaviin asioihin on puutteellista. Tämä tutkielma käyttää kvalitatiivista, puolisystemaattista kirjallisuusanalyysimetodia tutkiakseen virtuaaliassistentteihin liittyviä kehityskulkuja, tarkoituksena tunnistaa merkittäviä trendejä. Tutkimus kattaa useita tutkimusaloja jotka käsittelevät virtuaaliassistentteja eri näkökulmista, keskittyen pääasiassa Human-Computer Interaction- sekä Natural Language Processing -tutkimusaloihin. Lisäksi tutkielmassa on tapaustutkimus suomalaisen vakuutusyhtiön virtuaaliassistenttien käytöstä, joka tukee kirjallisuusanalyysiä ja auttaa ymmärtämään käyttäjäorganisaation perspektiiviä. Tutkielma kuvailee kuinka keskeiset teknologiat ovat kehittyneet, auttaa ymmärtämään tämänhetkisiä ongelmia jotka koskettavat organisaatioita sekä esittelee virtuaaliassistentteihin liittyviä mahdollisuuksia tulevaisuudessa. Tapaustutkimukseen liittyvät haastattelut antavat rajoitetun kuvan kyseisen uuden teknologian käyttöön liittyvistä haasteista vakuutusalalla. Tapaustutkimus ja kirjallisuusanalyysi osoittavat että virtuaaliassistenttien käyttöönottoon liittyy erilaisia käytännön haasteita. Jotkut haasteet vaikuttavat olevan toimialakohtaisia, liittyen esimerkiksi vakuutustuotteita koskeviin neuvoihin. Toiset haasteet taas ovat yleisempiä, liittyen esimerkiksi asiakaspalautteen epäluotettavuuteen. Eri asiakassegmenteillä on erilaisia asenteita virtuaaliassistentteja kohtaan, vaihdellen positiivisesta negatiiviseen, joten kyseinen teknologia on selvästi polarisoiva aihe. Pitkällä aikavälillä asiakkaiden asenteet teknologiaa kohtaan vaikuttavat kuitenkin muuttuvan hyväksyvämpään suuntaan. Lisää tutkimusta tarvitaan jotta voidaan ymmärtää virtuaaliassistenttien tulevaisuuden potentiaalia asiakaskohtaamisissa ja asiakkuudenhallinnassa

    Cloud Technology Selection: A structured framework for decision making

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementThis study aims to get organizations to improve their decision making during the selection of cloud technology process. As the technology evolves alongside an ever-increasing abundance in market offer, it may be challenging to choose the desirable service that encompasses several business approaches. For the purpose of this study to be attained, the reader must first comprehend the definition of Cloud Technology: it is the delivery of IT resources over the Internet, being applications, software, storage, among other services. Furthermore, understanding the current main technologies/architectures and their capabilities/limitations will play an important role in designing and developing the prospected solution. A thoroughly research will be produced to better define the criteria used in the process. Despite the fact that technology is able to be tailored up to a certain level for the organization needs, a higher level of participation will encourage vendors and architecture designers to develop a better knowledge on the companies’ desires, thus delivering more appropriate features to their unique needs
    • …
    corecore