15 research outputs found

    Cloud Migration: Issues and Developments

    Get PDF
    Cloud computing is a dynamic paradigm that is influencing activities in virtually all facets of the IT world. It has become quite easy to deploy applications on the cloud. Storage is also available based on user’s needs and can be scaled up or down as required by the user. Computing resources have also been made available on virtual machines. Furthermore, applications are available to users supplied by cloud providers. The activities on the cloud has made migration to the cloud desirable to most organizations and enterprises. Adopting the cloud is expected to reduce cost and the need for investment in computing infrastructure. However, most organizations are still concerned about the likely challenges of migrating to the cloud. The goal of this paper is to provide an insight into cloud computing with respect to migration issues. The paper discusses cloud computing and the benefits of migration. It also examines the challenges of migration. Furthermore, present issues of migration as espoused by the industry are discussed. The survey observed that not much is being discussed in terms of current trends and procedures of migration

    A Behaviour Study on Cloud Eco-System: Data Security Perspective

    Get PDF
    Cloud eco-system is a revolution now, which modifies the way in which the IT-based services are being delivered to end customers. It is increasing or we can also say grown-up technology that delivers multiple benefits whether in terms of economics or in terms of cost-effective resource utilization. The ability to install and improve their services on that platform is made possible by the advent of cloud computing, which opens up new options for long-term solutions. Cloud computing's environmental and economic impacts must be considered while assessing its long-term viability. A growing number of organizations, businesses, and personal users are depending on services supplied by the cloud and keeping crucial information in the cloud because of its easy-to-use characteristics. The cloud, despite its widespread use, nevertheless has a number of drawbacks when it comes to data security. Customers are concerned about how their personal information is transported to and from the cloud. Research articles in this topic have been thoroughly analyzed and examined in this report

    The Impact of Cloud Adoption on The SMB Profit: Evidence from Panel Data analysis

    Get PDF
    Cloud computing is among the most recent advanced techniques that can play a critical role in small and medium-sized organizations, especially because it allows small businesses to access ICT resources without incurring big upfront expenditures or investing in specialized personnel.  The backbone of any country's economy is small and medium businesses (SMBs). They generate employment and serve as a catalyst for innovation and entrepreneurship.  Businesses are leveraging the benefits of cloud computing to gain a competitive advantage, cooperate, connect, and grow.  This research hypothesizes that small companies that deploy cloud computing outperform those that do not deploy it in terms of profit growth. The purpose of this study is to examine this hypothesis. The data originated from small and medium enterprises in the Middle East. The data represents balanced panel data of 55 small and medium enterprises over 3 years, from 2015 to 2017 (n=55, t=3). This research employed panel data regression models, namely the fixed-effect and the robust M-estimation methods. The empirical findings appear to confirm the hypothesis that adopting cloud computing favorably affects the profit growth of SMEs. The conclusions of this research might be valuable for business owners in the Middle Eastern countries who seek profit maximization with emerging technologies. &nbsp

    Hacia un proceso de migración de la seguridad de sistemas heredados al Cloud

    Get PDF
    El desarrollo de la computación en la nube es una tendencia fuerte en la industria de las TI que hace que los clientes de este nuevo modelo de prestación de servicios, sobre todo las empresas, se enfrenten a desafíos nuevos en lo que se refiere a la gestión de la seguridad de sus aplicaciones heredadas en el nuevo entorno. La cuestión es en cómo migrar de forma segura los sistemas de información heredados de estas empresas. Este artículo presenta un proceso (SMiLe2Cloud) y un marco de trabajo con el que se puede migrar de forma segura los sistemas corporativos heredados a infraestructuras o entornos en la nube, siguiendo los 14 dominios de seguridad del CSA y utilizando ingeniería inversa.Esta investigación es parte de los siguientes proyectos: GEODAS (TIN2012-37493-C03-01) y SIGMA-CC (TIN2012-36904) financiados por el “Ministerio de Economía y Competitividad y Fondo Europeo de Desarrollo Regional FEDER”, España

    An Empirical Analysis of Security Issues in Cloud Environment

    Full text link
    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions

    Improving the Authentication Mechanism of Business to Consumer (B2C) Platform in a Cloud Computing Environment: Preliminary Findings

    Get PDF
    The reliance of e-commerce infrastructure on cloud computing environment has undoubtedly increased the security challenges in web-based e-commerce portals. This has necessitated the need for a built-in security feature, essentially to improve the authentication mechanism, during the execution of its dependent transactions. Comparative analysis of the existing works and studies on XML-based authentication and non-XML signaturebased security mechanisms for authentication in Business to Consumer (B2C) e-commerce showed the advantage of using XML-based authentication, and its inherent weaknesses and limitations. It is against this background that this study, based on review and meta-analysis of previous works, proposes an improved XML digital signature with RSA algorithm, as a novel algorithmic framework that improves the authentication strength of XML digital signature in the B2C e-commerce in a cloud-based environment. Our future works include testing and validation, and simulation, of the proposed authentication framework in Cisco’s XML Management Interface with inbuilt feature of NETCONF. The evaluation will be done in conformity to international standard and guideline –such as W3C and NIST

    Using the cloud to provide telemedicine services in a developing country

    Get PDF

    Assurance of security and privacy requirements for cloud deployment models

    Get PDF
    Despite of the several benefits of migrating enterprise critical assets to the Cloud, there are challenges specifically related to security and privacy. It is important that Cloud Users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by Cloud Service Providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette
    corecore