Professional Documents
Culture Documents
Following are the major objectives of my research report: Try to find out level of awareness about cloud computing in the market. Analyzing what are the most to least important reasons for using cloud computing. Try to find out preferences of various services of cloud computing. Analyzing various factors which can affect implementation of cloud computing. Analyzing overall mindset of respondents towards implementation of cloud computing.
CHAPTER: 1 INTRODUCTION
Imagine yourself in the world where the users of the computer of todays internet world Dont have to run, install or store their application or data on their own computers, imagine the world where every piece of your information or data would reside on the Cloud (Internet). As a metaphor for the Internet, "the cloud" is a familiar clich, but when combined with "computing", the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud", including conventional outsourcing. Cloud computing comes into focus only when you think about what we always need: away to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends ICT's existing capabilities. Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are Sass (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
Cloud computing is Internet (cloud) based development and use of computer technology (computing). It is a style of computing in which dynamically scalable and often virtualized resource are provided as a service over the internet. User need not have knowledge, expertise in, or control over the technology infrastructure in the cloud that support them.
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth.
Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2011, a study conducted by V1 found that 91% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by the concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study found that disciplined companies achieved on average a 68% increase in their IT expense because cloud computing and only a 10% reduction in data center power costs.
As per forest report (Dec 2008) more than 70% IT budget spent of maintains of current IT infrastructure instead off adding new one. In order to better utilize the IT budget companies are opting for cloud computing.
Cloud computing differs from the client-server model by providing services from a server that are executed and managed by a client's web browser, with no installed client version of an application required. Centralization gives cloud service providers full control on the versions of the browser-based applications
provided to clients, which removes the continuous need for version upgrades or manages individual licenses of client computing devices. The concept incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as Web 2.0 And other recent technology trends which have the common theme of reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include Salesforce.com and Google Apps which provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers.
2.1 Comparison
Cloud computing often confused with grid computing (a form of distrusting computing where by a super and vertical computer is composed of a cluster of networked, loosely-coupled computers, acting in concert to perform very large tasks), utility computing and automatic computing.
Indeed many cloud computing deployments as a 2009 depends on grids, have automatic charters tics and bill likes utilities------ but Cloud computing can be seen as a natural next step from the grid-utility model. Some successful cloud architected has little or no centralized infrastructure and billing system whatsoever, including peer-to-peer network like Bit torrent and Skype.
2.2 Implementation
The majority of cloud computing infrastructure as of 2009 consist reliable services delivered through data centers and built on servers with different level of virtualization technologies. The services are accessible anywhere that has access to networking infrastructures. The cloud appears as a single point assess for all computing needs of consumers. Open standers critical to the growth of cloud computing and open source software provided the foundation of many cloud computing implications.
2.3 Characteristics On demand self services: computer services such as email, applications,
network or Server service can be provided without requiring human interaction with each service Provider. Cloud service providers providing on demand self services include Amazon Web Services (AWS), Microsoft, Google, IBM and Salesforce.com. New York Times and NASDAQ are examples of companies using AWS (NIST). Gartner describes this Characteristic as service based
Broad network access: Cloud Capabilities are available over the network and
accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms such as mobile phones, laptops and PDAs.
pay per use. The more you utilize the higher the bill. Just as utility companies
sell power to subscribers, and telephone companies sell voice and data services, IT services such as network security management, data center hosting or even departmental billing can now be easily delivered as a contractual service.
3.1 Profile:
Universal software is an IT solutions and service delivery company offering software development services to clients since 1997. Our specialty in the field of product development and software service empowers our clients to formulate, implement and execute their strategy to increase effectiveness and efficiency of their businesses. We are committed to give return on investment to our clients by providing low cost, high quality and reliable offshore software services. While we derive our roots from India, our global approach with innovation, loyalty, fairness, quality and integrity put us ahead of our competitors. Sandeep Singhvi is the founder and director at Universal Software.
3.2 Industry
1) Public Safety Software: -Computer Aided Dispatch CAD Our unique CAD system consists of several modules that provide serves at multiple levels in dispatch centre in the field of public safety. These services include call input, call dispatching, call status maintenance, event notes, field unit status and tracking as well call resolution and disposition. It is more useful for real-time call updates, It is unit also responses, scalable and from automatic single alerts to to call multi-
taker/dispatcher.
agency
agency/multijurisdictional countrywide dispatch centre. -Record Management System - RMS Record Management System is the most effective way to organize, track and access the vast amount of information that flows through your departments. It enables officers and clerical personnel to prepare, save and search various types of important information for law enforcement agency. It is featured to record booking information, case data, tickets, traffic accidents, incidents, personnel
10
scheduling, gun permits, and history of citizen, vehicles, property, locations and many more. Integration of RMS with CAD system makes it more effective. -Mobile System Mobile System is designed to establish communication between officers at headquarters and at the field. It gives access of information to field officers so they can take better decision on remote locations. It also facilitates field users to receive dispatch information, status on computer screen with status of other units who are in service. -Jail Management System JMS Jail Management System is developed to boost the efficiency of facility which covers full suite of integrated modules compatible with latest law enforcement. Each module provides diverse functionality with extensive features and capabilities to reduce overall expense of facility. (Administrative Overheads, Staff Costs, Reduction in infrastructure etc). -Healthcare-EMR Web-based electronic medical record system covers all the aspects of medical practice management in order to make care unit more effective and efficient. Electronic medical records are helpful to manage the clinical operations of facility and provide digital storage of health charts with functionalities to track individual demographics, history, medications, test results and many more. Features
Full Suite of Integrated Modules Patient Registry, Appointment Scheduling, Electronic Charts Document, Image, Test Results Management Role-Based Features of EMR to Ease the Workflow Real-Time TAR & MAR Management
11
Real-Time Medicine Tracking Management Task, Treatment, Inventory, Privilege Automated Billing & Insurance Checking Integrated IVR System Excellent Reporting Features
Deliver Better Care to Patient Enhances Documents And Reports More Revenue Generation Meet with Medical Regulations Boosts Productivity with Quality Affordable Pricing User Friendly 1) Process Industry M2M solutions
Universal Software is leading provider of remote monitoring solutions. We believe that communication of machines (Different Protocol) and management of these communications through software help to take betters decisions and is effective on long-run. (Especially in critical conditions) M2M solutions are primary developed for remote monitoring of Oil and Gas industry. System takes inputs from field devices connected to wells and show analysis of meaningful data on screen. User can take better decision with through this data and can set parameters for alerting. These solutions are useful for:
Delivery of data from the field to desktop Monitoring of data real-time through web-based applications Alerts to compressors and wells
12
2) Ecommerce/Portals Ecommerce is one of the biggest things that have taken the businesses by storm. It is playing an important role to create entire new economy to strengthen businesses as internet is becomes an everyday part of peoples life. Universal Software delivers wide range of ecommerce applications and website development services. We have our clients across the globe to have win-win situation both buyers and seller side. Our experience in ecommerce portal empowers you to start online business or taking your existing business online. Our work portfolio includes:
Ecommerce portal/website development Ecommerce application development Payment gateway integration with website or applications
Help in increase sales Improve the online shopping experience International reach Low set up cost Catalyst for business start-up
3) IVR (Interactive Voice Response) IVR - short for Interactive Voice Response - automates interaction with telephone callers. Universal Software provides IVR related solutions that almost integrate with any software product. Most people are familiar with IVR applications. These applications allow users to retrieve information from any telephone.
13
Universal Software has created a solution that replaces aging, proprietary Interactive Voice Response boxes and applications with a simple, voice-driven powered IVR telephony platform and a compelling suite of voice applications. With Universal Software IVR, you can:
Delight your callers Reduce your cost Easy integration with almost any software product Deliver improved ROI
3.3 Technologies
-Microsoft .net technologies Universal Software is Microsoft Silver Certified partner and our team of professional developers having expertise in latest technology, tools available from Microsoft. Our extensive experience in latest .net technologies in web applications as well as desktop applications empowers us to create world class IT driven system. Universal Software has expertise with Microsoft .net technologies like vb.net, asp.net, C#, XML, win forms, web services, AJAX, jQuery, Silver Light, LinQ, MVC, WCF, WPF, WWF, mobile applications with SQL Server for creating innovative applications as per clients requirement and budget. -JAVA Basic remains same. We firmly believe in this philosophy which helps us to satisfy our clients needs with cutting edge technologies. Our unique competence in JAVA enables us to deliver to deliver integrated, scalable, robust solutions. We do extensive working on java platforms, tools and libraries with expertise in J2SE, J2EE, J2ME, spring, JSP, JSF. Our experts have vast experience in developing and deploying JAVA based applications as well as software solutions on enterprise level.
14
-Mobile Technologies Universal Software has dynamic team of young and experience mobile application developers who have the technical finesse to deliver unparalleled mobile product development services. Skill Sets of Universal Software in Mobile Technologies:
Android Application Development iPhone Application Development iPad Application Development Window Phone Application Development
-Asterisk/Hardware interface If you wish to delight you customer with Hardware technologies then Universal Software offers integration of IVR, PBV, VOIP Gateway, GSM modems with your software.
3.4 Service
-Product Development Services Universal Software offers product development services for all stages of the software development lifecycle from product conceptualization to product extensions. Our core focus areas and capabilities in product development include followings: >Product Conceptualization, Development, Testing, Implementation >Product Customization, Enhancement, Extension >Product Maintenance, Support >Product Migration
15
Universal Software provides custom application development services to clients according to their requirements when their business strategies and requirements are not adequately met by packaged software. Our team of business analysts, subject matter experts and software team leaders work closely with clients for developing application to achieve business objective. Universal Softwares technology team is known for expertise in creating robust, scalable application with extensible architecture for use in a wide range of industry. Platform and domain is not a constraint for us for custom application development. -BI Solutions We are specialized in designing and implementing comprehensive business intelligent solutions. Our BI solutions empower enterprises to extract knowledge and wisdom from unprocessed information to establish rich, reliable and effective information to take intelligent decisions using dashboards, reports, charts as per your need. -Mobile Application Development If you are looking for out of box and best industry standard in mobile application development, then our development team can surely impress you with their excellence and expertise. Platform: IPhone/IPad, Android, J2ME, window application -M2M software and hardware integration M2M Software: M2M software developed for remote monitoring in oil and gas industry. System takes inputs from devices/modems connected to wells and give analysis of data for making decisions.
16
Hardware Integration: If you wish to delight your customer by sending alerts, notification and making sure your availability for predefined query then IVR and GSM systems are developed to serve your need.
Dedicated Resource Timesheets Additional Quality Check Management oversight Different payment options (Weekly Payment, Biweekly payment) -Fixed Cost
If your project is with well-defined scope and clear requirement our fixed cost model is suitable to you. As per your requirement, our team is appointed to you to meet your expectation on time.
Fixed start date and end date Low level specifications documents duly signed by the clients Following to design iterations as agreed in the proposal amount Finalizing the UI design before starting a development Impact analysis in case of deviation / addition to the specifications documents
17
-Partnership Our expertise focused innovative solutions, competencies, reduced total cost and flexible delivery model helps your company undercut your bottom line and beat your deadline. Our innovative IT solutions have helped our valued clients to create more efficient business operations and increase productivity. To the point, our services and solutions effectively deal with the business challenges of companies and further, help in gain a competitive advantage in this ever expanding market.
18
19
computing that implements what is commonly referred to as Infrastructure as a Service (IaaS). So PaaS and SaaS can also be implemented as open service to cut the cost of the computing resources. By implementing clouds, the trend of using Internet would change in drastic manner. This shows that the fifth generation of the computing in the form of cloud computing now begins.
20
implications of adding SaaS to their portfolios of IT services. Integration and composition are critical components in your architecture strategies to incorporate SaaS successfully as a fully participating member of your service-centric IT infrastructure. Today, SaaS applications are expected to take advantage of the benefits of centralization through a single-instance, multi-tenant architecture, and to provide a feature-rich experience competitive with comparable on-premise applications. A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform.
21
22
The idea of cloud computing started to emerge before the Internet was inv
ented. The concept of cloud computing is used from early 1960's. Utility computing, the ASP model, autonomic computing is one of the precursors of cloud computing. Cloud services can be effectively implemented in industries for revenue generation and business growth.
Since the sixties, cloud computing has developed along a number of lines,
with Web 2.0 being the most recent evolution. However, since the internet only started to offer significant bandwidth in the nineties, cloud computing for the masses has been something of a late developer.
One of the first milestones for cloud computing was the arrival of
Salesforce.com in 1999, which pioneered the concept of delivering enterprise applications via a simple website. The services firm paved the way for both specialist and mainstream software firms to deliver applications over the internet.
23
(also called web services) that together make up a cloud computing platform, offered over the Internet by Amazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3.
Another big milestone came in 2009, as Web 2.0 hit its stride, and Google
and others started to offer browser-based enterprise applications, though services such as Google Apps.
In 2011:
Chinese ecommerce giant Alibaba Group Holding Ltd announced plans to develop acloudbased operating system for smartphones. The move was seen as Alibaba' s attempt totap into China's huge smartphone market.
Since 2011: The Chinese government has reiterated its support for the de
velopm---ent of the cloud computing industry in China.
24
25
Political Issues: The clouds span many borders and may be the ultimate from of globalization. As such it becomes subject to complex geopolitical issues: Providers must satisfy Myriad regulatory environments in to deliver service to global market. This dates back to the early days of the internet, where libration thinkers felt that cyberspace was a distance space calling for laws and legal intuition of its own; author Neal Stephenson envisaged this as a tiny island data haven called kinakutta in his classic science-fiction novel Cryptonomicon.
Legal Issues: TRADMARK 77,139,082) in the United States. The Notice of Allowance it received in July, 2008 was cancelled august 6 resulting in formals rejection of the trademark application less than a week later.
Security Issues:
As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model. The effectiveness and efficiency of traditional protection
mechanisms are being reconsidered as the characteristics of this innovative deployment model can differ widely from those of traditional architectures. An alternative perspective on the topic of cloud security is
26
that this is but another, although quite broad, case of "applied security" and that similar security principles that apply in shared multi-user mainframe security models apply with cloud security. The relative security of cloud computing services is a contentious issue that may be delaying its adoption. Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else's control. Physical control and the ability to visually inspect data links and access ports is required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing are due in large part to the private and public sectors' unease surrounding the external management of security-based services. It is the very nature of cloud computing-based services, private or public, that promote external management of provided services. This delivers great incentive to cloud computing service providers to prioritize building and maintaining strong management of secure services. Security issues have been categorized into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console
security, account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers, standardization of APIs, and improving virtual machine support and legal support.
Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities. Many underlying challenges and risks in cloud computing increase the threat of data compromise. To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance.
27
28
There are main two main data sources for the research study- primary and secondary. To collect the data for this research study, both primary and secondary source used. One of the cardinal rules in data collection is to exhaust all secondary sources before conducting primary studies. The operational features of secondary data are that it already exists and its easily available. Secondary data can be quite versatile and used for many purposes. To collect secondary data, first, the reached reviewed article related to research objective the appeared in the literature. Key journals and proceeding were systematically scanned for any articles related to the research topic. To conduct an empirical investigation, a survey was conducted, using a questionnaire. At first, the items included in questionnaire decided. Next, the survey conducted collects the data and analyzed. The questionnaire was pre-tested in pilot study to fine the questionnaire. The pilot study was conducted among a convince sample. Based on pilot study and the feedback from the participants, some items were rewarded to improve clarity. OBJECTVES OF THE STUDY: 1) To study the cloud computing technology 2) To study the positive and negative factors of the cloud computing. SAMPLE DESIGN AND SAMPLE SIZE: As the survey is about understanding about the uses of the cloud computing, the research specially designed for the technical people. The sample size was small because of the sensitivity of the topic. Therefore few respondents share their views, suggestion, information and their experience. LIMITITIONS: - Sample size small because it was quiet difficult to reach highly professional technocrats for the survey on this sensitive topic cloud computing.
29
Various statically techniques as learned have been implemented and conclusion as best possible has been drawn making few assumption as and when required.
SCOPE OF THE STUDY: Findings this study indicates that the study is quite informative and useful for both general public and companies indulge cloud technology. They can understand the dimensions reflecting benefits and risk of cloud computing.
30
5.4 COMPONENTS
31
Application The application itself, which is the component that end users will spend most of their time using, is hosted on severs that are remote from the user and can be run in real time from a thin client that hosts the application through a web browser. The majority of applications that are hosted on clouds are run via browsers. This has major benefits in that there is no installation of the application, no maintenance required and support issues are streamlined because the software is hosted on a machine that is dedicated to that software so there is no worry of external influences of the thin client on the software itself. Cloud applications are also referred to as software as a service (Sass), software plus service or data as a service.
Client The client, or thin client, is generally a web browser such as Mozilla Firefox or Microsoft Internet Explorer. A newcomer has been Googles Chrome, which brings an interesting discussion into play as to how much the web browser that is known as today will become more powerful. It may soon be able to disseminate dynamic application interfaces so that it becomes more of a portal or perhaps an operating system in and of itself.
It should also be noted that there are other types of thin clients out there. For example, in the mobile telephone environment Apples iPhone or Googles Android platforms run a suite of applications that can be considered run from the cloud.
Also certain web sites can be termed clients, for example Facebook, where there are thousands of applications available for its users to utilize. This in effect may be a sort of virtual client itself that has yet to be defined.
32
Infrastructure The infrastructure of cloud computing is comprised of computer hardware and the buildings that contain that hardware. As discussed before, the hardware consists of cheap, mass produced server technology which has become prevalent in the computer industry today. The server environment itself is running virtualization technology which means that inside the server farm it is irrelevant how many specific machines there are. Rather, it make more sense to run software that can harness the machines inherent multiple processing power so that the cloud companies can reap more benefits out of each customers processing ability. Some companies use a process known as full virtualization which is a technique where the user is able to completely simulate the hardware that is run on the individual sever. Often this is use to emulate new hardware types. A few companies that are running full virtualization today include Go Grid and Sky tap. Another infrastructure process is called gird computing. Unlike full virtualization, which has a one to one ratio in software to computers, grid computing is the usage of sever machines network together for heavier processing power. Generally done for very heavy tasks like mathematics, grid computing can be implemented via several geographic locations. One company that is running grid style computing is Sun Microsystems Sun Grid. One newer infrastructure process is known as par virtualization. Para virtualization utilizes more than one machine, and often several machines, to emulate one process. Although IBM has done this in the past, the concept has changed somewhat and it was known as using a parallel workstation. The company most famously using this technology is Amazon with their Elastic Compute Cloud.
33
Platform The cloud platform is referring to the way that applications can be deployed, most likely the name derived for by Platform as a Service (PaaS). Also the name solution as stack service comes to mind as well. This would include the web application frameworks that are out there such as the language Ruby on Rails, which is an open source web application format. Some other examples of the cloud platform is Force.com, Salesforce.coms proprietary Pass service, the Google App Engine which runs off of Python and the web hosting service Moss. All of these are examples of how platforms can potentially be run in the cloud environment today.
Service Service is referring to what users can reap from their cloud experience. To date there are a ton of services out there on the Internet for users to take advantage of. Some of them are quite unique, while others enhance services that were already out there. One of the most popular services in recent years that uses cloud computing would be mapping services. A few examples include Yahoo Maps, Google Maps, and MapQuest. These services require a lot of database storage. They also need a lot of processing power to perform tasks such as giving people accurate directions. Another service requires a lot more back office tasks, and that is payment services. These payment processors require a lot of processing power to accurately do the accounting that is required in the background for deposits and withdrawals. Two of the most popular payment services include both PayPal and Google Checkout. Customized search functions require cloud technology to work. That is why search services are out there to help people find what they need. This technology also requires a lot of computing power. Services such as Google
34
Custom Search and Alexa, even Ask.com utilize massive server farms to properly keep their pages indexed.
Storage Physical storage can be expensive for companies looking to expand their storage needs. It is cheaper to go with the cloud to be able to expand and collapse as the business dictates. One of the biggest features of cloud computing is in fact storage. The main reason is that in hardware terms storage devices are the first ones to fail on a computer. By using cloud technology it is more redundant in the respect that companies can rest assured that their data is indeed safe. Cloud vendors will usually be able to provide service level agreements to let their customers know that their data is safe. Sever farms and thus cloud computing offer a great way to keep data safe in case there is an emergency situation. Because there are so many computers in the cloud environment, the chances of complete failure of all systems is very slim. In this way, cloud vendors are able to entice customers with incentives of protecting their data from harm. Some of the current companies that are offering database storage services in the cloud include Amazons SimpleDB and Google App Engines Bitable data storage service. Microsoft offers an online synchronization service called Live Mesh, which is part of the Live Desktop service that they are now offering. Regular storage services include Amazons Simple Storage Service.
35
5.5 STANDERS
36
Cloud standard, a number of exciting, typically, lightweight, open standard, have facilitate the growth of cloud computing, including: APPICATION Communication (HTTP,XMPP) Security ( OAuth, open ID, SSL/TLS) Syndication (Atom)
STORAGE Database ( Amazon simple DB, Google App Engine Big Data storage) Networked attached storage (Mobile ME iDisk, Nirvana cloudNAS) Synchronization (Live Mesh Live Desktop component) Web Services ( Amazon Simple Storage Service)
37
38
Cloud computing can be classified by the model of services it offers into one of three different groups. There will be described using the XaaS taxonomy, first used by Maxwell in 2006, where X is software, platform or infrastructure, and the final S for services. 4.6.1 Infrastructure as a service (IaaS): In the most basic cloud-service model, providers of IaaS offer computers physical or (more often) virtual machines - and other resources. (A hypervisor, such as Xen or KVM, runs the virtual machines as guests. Pools of hypervisors within the cloud operational support-system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.) IaaS clouds often offer additional resources such as a virtual-machine disk
image library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundle. IaaS-cloud providers supply these resources on-demand from their large pools installed in data centers. For wide-
area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks).
To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS a service on a utility computing basis cost reflects the amount of resources allocated and consumed.
Examples of IaaS providers include: Google Compute Engine, HP Cloud, Joyent, Linode, NaviSite, and Ready Space Cloud Services.
39
The spending on cloud service is expected to show the largest increase in the IT marketplace, with North Africa and the Middle East having growth of over 20% through 2016, according to analysts at Gartner. The first cloud service in the United Arab Emirates for SMBs and enterprises was announced June 2013 when the leading telecom operator in the Middle East and Africa Etisalat launched its first cloud service in the UAE. IaaS cloud model was believed to reduce IT costs up to 60% and time to market faster by up to 90%.
Cloud communications and cloud telephony, rather than replacing local computing infrastructure, replace local telecommunications
4.6.2 Platform as a service (PaaS) : In the PaaS model, cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. Examples of Pass include: AWS Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, OpenShift, Googl e App Engine, AppScale, Windows Azure Cloud Services,OrangeScape and Jelastic.
40
4.6.3 Software as a service (SaaS) In the business model using software as a service (SaaS), users are provided access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis. SaaS providers generally price applications using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications are different from other applications in their scalabilitywhich can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load distribute the work over the set of virtual machines. This process is transparent to the cloud user, who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention : desktop as a service, business process as a service, test environment as a service, communication as a service.
The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point.
41
Examples of SaaS include: Google Apps, Microsoft Office 365, Petrosoft, Onlive, GT Nexus, Marketo, Casengo, TradeCard, Salesforce and CallidusCloud.
Proponents claim SaaS allows a business the potential to reduce IT operational costs by outsourcing hardware and software maintenance and support to the cloud provider. This enables the business to reallocate IT operations costs away from hardware/software spending and personnel expenses, towards meeting other goals. In addition, with applications hosted centrally, updates can be released without the need for users to install new software. One drawback of SaaS is that the users' data are stored on the cloud provider's server. As a result, there could be unauthorized access to the data.
42
43
4.7.1 Private cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to virtualized the business environment, and requires the organization to reevaluate decisions about existing resources. When done right, it can improve business, but every step in the project raises security issues that must be addressed to prevent serious vulnerabilities. They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".
Comparison for SaaS Public cloud Initial cost Typically zero Private cloud Typically high Unpredictable Possible
No (Host has access to the data) Yes Possible Laborious but no limits
44
4.7.2 Public cloud A cloud is called a 'Public cloud' when the services are rendered over a network that is open for public use. Technically there is no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered).
4.7.3 Community cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized.
4.7.4 Hybrid cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Such composition expands deployment options for cloud services, allowing IT organizations to use public cloud computing resources to meet temporary needs. This capability enables hybrid clouds to employ cloud bursting for scaling across clouds. Cloud bursting is an application deployment model in which an application runs in a private cloud or data center and "bursts" to a public cloud when the demand for computing capacity increases. A primary advantage of cloud bursting and a hybrid cloud model is that an organization only pays for extra compute resources when they are needed.
45
Cloud bursting enables data centers to create an in-house IT infrastructure that supports average workloads, and use cloud resources from public or private clouds, during spikes in processing demands. By utilizing "hybrid cloud" architecture, companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. Hybrid cloud architecture requires both on-premises resources and off-site (remote) server-based cloud
infrastructure. Hybrid clouds lack the flexibility, security and certainty of in-house
applications. Hybrid cloud provides the flexibility of in house applications with the fault tolerance and scalability of cloud based services.
46
47
4.8.1Provider A cloud computing provider or cloud computing service provider owns and operates live cloud computing systems to deliver service to third parties. The barrier to entry is also significantly higher with capital expenditure required and billing and management creates some overhead. Nonetheless, significant operational efficiency and agility advantages can be realized, even by small organizations, and server consolidation and virtualization rollouts are already well underway. Amazon.com was the first such provider, modernizing its data center switch, like most computer networks, were using as little as 10%of its capacity at any onetime just to leave room for occasional spikes. This allowed small, fastmoving groups to add new features faster and easier, and they went on to open it up to outsiders as Amazon Web Services in2002on a utility computing basis. 4.8.2User A user is a consumer of cloud computing. The privacy of users in cloud computing has become of increasing concern. The rights of users are also an issue, which is being addressed via a community effort to create a bill of rights. 4.8.3 Vendor A vendor sells products and services that facilitate the delivery, adoption and use of cloud computing. For example: Computer hardware (Dell, HP, IBM, Sun Microsystems) o Storage (Sun Microsystems, EMC, IBM) o Infrastructure (Cisco Systems) Computer software (3tera, Hadoop, IBM, RightScale) o Operating systems (Solaris, AIX, Linux including Red Hat) o Platform virtualization (Citrix, Microsoft, VMware, Sun xVM, IBM)
48
5.9 CHARACTERISTICS
49
Agility improves
with
users'
ability
to
re-provision
technological
infrastructure resources.
Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs.
Cost is claimed to be reduced, and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project's state of the art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available inhouse.
Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another.
50
Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for: Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 1020% utilized.
Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business
Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.
Performance is
monitored
and
consistent
and
loosely
coupled
Security could improve due to centralization of data, increased securityfocused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud
51
installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics": On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. ... Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).
52
53
The relative security of cloud computing services is a continuous issue which may be delaying it adoption. Issue barring adoption of cloud computing are due in large part to the private and public sectors unease surrounding the external management of security based service. It is the very nature cloud computing services, private or public, that promote external management of services. GOOGLE - The leader in cloud computing. Google offers serial service including e-mail and document application service Google claims its services are 99.99% reliable Bugs and glitches always occur with new technology.
AMAZON - Amazon offers data storage service Company has only pay storage they use More and more companies are starting trust cloud computing service and turn begin to store their data in clouds.
MICROSOFT - The cloud computing industry is predicted to hurt software business Therefore, Microsoft is taking a stand and developing cloud computing services of their own, Azure. They are offering Microsoft based document application for the web for small monthly fee. Even the government is waiting to get on this new technology. The US defense Department offering a new cloud computing
54
IBM -
IBM is developing cloud computing application for everyday user called Cloudburst IBM also offers private cloud computing services using IBM blue services software.
KEY CHARACTERISTICS: RELIABLITY: It improves through the use of multiple redundant sites, which make its suitable for business continuity and disaster recovery. Nonetheless, most major cloud computing services suffered outages and IT and business mangers are able to do little when they are affected. SECURITY: It typically improve due to centralization of data increased security-focus, resource, etc.., but raises concern about loss of control over certain sensitive data. SUSTAINABILITY: It comes about through improved resource utilization, more efficient system, and carbon neutrality. Nonetheless, computer and associated infrastructure is major consumer of energy.
55
56
PROS:
Lower computer costs Improved performance Reduced software costs Instant software updates Unlimited storage capacity Increased data reliability Universal document access Latest version availability Improved document format compatibly
CONS:
Can be slow Feature might be limited Store data might not be secure Stored data can be lost Requires constants internet connection Does not work with low-speed connections HPC system General concerns
57
5.12 LIMITATIONS
58
Cloud computing is widely recognized as a revolutionary IT concept and with dierent oerings can t the needs of very diverse customers, rangin g from large enterprises, small start-ups, to end-users. Some cloud based applications, such as Gmail, have had great success; but as the diversity of the o erings grows so does the reluctance to trust some services or to trust more sensitive data to osite computers. This is easily observed at the enterprise level when decision makers in the information technology departments of companies and organizations keep rejecting a move to the cloud. At present most organizations are only willing to outsource applications that involve less sensitive information. According to a survey of more than 500 chief executives and IT managers of 17 countries they still trust existing internal systems over cloud -based systems due to the fear about security threats and loss of control of data and systems . The ones that do agree to move to the cloud still demand third party risk assessments or at least ask the cloud providers questions such as: Who will have access to the data and applications and how will that be monitored? What security measures are used for data transmission and storage? How are applications and data from dierent customers are kept separate? Where, in terms of geographical location, will be the data stored? Could the Choice of the location aect me? Can these measures and details be stipulated in a service level agreement? All these customer worries can be translated into what can be identied as the mainobstacles to the adoption and growth of cloud computing. Each of these obstacles are examined in the following subsections 1 Availability of service Outages of a service become a major worry when customers have deposited all their information in the cloud and might need it at anytime. Given that the customer management interfaces of public clouds are accessible via Internet, there is an increased risk of failure when compared to traditional services since
59
there are more weak points in the chain of elements needed to access the information or application. For instance, web browser vulnerabilities could lead to service delivery failures. A feasible means to obtain a high degree of availability would be using multiple cloud computing providers. Cloud providers are well aware of these risks and today provide more information about the current state of the system, as this is something that customers are demanding. Sales force for instance shows the real-time average response time for a server transactional Trust.salesforce.com. Amazon has implemented a service dashboard that displays basic availability and status history. 2 Data lock-in As some people, such as GNU creator Richard Stallman have advised, the use of proprietary cloud-based applications could end up in situations where migration o the cloud to another cloud or to an in-house IT environment would be nearly impossible. The reason for the current poor portability and limited interoperability between clouds is the lack of standardized APIs. As a consequence migration of applications between clouds is a hardtack. An evolution towards standardized APIs would not only overcome this risk by allowing SaaS to develop software services interoperable in all clouds, but would provide a rm basis to progress towards hybrid computing models. Google is the only cloud provider truly advancing to achieve a more standard environment and they even have an initiative, called Data Liberation Front , to support users moving data and applications in and out of their platform. 3 Data segregation A direct consequence of the multi-tenant usage mode, where di erent customers virtual machines are co-located in the same server or data is on the same hard disks, is the question of isolation. How should the cloud securely isolate users? This class of risks includes issues concerning the failure of mechanisms to separate storage or memory between di erent users(i.e., such a failure would enable information to leak from one customers VM to another customers VM). There are a number of documented vulnerabilities in di erent commercial hypervisors that have been exploited to gain access to one or more
60
customers virtual machines. Another type of attack whose feasibility has been reported is a side-channel attack. A case study carried out by MIT and University of California at San Diego on the AmazonEC2 service considered this style of attack an actual threat, and they demonstrated this attack by successfully overcoming the following: Determining where in the cloud infrastructure a septic virtual machine instance is located. Determining if two instances are co-resident in the same physical machine. Proving that it is possible for an adversary to launch on purpose instances that will be co-resident with another users instances. Proving that it is possible to take advantage of cross-virtual machine information leakage once co-resident. They were able to successfully perform all the previous steps given that patterns can be found in the mapping of virtual machine instances into physical resources (for example, by examining internal and external IP addresses of a large number of different types of instances). In their tests they could launch co-resident instances with a 40% probability of success. They state that the only certain way to avoid this threat is to require exclusive physical resources, something that ultimately customers with high privacy requirements will begin to ask for. 4 Privilege abuse The threat of a malicious insider with a privileged role (e.g. a system administrator) is inherent to any outsourced computation model. Abuse by insiders could impact and damage the customers brand, reputation, or directly damage the customer. Note that these same type of attacks can be carried out by internal employees in a traditional (i.e., non-cloud) computing infrastructure. Cloud customers should conduct a comprehensive assessment of any potential cloud provider, specifying human resource requirements (i.e. stating who will have access to their data and what level of access they will have) and requiring transparency measures. Additional trust systems that would not require the customer to blindly trust the provider would be useful.
61
5 Scaling resources As noted earlier in section 3, the ability of scaling up or down resources to meet workload is one of the most desired cloud computing advantages. However, this great advantage can lead to service failures if it is not well implemented or if a maximum response time is not agreed upon beforehand. A web application developer who hosts its service on a cloud may see how the response time steadily increases when the usage of the application also increases - because the cloud does not scale up resources quickly enough. On the other hand, scaling must be limited by some threshold. This threshold would stop the continuous increase in the allocation of resources to prevent the cloud provider from suffering a denial of service attack because the customers application was malfunctioning. In either case the customer could be billed for service that they did not want. Existing service level agreements determine quality of service requirements, but not inters of response time in response to workload variations. There are proposed solutions in service level agreements (SLA) for scalability implemented through statistical machine learning. 6 Data security and condentiality The distributed nature of the cloud model necessarily involves more transits of data over networks, thus creating new challenging security risks. The condentiality of the data must be assured whether it is at rest (i.e. data stored in the cloud) or in transit (i.e. to and from the cloud). It would be desirable to provide a closed box execution environment where the integrity and condentiality of the data could be veried by its owner. While encryption is an answer to securely storing data in the cloud, it does not t that well with cloud-based processing. This later problem occurs because generally the cloud both stores data and applications running on the cloud operate on this data. In most cases the data has to be unencrypted at some time when it is inside the cloud. Some operations would be simply impossible to do with encrypted data and, furthermore, doing computations with the encrypted data would consume more computing resources (and more money, inconsequence).There are recent steps towards dealing with this issue.
62
One is the Trusted Cloud Computing Platform , which aims to apply the Trusted Computing model (developed in 2003 by Intel, AMD, HP, and IBM) to the cloud. However the scope of this initiative is to protect against malicious insiders, inside the cloud provider organization. Another project of the Microsoft Cryptography Group is a searchable encryption mechanism introduced by Kamara and Lauter in. The underlying process in this system is based on a local application, installed on the users machine, composed of three modules: a data processor, a data verier, and a token generator. The user encrypts the data before uploading it to the cloud. When some data is required, the user uses the token generator to generate a token and a decryption key. The token is sent to the cloud, the selected encrypted le(s) are downloaded, and then these les are veried locally and decrypted using the key. Sharing is enabled by sending the token and decryption key to another user that you want to collaborate with. The enterprise version of the solution consists of adding a credential generator to simplify the collaboration process. Other relevant projects are also being conducted. One example is a recently published PhD dissertation from Stanford University done by Craig Gentry in collaboration with IBM. This research proposes A fully homomorphism encryption scheme. Using their proposed encryption method data can be searched, sorted, and processed without decrypting it. The innovation here is there freshing mechanism necessary to maintain low levels of noise .Although successful, both initiatives have turned out to be still too slow and result it very low efficiency. As a result, they are not commercially utilized yet. 7 Data location In addition to the topology of the cloud network, the geographic location of the data also matters in some cases. Knowing datas location is fundamental to securing it, as there might be important differences between regulatory policies in different countries. A customer could be involved in illegal practices without even noticing, as some government prosecute companies that allow certain types of data to cross geographical boundaries. Cloud computing customers must tackle this issue by understanding the regulatory requirements for every country they
63
will be operating in. Not only the datas location, but the p ath the data follows may also matter. According to Forresters Cloud Privacy Heat map, a possible conclusion is that it can be hard for an application operator to deploy application sat a minimum distance from the users (i.e., there may be locations where the data must travel to that require following a non-optimal path because the ideal path crosses countries with restrictive laws).Currently there are cloud providers that leave the choice of the datacenter location to the user. For instance, Amazon overs two locations in the US and one in Europe. Very likely, other providers will add to Amazons region choice over as the location of data is an increasing important requirement of potential customers. 8 Deletion of data Closely related with the isolation issues that the multi-tenant architecture can entail isthe fact that the user can erase data upon request. A user of a public cloud may require his data to be deleted, i.e., completely removed from the cloud. As this can only be entirely done by erasing, repeatedly re-writing the disk sectors with random data, and possibly formatting the servers hard disk, this could turn out to be impossible to do at the service provider environment. As noted earlier in the discussion of a side-channel attack, a malicious user could later take advantage of remaining data. Even with multiple cycles of re-writing the sectors which previously held the le it may be possible to access the "erased" data, but the probability can be reduced - however, this is at a quite high cost in time and disk I/O and may not be completely successful. In the latest report about cloud computing by the European Network and Information Security Agency (ENISA) it has been suggested that if encryption were applied to data at rest, the level of this risk would be considerably lower. 9 Recovery and back-up Cloud providers should have an established plan of data back-up in the event of disaster situations. This may be accomplished by data replication across different locations and the plan must be addressed in the service level agreement.
64
10 The Online cloud Being completely dependent upon an Internet connection might turn out to be impossible or highly risky for some users who need an application (or data) to be available at all times. This creates a bigger problem if the user is moving and the quality of the connection can change, hence in some situations relying on a Internet service provider is simply not an option The so-called pure Cloud computing model causes this impediment. This model is based on the fact that the most used software application nowadays is the web browser and that today complete applications can be delivered as a service through the Internet and all of the end-users interaction can occur through a web browser. An obvious conclusion is to build a web based OS. In this approach the web browser acts as the interface to the rest of the system and hardware, such as hard disks or powerful processors, would not be needed locally anymore. Instead, a net book or other thin-client with a low energy consuming processor (e.g. Intel Atom, Via Technologies C7, etc.) would source provided that most of the computation would take place in the cloud and that all the data would be stored there as well. This is the model that Google is pursuing with their Chrome OS. In addition, other independent software vendors are developing web desktop overeggs, such as the eye OS . In this pure Cloud model, loosing connectivity to the cloud is a major problem because it means that the local computer becomes almost useless. In 2007, Google introduced Gears: a free add-on for the browser that enables data to be stored locally in a fully searchable database while surng the Internet. Gears pretty much solved the online problem enabling web applications to continue their operations
65
5.13 Benefits
66
1. Flexibility
The second a company needs more bandwidth than usual, a cloud-based service can instantly meet the demand because of the vast capacity of the services remote servers. In fact, this flexibility is so crucial that 65% of respondents to an InformationWeek demands survey said the ability to quickly meet business
2. Disaster recovery When companies start relying on cloud-based services, they no longer need complex disaster recovery plans. Cloud computing providers take care of most issues, and they do it faster. ABERDEEN G ROUP
FOUND
used the cloud were able to resolve issues in an average of 2.1 hours, nearly four times faster than businesses that didnt use the cloud (8 hours). The same study found that mid-sized businesses had the best recovery times of all, taking almost HALF THE TIME OF LARGER COMPANIES TO RECOVER.
including security updates themselves, freeing up their customers time and resources for other tasks.
4. Cap-ex free Cloud computing services are typically pay as you go, so theres no need for capital expenditure at all. And because cloud computing is much faster to deploy, businesses have minimal project start-up costs and predictable ongoing operating expenses.
67
5. Increased Calibration Cloud computing increases collaboration by allowing all employees wherever they are to sync up and work on documents and shared apps simultaneously, and follow colleagues and records to receive critical updates in real time. A survey by Frost & Sullivan found that companies which invested in collaboration technology had A 400% RETURN ON INVESTMENT . 6. Worked from anywhere As long as employees have internet access, they can work from anywhere. This flexibility positively affects knowledge workers' work-life balance and productivity. One study found that 42% of working adults would give up some of their salary if they could telecommute, and on average they would take a 6% pay cut.
If a company doesnt use the cloud, workers have to send files back and forth over email, meaning only one person can work on a file at a time and the same document has tones of names and formats. Cloud computing keeps all the files in one central location, and everyone works off of one central copy. Employees can even chat to each other whilst making changes together. This whole process makes collaboration stronger, which increases efficiency and improves a companys bottom line.
8. Security Some 800,000 LAPTOPS ARE LOST EACH YEAR IN AIRPORTS ALONE. This can have some serious monetary implications, but when everything is stored in the cloud, data can still be accessed no matter what happens to a machine.
68
9. Competitiveness The cloud grants SMEs access to enterprise-class technology. It also allows smaller businesses to act faster than big, established competitors . A
DISASTER RECOVERY STUDY ON
cloud had to rely on tape backup methods and complicated procedures to recover slow, laborious things which cloud users simply dont use, allowing David to once again out-man oeuvre Goliath. 10. Environment friendly Businesses using cloud computing only use the server space they need, which decreases their carbon footprint. Using the cloud results in at least 30% less energy consumption and carbon emissions than using on-site servers. And again, SMEs get the most benefit: for small companies, the cut in energy use and carbon emissions is LIKELY TO BE 90%
69
5.14 DISCUSSIONS
Cloud computing is a rather simple concept; using an application without having to install it Cloud computing vulnerabilities have closed down companies like Magnolia, and Media ax. Other serious events (inconvenience of Salesforce.coms customers to access crucial business application, Nokia Ovis server crash and result in loss of data) are pointers that cloud computing await dark days. There are many reasons to justify why cloud is risky. Recently Black Hat conference in Los Angeles addressed the key-factors that bully cloud computing. Microsoft, Amazon, Apples Mobile Me services were some prominent names in Clobbering the cloud list. One server is responsible for potential data-storage. This is a major drawback in cloud internet. In case the server dies down, data retrieval will be impossible. This makes cloud incompetent. However, many cloud service providers store data across many servers and in few cases they may even store it at multiple data centers. Before deciding on your cloud project, make sure to ask how and where data is stored. Second concern is password security. User-accounts are safeguarded only by a password. Rest is left to good humor! Cloud-providers concentrate more on user-friendliness of the server than on security measures or firewall protection. This therefore puts cloud in the risk of getting hacked. Makes cloud vulnerable. Cloud ignores data-encryption. This makes it easier for a hacker to guess at numbers stored on the main server resulting into unprotected interwar intrusion and data theft. Wouldnt it be awful if you top-secret business plan is leaked over the internet
71
72
From the data depicted graph conclude that cloud computing concept are known by 76% and not known by 24%. So we say that, this concept is the important for the public and IT department.
73
Q.2 In which industry you work? (Respondent n=200) Sr. No. 1 2 3 4 5 Finance Government Technology Communications Other Statements f 21 33 52 42 52 % 10.50 16.50 26 21 26
10.50% 26% 16.50% Finance Government Techonology Communication 21% 26% other
The above given graph shows about the people are works in the different industry the 52% people are work in other industry The 52% people of technology and 42% people of communication are comes in the IT department The 33% people who works in the government are also needed the cloud computing.
Q.3 Which are the main reasons for using cloud computing for you?
74
(Respondent n=200) Sr. No. 1 2 3 4 5 Statements Investments Improved reliability Scalability Pricing model Other f 44 33 40 28 55 % 22 16.50 20 14 27.50
30% 25% 20% 15% 10% 5% 0% Investment Improved Reliability Scalability Pricing Model 22% 20% 16.50% 14%
27.50%
Other
The above chart shows that, the 27.50% people are main reason using the cloud computing for other use like; security, personal data, privacy etc. The 22% people are reason for using investments. In the cloud computing people are invest their company or personal data.
75
The 20% people main reasons using is scalability. Cloud computing reduce the scalability. The 16.50% are use for improved reliability and 14% people are using for pricing model
Q.4 which model you prefers for cloud computing? (Respondent n=200) Sr. No. 1 Statements IAAS( Infrastructures as a services) 2 3 PASS (Platform as a service) SAAS (Software as a service) 48 76 24 38 f 76 % 38
38%
38%
24%
The above give graph shows that, the 38% people are using the IAAS (Infrastructures as a services) and SAAS (Software as a service) this types of model
76
The
technology
and
communications
people
prefers
the
IAAS(
PASS (Platform as a service) model are using by the people for the software and pricing model.
Q.5 Which cloud model would you like to establish? (Respondent n=200) Sr. No. 1 2 3 Private Hybrid Public Statements F 63 51 86 % 31.50 25.50 43
43%
31.50%
25.50%
In the chart shows that the 43% people like to establish the public
cloud model.
77
The 31.50% people like to establish the private cloud model. The 25.50% people like to establish the hybrid cloud model.
Q.6 Which cloud computing services you like?
(Respondent n=200) Sr. No. 1 2 3 4 5 Statements Data storage Software Business specific E-mail and messaging Other F 37 37 61 38 27 % 18.50 18.50 30.50 19 13.5
Other
13.50%
19%
Business Specific
30.50%
Software
18.50%
In above chart shows that, 30.50% people are like to business specific cloud computing services. In business cloud computing reduce the works.
78
The 19% people are using that services for the E-mail and messaging for personal uses.
The 18.50% of are using the services in software uses and data storage for the security and privacy. The 13.50% are using the services for other works.
Q. 7 What are the main concerns you prefer in, (A) IAAS ( Infrastructures as a services)
Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration
11% 11.50% 8%
9% 12% 22.50%
79
40% 35% 30% 25% 20% 15% 10% 5% 0% Privacy 9.50% 9% 30% 28% 24%
39.50%
29%
30% 27.50% 23.50% 23% 22.50% 21.50% 20.50% Strongly Disagree Disagree Neutral
17.50% 11% 8% 9% 6.50% 11.50% 12% 8% Agree Strongly Agree Avaibility of service & data control Loss of control service Lack of liability Inter class migration
The above chart shows that the 39.50% are neutral for Availability of service & data control. The privacy factors, the 30% people disagree with it.
The loss of control services, the 25.50% people disagree and 24.50% are agreed.
The lack of liability, the 30% people are neutral and 23% are agree.
The inter class migration, the 27.50% are neutral and 22.50% are strongly agree.
80
(B) PASS (Platform as a services) (Respondent n=200) Agree Strongly Agree 18.50% 9% 11% 4.50%
Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration
13% 8% 8.50%
37.50%
38.00% 34.50% 31.00% 30.50% 30.00% 32.00% 29.50% 25.50% Strongly Disagree Disagree 17.00% 12.50% 8.50%8.00% 4.50% Strongly Agree Neutral Agree 10.50% 8.50%
25.00% 20.00% 15.00% 10.00% 5.00% 0.00% Privacy 9.00%8.00% 18.50% 18.50% 16.50% 18.50% 18.00% 13.00%
22.00%
Avaibility of Loss of control Lack of liability service & data service control
81
The above chart shows that the 38.00% are disagree for Availability of service & data control. And 31% are neutral. The privacy factors, the 38% people disagree with it.
The loss of control services, the 25.50% people disagree and 24.50% are agree.
The lack of liability, the 30.50% people are neutral and 18% are disagree.
The inter class migration, the 34.50% are neutral and 17% are strongly agree.
(C) SASS (Software as a service) (Respondent n=200) Agree Strongly Agree 14.50% 8.5% 17.5% 11%
Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration
11% 10% 7%
82
38.00% 35.00% 34.00% 28.50% 25.00% 25.00% 17.50% 16.50% 26.00% 24.00% 22.00% 35.00% 28.00% Strongly Disagree Disagree 17.00% 13.00% 13.00% 7.00% Neutral Agree Strongly Agree
25.00% 20.00% 15.00% 10.00% 5.00% 0.00% Privacy Avaibility of service & data control Loss of control service 14.50% 14.00%
Lack of liability
The above chart shows that the 25% are disagree and neutral for Availability of service & data control. And 14.50% are agreed. The privacy factors, the 38% people neutral with it.
The loss of control services, the 34% people neutral and 28.50% are agree.
The lack of liability, the 26% people are neutral and 24% are agree.
The inter class migration, the 35% are neutral and 28% are strongly agree and 17% strongly agree.
The people are like the SAAS services. This services are helpful for the private and hybrid sector more.
83
Q.8 In your views, cloud computing is the future model of information technology? (Respondent n=200) Sr. No. 1 2 3 4 5 Statements Strongly agree Agree Undecided Disagree Strongly disagree F 25 61 56 32 26 % 12.50 30 38 16 13
35.00% 30.00% 25.00% 20.00% 15.00% 12.50% 10.00% 5.00% 0.00% Strongly Agree Agree Undecided Disagree strongly Disagree 16.00% 13.00% 30.50% 28.00%
Above this graph shows that the, 30.50% people are agree that the cloud computing is the future model of the information technology.
33% people not decided that it is the useful future model for IT.
84
Q.9 Do you think, government will impose cloud computing specific privacy legislation?
No
47%
Yes
53%
44%
46%
48%
50%
52%
54%
This graph shows that the, 53% people are agreed with that government will impose the cloud computing legislation. And 47% people not agreed with that. So this is the mixed views of people.
85
Q. 10 In your views, cloud computing is bigger than internet? (Respondent n=200) Sr. No. 1 2 Yes No Statements f 95 105 % 47.50 52.50
100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Yes No 47.50% 52.50%
This graph shows that the, 47.50% people are agree with that cloud computing is bigger than internet. When 52.50% people are not agree with that cloud computing is bigger than internet.
So the cloud computing is not popular in information technology. Q. 11 Do you think, cloud computing is benefit for you?
86
Above graph shows that, 62% people think that cloud computing are benefited. When 38% people think that it is not benefited.
So the, cloud computing are the benefit for the information technology.
87
88
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 28.860a 28.660 .039
df
200
89
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.070a 12.886 .125
df
200
90
(A)IAAS PRIVACY:QUALIFICATION
Crosstab Count QUALIFIC4TION 1 (A)IAAS PRIVACY 1 2 3 4 5 19 24 6 10 3 Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .016 .001 .333 2 8 7 12 6 3 3 10 24 10 5 0 4 10 6 8 0 2 5 7 13 5 0 2 Total 54 74 41 21 10
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 30.403a 38.471 .938
df
200
Total
62
36
49
26
27
200
91
92
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 11.687a 14.426 1.070
Df
200
Crosstab
93
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 13.888a 14.081 .028
df
200
AVALIBILITY OF SERVICES&DATA:QUALIFICATION
94
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.965a 10.824 .005
df
200
95
LOSS OF CONTROL SERVICES: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 1 4 7 7 1 20 2 1 11 8 8 6 34 3 4 13 17 16 6 56 4 9 9 13 6 1 38 5 6 17 15 11 3 52 Total 21 54 60 48 17 200
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.758a 19.926 6.130
df
200
96
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.758a 19.926 6.130
df
200
97
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 29.171a 30.297 7.344
Df
200
98
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.823a 13.766 1.785
Df
200
LACK OF LIABLITY: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 LACK OF LIABLITY 1 2 3 4 5 Total 3 4 5 3 5 20 2 6 6 12 6 4 34 3 4 17 19 11 5 56 4 5 5 11 11 6 38 5 5 16 14 12 5 52 Total 23 48 61 43 25 200
99
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 13.446a 13.169 .006
df
200
100
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.355a 20.470 1.476
df
200
LACK OF LIABLITY: QUALIFICATION Crosstab Count QUALIFIC4TION 1 LACK OF LIABLITY 1 2 3 4 5 Total 14 14 13 13 8 62 2 1 12 10 10 3 36 3 4 11 20 9 5 49 4 3 6 8 5 4 26 5 1 5 10 6 5 27 Total 23 48 61 43 25 200
101
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.312a 19.329 3.306
Df
200
MIGRATION: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 MIGRATIO 1 N 2 3 4 5 Total 3 4 5 6 2 20 2 3 6 8 9 8 34 3 2 8 17 17 12 56 4 4 9 12 7 6 38 5 3 12 13 7 17 52 Total 15 39 55 46 45 200
Chi-Square Tests
102
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 14.604a 14.926 .292
df 16 16 1
200
Chi-Square Tests
103
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.924a 13.068 .001
df 12 12 1
200
Chi-Square Tests
104
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 16.907a 16.738 .144
df 16 16 1
200
INDUSTRY
105
Privacy
0.25
h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other. WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about <<IAAS> and its loss of control services> are dependent to each other.
0.765
0.188
Lack of liability
0.64
Intra-class migration
0.554
Privacy
0.44
0.308
0.04
106
Lack of liability
0.8
h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other. QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Loss of control services> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other.
Intra-class migration
0.623
Privacy
0.16
0.812
0.686
Lack of liability
0.253
Intra-class migration
0.392
107
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.167a 11.574 .364
Df
200
108
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 32.261a 32.387 .309
Df
200
109
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 32.261a 32.387 .309
Df
200
110
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 27.695a 28.398 .146
Df
200
111
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 6.976a 7.047 .492
Df
200
112
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 16.761a 18.336 .046
df
200
113
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.305a 20.468 3.318
df
200
114
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.677a 22.371 2.304
df
200
115
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.370a 24.991 .071
df
200
116
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 22.810a 22.239 3.218
df
200
117
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.813a 10.114 .030
Df
200
118
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.622a 20.433 .697
Df
200
119
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 15.647a 16.267 .321
df
200
120
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.221a 8.887 3.095
df
200
121
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 24.418a 27.735 2.003
df
200
122
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 25.425a 24.937 .068
df
200
(B) PAAS INDUSTRY h0 is accepted hence Industry of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Lack of liability> are independent to each other.
Privacy
0.34
0.207
0.119
Lack of liability
0.478
123
Intra-class migration
0.63
h0 is accepted hence Industry of employment of individual and their perception about < and its Intra-class migration> are independent to each other. WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about < its loss of control services> are dependent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Intra-class migration> are independent to each other.
Privacy
0.432
0.859
0.41
Lack of liability
0.632
Intra-class migration
0.768
124
QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <and its Intra-class migration> are independent to each other.
Privacy
0.09
0.401
0.165
Lack of liability
0.156
Intra-class migration
0.81
125
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.083a 8.788 .113
Df
200
126
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.799a 21.727 .097
Df
200
127
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.774a 22.472 2.302
df
200
128
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.400a 8.645 .957
df
200
129
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 18.832a 18.977 .014
Df
200
130
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.562a 12.817 .417
df
200
131
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.619a 10.706 1.062
df
200
132
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 18.377a 18.806 .091
df
200
133
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.199a 10.168 .660
Df
200
134
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.440a 8.032 .108
Df
200
135
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.400a 8.236 .004
Df
200
136
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 25.030a 24.865 .392
df
200
MIGRATION:WORK EXPRIANCE
137
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.905a 11.007 .000
df
200
MIGRATION: QUALIFICATION
138
Crosstab
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.580a 10.571 .080
df
200
139
Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.137a 20.245 .526
df
200
140
(C) SAAS INDUSTRY h0 is accepted hence Industry of employment of individual and their perception about < its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Intra-class migration> are independent to each other.
Privacy
0.151
0.704
0.856
Lack of liability
0.69
Intra-class migration
0.262
WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about < and its privacy> are independent to each other.
Privacy
0.696
141
0.753
h0 is accepted hence Work Experience of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about < its loss of control services> are dependent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Intra-class migration> are independent to each other. QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Loss of control services> are independent to each other.
0.562
Lack of liability
0.75
Intra-class migration
0.537
Privacy
0.15
0.277
0.302
142
Lack of liability
0.936
h0 is accepted hence Qualification of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <and its Intra-class migration> are independent to each other.
Intra-class migration
0.835
143
CHAPTER 8 CONCLUSION
144
Companies have to pick and choose and be careful with what data they allow to be out there in a cloud. Cloud computing can be a useful resource to help companies save money but can also have downfalls. The average citizen doesn't want their personal information unprotected and available. As companies perfect their cloud computing services, I think that more companies will be open to using these services. This service will provide new inventive ways to use computers and provide services. By eliminating the problems of traditional application development, cloud computing technology frees you to focus on developing business applications that deliver true value to your business (or your customers). The platform lets IT innovate while avoiding the costs and headaches associated with servers, individual software solutions, middleware or point-to- point connections,
Cloud Computing Brings Possibilities: Increases business responsiveness Accelerates creation of new services via rapid prototyping capabilities Reduces acquisition complexity via service oriented approach Uses IT resources efficiently via sharing and higher system utilization Reduces energy consumption Handles new and emerging workloads Scales to extreme workloads quickly and easily Simplifies IT management Platform for collaboration and innovation Cultivates skills for next generation workforce
145
The results states that the utility of the Cloud matches the need of the todays Business. Because of the dynamic changing environments, the workload can shrink or grow very fast which causes a problem for the enterprise to scale up or down immediately. Moreover the features that were used by the Technical giants and not affordable by small enterprises due to heavy pricing can now be made available to them. Cloud does not suit well to the financial enterprise that has sensitive data and is not willing to disclose it to the third part vendors. Cloud computing is picking up and there are few early winners who adopted the technology. Companies that used to take20years to build up an infrastructure can now be done in merely weeks or months. The most dependable solutions from number of vendors are still in the early stage but will definitely pick up in very short time. May be the coming years will let us know whether Cloud computing is the one of the best emerging technologies of all times or just an over hyped phenomenon.
146
CHAPTER 9 BIBLOGRAPHY
147
Websites:
www.infoworld.com www.wiki.cloudcomunity.org www.davidchappell.com www.amazon.com www.thinkgos.com www.isaca.org www.chinadaily.com. www.kth.diva-portal.org www.salesforce.com/uk/ www.fixtro.com/ www.iitweb.bloomu.com www.devcentral.f5.com www.universal-software.com/
Books:
Chief. computer Magazine, December 2008-Febuaray2009 edition Larry eilison,wall street journals, September 26,2008 Andy Isherwood, ZDnet news, December-11,2008 Richard Stallman, the Gardian, September 24,2008 Brad Jefferson CEO-animto, 2009 Vivek kundra, Federal CIO, United States Government Sys-con cloud computing Journal Bhrugu Sevak, B. (2012). Security against side channel attack in cloud computing. International Journal of
Engineering and Advanced Technology (IJEAT), 2(2), 183186. G. Vijay Baskar, V., N. Sathees Kumar, S., & N. KarthickKumar, K. (2013). Research analysis of cloud computing. International Journal of Computer Science and Mobile Computing
148
Gurudatt Kulkarni, G., Jayant Gambhir, J., & Rajnikant Palwe, R. (2012). Cloud computing-software as service. International Journal of Cloud Computing and Services Science (IJ-CLOSER)), 1(1), 11-16
149
CHAPTER 10 ANNEXURE
150
Dear Sir/Madam, Myself Rushang Patel, I am a management student from Gandhinagar Institute of Technology; currently I am working on the project CLOUD COMPUTING. I will be thankful to the employees of the selected companies if they give their precious time to fill in this questionnaire, the information given by the employees will be kept confidential and will be used only for the academic purpose.
Work Experience:
Qualification:
Masters Doctorate
151
Q.2 In which industry you work? Finance Communications Government Other Technology
Q.3Which are the main reasons for using cloud computing for you? Investments Pricing model Improved reliability other Scalability
Q.4 which model you prefers for cloud computing? IAAS (Infrastructures as a service) PAAS (Platform as a service) SAAS (software as a service)
152
Q.5 which cloud model would you like to establish? Private Hybrid Public
Q.6 Which cloud computing services you like? Data storage Software Business specific Other
(A) IAAS (Infrastructures as a services) Strongly disagree Privacy Availability of service& data Control Loss of control services Lack of Liability Intra-class Migration Disagree Neutral Agree Strongly agree
153
(B) PAAS (Platform as a services ) Strongly disagree Privacy Availability of services& data Control Loss of control services Lack of Liability Intra-class Migration Disagree Neutral Agree Strongly agree
(C) SAAS (software as a services) Strongly disagree Privacy Availability of services & data Control Loss of control services Lack of Liability Intra-class migration Disagree Neutral Agree Strongly agree
154
Q.8 In your views, cloud computing is the future model of information technology? Strongly agree Disagree Agree Strongly disagree Undecided
Q.9 Do you think, government will impose cloud computing specific privacy legislation? Yes No
155
REMARKS
156
157