Virtualization in Cloud Computing: Existing solutions and new approach

Author(s):  
Meryeme Alouane ◽  
Hanan El Bakkali
Keyword(s):  
2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


2014 ◽  
Vol 513-517 ◽  
pp. 1425-1430
Author(s):  
Xiu Zhen Feng ◽  
Peng Hao

Cloud computing technology created a brand new approach for further information resources management and utilization. Based on exploring characteristics and applications of cloud computing technology, the study in this paper is focused on cloud service with information resources. The aim of this study is to construct a cloud service model, namely Information Resource as a Service (IRaaS). Our model depicts the components of IRaaS and relationships among those components, which builds up a prime foundation for further studying on both information resource management and service.


2012 ◽  
Vol 3 (3) ◽  
pp. 413-418
Author(s):  
Logica Banica ◽  
Daniela Pirvu ◽  
Cristian Stefan

The focus area of this paper is twofold: covering the theoretical background about cloud-based Business Intelligence, and the practical approach using the Jaspersoft environment. Also, by choosing the main application area, we emphasized the advantage of using such instruments as an educational tool, with the goal of giving the students an opportunity to discover data collections and explore analysis methods. After an overview of the Business Intelligence and Cloud Computing main concepts, we have pointed out the benefits of using BI in the Software as a Service (SaaS) philosophy, and we used the facilities of Jaspersoft BI software to model frequently used analysis requirements on several virtual firms


2013 ◽  
Vol 4 (4) ◽  
pp. 1-19 ◽  
Author(s):  
Gunnar Wahlgren ◽  
Stewart Kowalski

The authors combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework. With this combined framework the authors create a new approach to IT Security Risk Management where IT Security Risk Management is place at the strategic, tactical and operational levels of an organizational. In this paper the authors concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents. The authors present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA´s Risk IT Framework. Finally the authors apply the approach to typical cloud computing environment as a first step to evaluate this new approach.


Sign in / Sign up

Export Citation Format

Share Document