scholarly journals CLOUD COMPUTING: TEORI DAN IMPLEMENTASINYA DALAM DUNIA BISNIS DAN PEMASARAN

CCIT Journal ◽  
2012 ◽  
Vol 5 (2) ◽  
pp. 145-167
Author(s):  
Sudaryono Sudaryono ◽  
Diah Aryani ◽  
Ira Tyas Ningrum

Cloud computing is a technology that utilizes the internet services using a central server with the goal of maintaining a virtual nature of data and applications. The presence of cloud computing will obviously lead to changes in the workings of information technologysystems within an organization. This is because the concepts of cloud computing through virtualization, standardization and other fundamental features can reduce information technology costs, simplify the management of information technology services, andaccelerating service delivery. In general, cloud computing architecture consists of: (1) Infrastructure as a Service (IaaS), (2) Platform as a Service (PaaS), and (3) Software as a Service (SaaS). Characteristics of cloud computing are: (1) self-service (on demand self service), (2) broadband access (broadband access network), (3) clustered resource (resource pooling), (4) elastic (rapid elasticity), and (5) measured service (measuredservice). While the advantages of cloud computing is: (1) without any initial investment, (2) convert CAPEX into OPEX, (3) flexible and easily developed, (4) focus on the business, rather than information technology, and (5) of control and responsibility of service. Withcloud computing consumers free themselves from the responsibility for managing the stack of computing resources. Levels ranging from SaaS when it is completely free, PaaS while still must make an application, and IaaS are still busy with the operating system. Thiscontrasts with On-Premise to take care of all your own.

Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


Author(s):  
Guru Prasad Bhandari ◽  
Ratneshwer Gupta

Edge computing is a technique of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data in the systems. And, cloud computing is a service that delivers on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, which is trending in today's technology-driven world. With the advantage of flexibility, storage, sharing, and easy accessibility, cloud is being used by major players in IT (information technology). This chapter highlights cloud/edge computing architecture and its current issues and challenges from technological and organizational aspects. A brief introduction of edge computing architecture with similar technologies along with its service models is discussed. A few counterexamples of cloud computing architecture are showed. Organizational aspects of cloud computing architecture, as well as IBM and Oracle reference cloud architecture, are briefly presented. Some emerging issues and challenges associated with cloud/edge computing on its utilization are also elaborated.


Author(s):  
Guru Prasad Bhandari ◽  
Ratneshwer Gupta

Edge computing is a technique of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data in the systems. And, cloud computing is a service that delivers on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, which is trending in today's technology-driven world. With the advantage of flexibility, storage, sharing, and easy accessibility, cloud is being used by major players in IT (information technology). This chapter highlights cloud/edge computing architecture and its current issues and challenges from technological and organizational aspects. A brief introduction of edge computing architecture with similar technologies along with its service models is discussed. A few counterexamples of cloud computing architecture are showed. Organizational aspects of cloud computing architecture, as well as IBM and Oracle reference cloud architecture, are briefly presented. Some emerging issues and challenges associated with cloud/edge computing on its utilization are also elaborated.


2014 ◽  
Vol 984-985 ◽  
pp. 1309-1317 ◽  
Author(s):  
D. Sudha Devi ◽  
K. Thilagavathy ◽  
S. Vaghula Krishnan ◽  
S. Harish ◽  
R. Srinivasan

Cloud Computing is being intended to deliver information technology services based on internet on demand. The benefits of cloud technology are incomparable which takes the information technology into a new dimension. Organizations already invested for their own infrastructure are likely to set up private clouds to reap the benefits of cloud computing technologies. Cloud services are thriving by the open source software OpenStack. In this paper, we aim to introduce the largest open-source cloud operating system OpenStack with a new authentication mechanism. This paper tries to address the challenge of finding legitimate users by introducing One Time Password (OTP) as an authentication mechanism in OpenStack. Replay attacks can be defeated by using One Time Password. The OTP mechanism provides an extra level of protection which makes it extremely difficult for any potential intruder to abuse the recorded password that was already used to log into cloud service. The integration of OTP mechanism into OpenStack allows users to protect their credentials from unauthorized access. Also One Time Password is used to grant access to legitimate users into the cloud environment and to prevent access to malicious users bot attacks.With secured cloud environment users can enjoy lot many benefits of private cloud service.


2021 ◽  
Vol 12 (2) ◽  
pp. 116
Author(s):  
Yohanes Hugo Maur ◽  
Andi Wahju Rahardjo Emanuel

Abstract. Information technology architecture planning for Baubau Village using TOGAF ADM. Babau Village is a village located in Kupang Regency, East Nusa Tenggara Province. Currently, Babau Village has implemented information technology as a centre for information and administrative services. To improve the quality of service to the community, existing information technology needs to be further developed because the amount of information in the system will continue to increase along with population growth. The problem faced if information technology is not developed is a system performance problem. For further development to be more focused, research on an information technology architecture design for Babau Village. The design using TOGAF ADM is a blueprint and a roadmap for the development of advanced information technology services. The aim is that the existing business processes within the Babau Village related to information and administrative services continue to develop according to the needs of the community and the organizational management of Babau Village.Keywords: enterprise architecture planning, TOGAF, ADM, Babau VillageAbstrak. Kelurahan Babau adalah sebuah kelurahan yang terletak di Kabupaten Kupang, Provinsi Nusa Tenggara Timur. Saat ini Kelurahan Babau sudah menerapkan teknologi informasi sebagai pusat pelayanan informasi dan administrasi. Demi meningkatkan kualitas pelayanan kepada masyarakat, teknologi informasi yang ada perlu dikembangkan lebih lanjut karena jumlah informasi yang ada dalam sistem akan terus meningkat seiring pertumbuhan jumlah penduduk. Masalah yang dihadapi apabila teknologi informasi tidak dikembangkan ialah masalah kinerja sistem. Agar pengembangan tahap lanjut lebih terarah, penelitian mengenai sebuah perancangan arsitektur teknologi informasi untuk Kelurahan Babau. Perancangan yang menggunakan TOGAF ADM tersebut merupakan blueprint dan juga roadmap untuk pengembangan pelayanan teknologi informasi tahap lanjut. Tujuannya ialah proses bisnis yang ada didalam Kelurahan Babau terkait pelayanan informasi dan administrasi terus berkembang sesuai dengan kebutuhan masyarakat dan pengurus organisasi Kelurahan Babau.Kata Kunci: arsitektur teknologi informasi, TOGAF, ADM, Kelurahan Babau


Sign in / Sign up

Export Citation Format

Share Document