Cloud Computing in Industries: An Evaluation Regarding Cost and Security
DOI:
https://doi.org/10.14419/ijet.v7i4.25.27012Published:
2018-11-30Keywords:
Cloud Computing, Security in data, the cost reduction, IT related mattersAbstract
In this study, the companies which their data being handled by external parties has investigated and the parameter of cost as well as security have been considered. Moreover, an over view has been presented as to analysing the cost reduction and security of data. In this regard, cloud computing in industry has been introduced so that internet-based access to different computing resources such as software, platforms, and infrastructure provided to be facilitates. Adapting the method of cloud computing, Companies put faith and trust into a third party to handle the company’s electronic-based services, where security might poses as a concern. In conclusion, Companies can be then free from IT related matters and focus on the business productivity. Additionally, it has been proved that, in this case the benefits outweigh the security and privacy. Therefore, this essay recommends industries, particularly new SMEs, to utilize and benefit from Cloud Computing. However, this essay discussed only the cost and security factors more research should be done on evaluating other aspects that might concern industries such as Cloud Computing performance.
References
[1] CuriousRubik. (2014). "12 Statistics about Cloud Computing That Every Business Owner Should Know." CuriousRubik | in Cloud Computing, CRM, ERP, Industry Trends. Retrieved April, 19, 2015 from http://www.curiousrubik.com/industry-trends/12-statistics-cloud-computing-every-business-owner-know/
[2] Cloud Director. (2014). "Case Study - Pactum Asset Management." Retrieved March, 15, 2015 from Https://Www.Clouddirect.Net/Insights/Case-Studies/Case-Study-Pactum-Asset-Management/
[3] Giannakouris, K. and Smihily, M. (2014). "Cloud computing - statistics on the use by enterprises." Eurostat. Retrieved April, 19, 2015 http://ec.europa.eu/eurostat/statistics-explained/index.php/Cloud_computing_-_statistics_on_the_use_by_enterprises#Enterprises.E2.80.99_dependence_on_cloud_computing
[4] Georges cu, M. and Matey, M. (2013). "The Value of Cloud Computing In the Business Environment." USV Annals of Economics and Public Administration.
[5] Höfer, C.N. and Karagiannis, G. (2011). "Cloud Computing Services: Taxonomy and Comparison." SI: Future Net Service Models & Designs.
[6] Hoy, M. (2012). "Cloud Computing Basics for Librarians." Medical Reference Services Quarterly.
[7] ISO/IEC 27001:2005 n.d. Information Technology - Security Techniques - Information Security Management Systems - Requirements. The International Organization for Standardization. Retrieved February, 20, 2015 from http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=42103
[8] Keskin, T. and Taskin, N. (2014). "A Pricing Model for Cloud Computing Service." 47th Hawaii International Conference on System Science.
[9] Keshavarzi, A., Haghighat, A., & Bohlouli, M. (2013). "Research Challenges and Prospective Business Impacts of Cloud Computing: A Survey." The 7th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[10] Lenk, A., Klems, M., Nimis, J., Tai, S. & Sandholm, T. (2009). "What’s Inside the Cloud? An Architectural Map of the Cloud Landscape." CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[11] Mahajan, R. Singh, D. (2013). "Cloud Computing Issues." International Journal of Computers & Technology.
[12] Mcafee, A. (2011). "What Every CEO Needs To Know About The Cloud." Harvard Business Review.
[13] Mell, P. and Grace, T. (2011). "The NIST Definition of Cloud Computing (Draft)." NIST Special Publication 800-145.
[14] Rostov, S., Gusset, M. And Kostoska, M. (2012). "Cloud Computing Security in Business Information Systems." International Journal of Network Security & Its Applications.
[15] Singh, G., Sharma, A. and Lehal, M. (2011). "Security Apprehensions in Different Regions of Cloud Captious Grounds." International Journal of Network Security & Its Applications (IJNSA).
[16] Son, I., Lee, D., Lee, J. and Chang, Y. (2014). "Market perception on cloud computing initiatives in organizations: An extended resource-based view." The International Journal of Information Systems Theories and Applications.
[17] Zhao, F., Scheruhn, H.-J. & Von Rosing, M. (2014). "The Impact of Culture Differences on Cloud Computing Adoption." Human-Computer Interaction.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2019-02-02
Published 2018-11-30