Cloud Computing in Industries: An Evaluation Regarding Cost and Security

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In this study, the companies which their data being handled by external parties has investigated and the parameter of cost as well as security have been considered. Moreover, an over view has been presented as to analysing the cost reduction and security of data. In this regard, cloud computing in industry has been introduced so that internet-based access to different computing resources such as software, platforms, and infrastructure provided to be facilitates. Adapting the method of cloud computing, Companies put faith and trust into a third party to handle the company’s electronic-based services, where security might poses as a concern.  In conclusion, Companies can be then free from IT related matters and focus on the business productivity. Additionally,  it has been proved that, in this case the benefits outweigh the security and privacy. Therefore, this essay recommends industries, particularly new SMEs, to utilize and benefit from Cloud Computing. However, this essay discussed only the cost and security factors more research should be done on evaluating other aspects that might concern industries such as Cloud Computing performance.

     


  • Keywords


    Cloud Computing; Security in data; the cost reduction; IT related matters

  • References


      [1] CuriousRubik. (2014). "12 Statistics about Cloud Computing That Every Business Owner Should Know." CuriousRubik | in Cloud Computing, CRM, ERP, Industry Trends. Retrieved April, 19, 2015 from http://www.curiousrubik.com/industry-trends/12-statistics-cloud-computing-every-business-owner-know/

      [2] Cloud Director. (2014). "Case Study - Pactum Asset Management." Retrieved March, 15, 2015 from Https://Www.Clouddirect.Net/Insights/Case-Studies/Case-Study-Pactum-Asset-Management/

      [3] Giannakouris, K. and Smihily, M. (2014). "Cloud computing - statistics on the use by enterprises." Eurostat. Retrieved April, 19, 2015 http://ec.europa.eu/eurostat/statistics-explained/index.php/Cloud_computing_-_statistics_on_the_use_by_enterprises#Enterprises.E2.80.99_dependence_on_cloud_computing

      [4] Georges cu, M. and Matey, M. (2013). "The Value of Cloud Computing In the Business Environment." USV Annals of Economics and Public Administration.

      [5] Höfer, C.N. and Karagiannis, G. (2011). "Cloud Computing Services: Taxonomy and Comparison." SI: Future Net Service Models & Designs.

      [6] Hoy, M. (2012). "Cloud Computing Basics for Librarians." Medical Reference Services Quarterly.

      [7] ISO/IEC 27001:2005 n.d. Information Technology - Security Techniques - Information Security Management Systems - Requirements. The International Organization for Standardization. Retrieved February, 20, 2015 from http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=42103

      [8] Keskin, T. and Taskin, N. (2014). "A Pricing Model for Cloud Computing Service." 47th Hawaii International Conference on System Science.

      [9] Keshavarzi, A., Haghighat, A., & Bohlouli, M. (2013). "Research Challenges and Prospective Business Impacts of Cloud Computing: A Survey." The 7th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

      [10] Lenk, A., Klems, M., Nimis, J., Tai, S. & Sandholm, T. (2009). "What’s Inside the Cloud? An Architectural Map of the Cloud Landscape." CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

      [11] Mahajan, R. Singh, D. (2013). "Cloud Computing Issues." International Journal of Computers & Technology.

      [12] Mcafee, A. (2011). "What Every CEO Needs To Know About The Cloud." Harvard Business Review.

      [13] Mell, P. and Grace, T. (2011). "The NIST Definition of Cloud Computing (Draft)." NIST Special Publication 800-145.

      [14] Rostov, S., Gusset, M. And Kostoska, M. (2012). "Cloud Computing Security in Business Information Systems." International Journal of Network Security & Its Applications.

      [15] Singh, G., Sharma, A. and Lehal, M. (2011). "Security Apprehensions in Different Regions of Cloud Captious Grounds." International Journal of Network Security & Its Applications (IJNSA).

      [16] Son, I., Lee, D., Lee, J. and Chang, Y. (2014). "Market perception on cloud computing initiatives in organizations: An extended resource-based view." The International Journal of Information Systems Theories and Applications.

      [17] Zhao, F., Scheruhn, H.-J. & Von Rosing, M. (2014). "The Impact of Culture Differences on Cloud Computing Adoption." Human-Computer Interaction.


 

View

Download

Article ID: 27012
 
DOI: 10.14419/ijet.v7i4.25.27012




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.