SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290
3382
A Survey of Cloud Computing Approaches,
Business Opportunities, Risk Analysis and
Solving Approaches
Mohamed H. Farrag
Canadian International College, Cairo, Egypt
Email: Mohamed_farrag@cic-cairo.com
Mona M. Nasr
Faculty of Computers and Information, Helwan University, Cairo, Egypt.
Email: m.nasr@helwan.edu.eg
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and
bandwidth. This new technology raises some new opportunities in producing different business operations which
influence some new business benefits also some different risks issues are involved using cloud computing. This
paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud
computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is
targeted towards business and IT leaders considering a move to the cloud for some or all of their business
applications.
Keywords -Cloud computing, Cloud services, Data security, Deployment model, Risk analysis.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Sep 10, 2017 Date of Acceptance: Sep 28, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Managing IT risks remains a significant challenge for
most companies, yet most companies are ever more reliant
on IT. A typical company will have a vast number of
activities, policies, and processes that help manage and
mitigate digital risks. Cloud computing is not just another
technology evolution to which this lifecycle must react.
Rather, it brings a fundamental shift in how IT services are
procured and provided. This new technology has different
approaches, business opportunities and raise different risks
with different solving approach. This paper give a survey
of cloud computing approaches, business opportunities,
risk analysis and solving approach. This Paper is
organized as follows: section two demonstrates the cloud
computing background, section three discusses business
benefits of using cloud services. Section four highlights
Cloud Computing risk analysis. While solving
approachesin the fifth section, finally conclusion and
future work are in the last section.
II. BACKGROUND
Cloud computing has different definitions from different
perspectives; first it can be defined as “An internet-based
model of computing, where the shared information,
software and resources are provided to computers and
other devices upon demand”[1].Also is defined as “is
location agnostic and provides dynamically scalable and
virtualized resources as services over the Internet” [2]. It
uses virtualization, service-oriented software, and grid-
computing technologies allow accessing resources and
services offered by servers from different places. Also
defines as “a model for enabling ubiquitous, convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort
or service provider interaction” [3].
2.1. Essential Characteristics Of Cloud Computing
Cloud computing model is composed of five essential
characteristics [9]; First character is “on demand
capabilities” - in which a business will secure cloud-
hosting services through a cloud host provider which
could be your usual software vendor. Users canhave
access to your services and you have the power to change
cloud services through an online control panel by adding
or deleting users and change storage networks and
software as needed.
Second character is “Broad network access”-cloud
computing gives power to the user to usetheir
smartphones, tablets, laptops, and office computers
wherever they are located with a simple online access
point. It also includes private clouds that operate within a
company’s firewall, public clouds, or a hybrid
deployment.
Third character is “Resource pooling”-it gives users
ability to enter and use data within the business
management software hosted in the cloud at the same
time, from any location at any time for multiple business
offices and field service.
Fourth character is “Rapid elasticity”-cloud computing
is flexible and scalable to suit your immediate business
needs. User can quickly and easily add or remove users,
software features, and other resources.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290
3383
Private cloud
Community cloud
Public cloud
Hybrid cloud
Fifth character is “Measured service”-cloud computing
provider can measure storage levels, processing,
bandwidth, and the number of user accounts. The
resources can be monitored and controlled from both your
side and your cloud provider’s side.
Figure 1.Cloud Computing essential characteristics
2.2. Cloud Computing Service Models
Cloud computing has three service levels provided by
Cloud service provider (CSP) – “A third-party vendor
that provides application delivery, hosting, monitoring,
and other services through cloud computing” [9]. The
current major cloud service providers are Microsoft,
Hewlett Packard, IBM, Salesforce, Amazon and Google.
First isSoftware as a Service (SaaS): “Applications
organizations use to perform specific functions or
processes (e.g., email, customer management systems,
enterprise resource planning systems, and
spreadsheets)[9].
Second is Platform as a Service (PaaS) “Development
environments for building and deployingapplications”[9].
These environments provide its customers with proprietary
tools that facilitate the creation of application systems and
programs that operate on the CSP’s hosted infrastructure.
The third is Infrastructure as a Service (IaaS) “entire
virtual data center of resources” [9] for example storage
resources,network and computing resources.
2.3. Deployment Models
Cloud computing has different four deployments model
first is Private cloud- it provisioned for single
organization, it may exist on or off site and may be
managed by organization or outsourced. Second
deployment model is Community cloud - It provisioned
for exclusive use by a specific community it also may be
managed by one or more of the community organization
and may be managed by community organization or
outsourced. Third deployment model is Public cloud - It
provisioned for general public, it exists on the premise of
the cloud provider and may be owned, managed &
operated by a business, academic or government
organization or a combination. while the fourth model is
Hybrid cloud It is a combination of two or more distinct
cloud infrastructures and combines characteristics of
private, public & community clouds [3].
Figure 2.Cloud computing deployment models
III. BUSINESS BENEFITS OF USING CLOUD
SERVICES
Cloud Services Support Business Process and it
contributes business by different benefits, cloud
computing aids for:
3.1. Cost Savings
Pay for only the computing resources they use rather than
purchasing or leasing equipment that may not be fully
utilized at all times [9]. Cloud computing gives full
support to the equipment, personnel needs, infrastructure,
space & utilities also reduced obsolescence and reduction
of capital expenditures, reduced implementation costs [3].
It also reduced setup costs can be considered as a major
advantage for cloud computing.
3.2. Speed Of Deployment
Can meet the need for computing resources much more
quickly than most internal information technology
functions [9]. By support rapid deployment and Time to
fulfill request.
3.3. Scalability And Better Alignment Of Technology
Cloud computing services give the user power to Scale up
and down its capacity. Also Ability to add or reduce
capacity and support On-demand provisioning.
3.4. Decreased effort in managing technology
Decrease effort by reduced management effort,
maintenance & support, it also simplified entry into or
exiting from and business initiatives increased access to
technical expertise
3.5. Environmental benefits
Environmental benefits like Less overall power
consumption, Carbon emissions, physical land use,
Disaster recovery and Business expansion (across town or
across the globe). Cloud computing services also make the
Backup recovery process is very easy in Infrastructure as a
Service (IaaS) Providers.
IV. CLOUD COMPUTING RISK ANALYSIS
Cloud computing has different five sources of risk
representing by Users, Enterprise, Network Provider,
Cloud Provider and Environment.
Three factors are needed to determine if the risk is high or
low, first one is the likelihood of an event, second factor is
On-demand
capabilities
Broad network
access
Resource
Pooling
Rapid elasticity
Measured
service
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290
3384
the size of impact if that event happens. While the third
factor is the ease by which such an event can be mitigated
[8].
In this sections we discuss the different risks for cloud
computing.
4.1. Security Risks
The state of preventing a system from vulnerable attacks is
considered as the system’s security"[1]. Security risks
apply for four categories covering physical access to
infrastructure, systems & data, Physical location of
systems, data, Logical access to the network, OS,
applications & databases and network & data segregation
Seven important arguments identity factors for risk in a
cloud computing model (3)
4.1.1. Access control
“Organization allows only the authenticated users to
access the data”[1]. The possibility of risk is more in case
of sensitive data."
4.1.2. Availability
“Needs of the customers should be attended on time” [1]
availability represented in some main arguments as cloud
provider service interruptions, Data location/availability
for restoration, network/connectivity interruptions, failure
of the provider to adhere to SLAs and Service provider
disaster recovery [3]
4.1.3. Network Load
"The computers and the servers crash due to high volume
motion of data between the disks" [1], cloud network load
can also prove to be detrimental to performance of the
cloud computing system. Flexibility and scalability should
be considered pivotal when designing and implementing a
cloud infrastructure. The durability and the efficiency of
the system, implementation of the application
programming interface (API).
4.1.4. Integrity
In a cloud computing model data validity, quality and
security affect’s the system’s operations and desired
outcomes. The program efficiency and performance are
addressed by the integrity of adherence to change
management, procedures, incident management, and
failure of the provider to adhere to SLAs, timeliness,
accuracy, authorization and completeness [3].
4.1.5. Data Security
Data has “to be appropriately secured from the outside
world” [3], Trust is an important factor which is missing in
the present models as the service providers use diversified
mechanisms.
4.1.6. Data Location
Service providers are not concentrated in a single location
but are distributed throughout the globe. This could
hinder investigations within the cloud and is difficult to
access the activity of the cloud, where the data is not
stored in a particular data center but in a distributed
format. [1]
4.1.7. Data Segregation
Data segregation is represented in many ways first the
available data is not correctly sent to the customer at all
times of need. Second when recovering the data there
could be instances of replication of data in multiple sites.
Third the restoration of data must be quick and complete
to avoid further risks.
The data can be manipulated, deleted or destroyed as a
result of the attack. Such attacks can have serious
implications to the end users. To prevent these attacks we
need the Encrypting to ensure that the data is not hacked
or attacked. Different types of attacks samples as
comingling of data & other assets and unauthorized access
to sensitive or trade secret information [3]
4.2. Privacy Risks
Privacy determines if the whether the data is disclosed to
authorize recipients only. Another privacy issue in the
domestic cloud structure is related to the rights possessed
by the data owners to access their data.Two distinct cloud
structures first structure is domestic clouds and trans-
border clouds.In a domestic cloud structure, the complete
cloud is physically located within the
The above privacy issues can also be extended to all other
cloud computing environments in general [1]. As
International laws affecting service provider location,
regulatory compliance/legal liability and breach &
incident management [3].
4.3. Consumer Risks
“The use of cloud computing services can cause risks to
consumers” [1], when the provider makes changes to the
terms on which the product is provided and the consumers
remain unaware about it. These types of risks may be
avoided by universal Terms of Service, Additional Terms,
Program Policies, Privacy Policy and Copy Right Notices.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290
3385
Figure3.Cloud Computing Risk analysis
V. SOLVING APPROACHES
Some important arguments play an important role for
eliminating different cloud computing risks first is Risk
Response Once risks have been identified and assessed in
the context of organizational objectives relative to cloud
computing, management needs to determine its risk
response. There are four types of risk responses:
Avoidancenot moving to the cloud or considering only
private cloud types of solutions as viable options,
ReductionImplementing control activities and taking
actions to reduce risk likelihood, risk impact, or both,
SharingReducing risk likelihood or risk impact by
transferring or otherwise sharing a portion of the risk and
AcceptanceTaking no action to affect risk likelihood or
impact. For example, when an organization does not have
direct ability to manage the controls of its CSP, the
organization is accepting an increased level of inherent
risk [9].
Users need to ensure that all the security risks are
eliminated by having various security mechanisms in place
to estimate data security risk before placing data in the
cloud and assure customers that their data is safe with the
service various providers within the cloud network
Some good mechanisms help to increase and identify the
risk response, first are Data-flow analysis tounderstand
the information life cycle by develop data-flow schematics
and develop policies to periodically review & update data-
flow documentation [3].
Second is Managing risks associated with unique cloud
computing componentscan be reached by Maintain
application & technology layer inventory when develop
inventory in conjunction with the data-flow
analysisanddevelop controls to address risks associated
with each layer of the cloud “stack” [3].
Third is Audit & compliance is an understanding cloud
risks & regulatory implications by Leverage existing risk
assessment tools & control frameworks, Assessing control
maturity and vendor management [3].
When considering risk mitigation strategies, the options
are to avoid - prevent it from happening, Reduce -
actively plan and manage to limit occurrence and severity
or to outsource - hand over to other parties such as the
provider. Also to accept - because the cost of mitigation
outweighs the risk itself or simply because you cannot
control it [8].
Many proper risks analysis approaches for cloud
computing helping to identify and eliminate the different
risks as:
5.1. Secure Socket Layer (SSL)
The Secure Sockets Layer (SSL) is "a commonly-used
protocol for managing the security of a message
transmission on the Internet". SSL is a secure protocol
developed for sending information securely over the
Internet. Many websites use SSL for secure areas of their
sites, such as user account pages and online checkout.
Usually, when you are asked to "log in" on a website, the
resulting page is secured by SSL.
5.2. Digital signatures
"Electronic signature that can be used to authenticate the
identity of the sender of a message or the signer of a
document, and possibly to ensure that the original content
of the message or document that has been sent is
unchanged". Digital signatures are easily transportable,
cannot be imitated by someone else, and can be
automatically time-stamped. The ability to ensure that the
original signed message arrived means that the sender
Security Risks
•Access control
•Availability
•Cloud provider service interruptions
•Data location/availability for restoration
•Network/connectivity interruptions
•Failure of the provider to adhere to SLAs
•Service provider disaster recovery
•Network Load
•Integrity
•Adherence to change management
•procedures
•Incident management
•Failure of the provider to adhere to SLAs
•Timeliness
•Accuracy
•Authorization
•Completeness
•Data Security
•Data Location
•Data Segregation
Privacy Risks
•International laws affecting service provider location
•Regulatory compliance/legal liability
•Breach & incident management
Consumer Risks
•Universal Terms of Service
•Additional Terms
•Program Policies
•Privacy Policy
•Copy Right Notices
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290
3386
cannot easily repudiate it later. A digital signature can be
used with any kind of message, whether it is encrypted or
not, simply so that the receiver can be sure of the sender's
identity and that the message arrived intact. A digital
certificate contains the digital signature of the certificate-
issuing authority so that anyone can verify that the
certificate is real. Signatures are commonly used to
authenticate documents. When you sign a physical
document, you are authenticating its contents. Similarly,
digital signatures are used to authenticate the contents of
electronic documents. They can be used with PDF, e-mail
messages, and word processing documents.
5.3. Authentication Protocols
The protocol by which an entity on a network proves its
identity to a remote entity. Typically, identity is proved
with the use of a secret key, such as a password, or with a
stronger key, such as the key on a smart card. Some
authentication protocols also implement mechanisms to
share keys between client and server to provide message
integrity or privacy.
VI. TRUST MATRIX
Trust matrix use three variables, ‘Data cost’ is considered
as one of the variables because the users can assign a cost
to the data based on the data’s criticality. ‘Provider’s
History’ is considered as another parameter since it
includes the record of the past services provided by the
provider to the customers. The variable parameter ‘Data
Location’ is used to provide details about the data located
in sensitive sites [1].
 X axis represents the data cost.
 Y axis represents the service provider’s history.
 Z axis represents the data location.
The trust matrix helps to show areas of Low Risk/High
Trust Zone and High Risk/ Low Trust Zone [1].
In all ways you need to continue monitor the effectiveness
of its ERM program to verify that the program adequately
addresses the relevant risks and facilitates achieving the
organization’s objectives.
VII. CONCLUSION AND FUTURE WORK
This study highlights different cloud computing
approaches, and its business benefits and a list of security
risks and some solving approaches for these risks. The
development of cloud computing may lead to significant
changes in the way companies consume IT, moving from
managing large technology stacks to purchasing business-
level services. Companies will lose control of the way in
which their services are run, needing instead to choose
between the terms and conditions offered by different
service providers. That make as important need to have a
better understanding of risk and how it is mitigated. Being
aware of the risks and other issues related to cloud
computing, executives are more likely to achieve their
organization’s objectives.
Future work is to give more researches for cloud
computing risk analysis to develop a cloud management
frameworkwill be based on different business-driven
policies that help organization to identify and eliminate the
risk cloud computing factors to improve its reliability and
to aid different organization to achieve its goals.
REFERENCES
[1] Chandran S. and Angepat M., “Cloud Computing:
Analyzing the risks involved in cloud computing
environments,” in Proceedings of Natural Sciences
and Engineering, Sweden, pp. 2-4, 2010.
[2] Morin, J. H., Gateau, B.: Towards Cloud Computing
SLA Risk Management: Issues and
Challenges. In 45th Hawaii International Conference
on System Sciences, 2012
[3] Seth, F., Matt, L., Rod, W., "Risk Management &
Cloud Security Setting & Enforcing Policy", BKD,
LLP, accounting today.
[4] Turner, S. "Benefits and risks of cloud
computing.‫‏‬",Journal of Technology Research, 2012
[5] Baldwin, A., Pym, D., & Shiu, S. Enterprise
information risk management: Dealing with cloud
computing. In Privacy and Security for Cloud
Computing (pp. 257-291). Springer London.(2013).
‫‏‬
[6] Stokes, D. (2013). Compliant Cloud Computing–
Managing the Risks. PHARMACEUTICAL
ENGINEERING.‫‏‬
[7] Fitó, J. O., & Guitart Fernández, J. (2012).
Introducing risk management into cloud computing.‫‏‬
[8] Schotman, R., Shahim, A. & Mitwalli, AH,"Cloud
Risks - Are we looking in the right direction?", (May
2013).
[9] C. Horwath. “Enterprise Risk Management for Cloud
Computing,” COSO, 2012, June.
[10] Catteddu, D. Cloud Computing: benefits, risks and
recommendations for information security (pp. 17-
17). Springer Berlin Heidelberg.‫‏‬(2010).
[11] Chou, Y., & Oetting, J. (2011). Risk assessment for
cloud-based IT systems. International Journal of Grid
and High Performance Computing (IJGHPC), 3(2), 1-
13.‫‏‬

More Related Content

What's hot

Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 

What's hot (18)

H046053944
H046053944H046053944
H046053944
 
D045031724
D045031724D045031724
D045031724
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 

Similar to A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis and Solving Approaches

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxdaniahendric
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
A Review Paper On Cloud Computing Amp Security Issue
A Review Paper On Cloud Computing  Amp  Security IssueA Review Paper On Cloud Computing  Amp  Security Issue
A Review Paper On Cloud Computing Amp Security IssueWhitney Anderson
 
Job Placement and Staffing VA
Job Placement and Staffing VAJob Placement and Staffing VA
Job Placement and Staffing VAIntellectualpoint
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 

Similar to A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis and Solving Approaches (20)

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
A Review Paper On Cloud Computing Amp Security Issue
A Review Paper On Cloud Computing  Amp  Security IssueA Review Paper On Cloud Computing  Amp  Security Issue
A Review Paper On Cloud Computing Amp Security Issue
 
Job Placement and Staffing VA
Job Placement and Staffing VAJob Placement and Staffing VA
Job Placement and Staffing VA
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis and Solving Approaches

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290 3382 A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis and Solving Approaches Mohamed H. Farrag Canadian International College, Cairo, Egypt Email: Mohamed_farrag@cic-cairo.com Mona M. Nasr Faculty of Computers and Information, Helwan University, Cairo, Egypt. Email: m.nasr@helwan.edu.eg -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- In recent years, cloud computing become mainstream technology in IT industry offering new trends to software, platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications. Keywords -Cloud computing, Cloud services, Data security, Deployment model, Risk analysis. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Sep 10, 2017 Date of Acceptance: Sep 28, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Managing IT risks remains a significant challenge for most companies, yet most companies are ever more reliant on IT. A typical company will have a vast number of activities, policies, and processes that help manage and mitigate digital risks. Cloud computing is not just another technology evolution to which this lifecycle must react. Rather, it brings a fundamental shift in how IT services are procured and provided. This new technology has different approaches, business opportunities and raise different risks with different solving approach. This paper give a survey of cloud computing approaches, business opportunities, risk analysis and solving approach. This Paper is organized as follows: section two demonstrates the cloud computing background, section three discusses business benefits of using cloud services. Section four highlights Cloud Computing risk analysis. While solving approachesin the fifth section, finally conclusion and future work are in the last section. II. BACKGROUND Cloud computing has different definitions from different perspectives; first it can be defined as “An internet-based model of computing, where the shared information, software and resources are provided to computers and other devices upon demand”[1].Also is defined as “is location agnostic and provides dynamically scalable and virtualized resources as services over the Internet” [2]. It uses virtualization, service-oriented software, and grid- computing technologies allow accessing resources and services offered by servers from different places. Also defines as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [3]. 2.1. Essential Characteristics Of Cloud Computing Cloud computing model is composed of five essential characteristics [9]; First character is “on demand capabilities” - in which a business will secure cloud- hosting services through a cloud host provider which could be your usual software vendor. Users canhave access to your services and you have the power to change cloud services through an online control panel by adding or deleting users and change storage networks and software as needed. Second character is “Broad network access”-cloud computing gives power to the user to usetheir smartphones, tablets, laptops, and office computers wherever they are located with a simple online access point. It also includes private clouds that operate within a company’s firewall, public clouds, or a hybrid deployment. Third character is “Resource pooling”-it gives users ability to enter and use data within the business management software hosted in the cloud at the same time, from any location at any time for multiple business offices and field service. Fourth character is “Rapid elasticity”-cloud computing is flexible and scalable to suit your immediate business needs. User can quickly and easily add or remove users, software features, and other resources.
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290 3383 Private cloud Community cloud Public cloud Hybrid cloud Fifth character is “Measured service”-cloud computing provider can measure storage levels, processing, bandwidth, and the number of user accounts. The resources can be monitored and controlled from both your side and your cloud provider’s side. Figure 1.Cloud Computing essential characteristics 2.2. Cloud Computing Service Models Cloud computing has three service levels provided by Cloud service provider (CSP) – “A third-party vendor that provides application delivery, hosting, monitoring, and other services through cloud computing” [9]. The current major cloud service providers are Microsoft, Hewlett Packard, IBM, Salesforce, Amazon and Google. First isSoftware as a Service (SaaS): “Applications organizations use to perform specific functions or processes (e.g., email, customer management systems, enterprise resource planning systems, and spreadsheets)[9]. Second is Platform as a Service (PaaS) “Development environments for building and deployingapplications”[9]. These environments provide its customers with proprietary tools that facilitate the creation of application systems and programs that operate on the CSP’s hosted infrastructure. The third is Infrastructure as a Service (IaaS) “entire virtual data center of resources” [9] for example storage resources,network and computing resources. 2.3. Deployment Models Cloud computing has different four deployments model first is Private cloud- it provisioned for single organization, it may exist on or off site and may be managed by organization or outsourced. Second deployment model is Community cloud - It provisioned for exclusive use by a specific community it also may be managed by one or more of the community organization and may be managed by community organization or outsourced. Third deployment model is Public cloud - It provisioned for general public, it exists on the premise of the cloud provider and may be owned, managed & operated by a business, academic or government organization or a combination. while the fourth model is Hybrid cloud It is a combination of two or more distinct cloud infrastructures and combines characteristics of private, public & community clouds [3]. Figure 2.Cloud computing deployment models III. BUSINESS BENEFITS OF USING CLOUD SERVICES Cloud Services Support Business Process and it contributes business by different benefits, cloud computing aids for: 3.1. Cost Savings Pay for only the computing resources they use rather than purchasing or leasing equipment that may not be fully utilized at all times [9]. Cloud computing gives full support to the equipment, personnel needs, infrastructure, space & utilities also reduced obsolescence and reduction of capital expenditures, reduced implementation costs [3]. It also reduced setup costs can be considered as a major advantage for cloud computing. 3.2. Speed Of Deployment Can meet the need for computing resources much more quickly than most internal information technology functions [9]. By support rapid deployment and Time to fulfill request. 3.3. Scalability And Better Alignment Of Technology Cloud computing services give the user power to Scale up and down its capacity. Also Ability to add or reduce capacity and support On-demand provisioning. 3.4. Decreased effort in managing technology Decrease effort by reduced management effort, maintenance & support, it also simplified entry into or exiting from and business initiatives increased access to technical expertise 3.5. Environmental benefits Environmental benefits like Less overall power consumption, Carbon emissions, physical land use, Disaster recovery and Business expansion (across town or across the globe). Cloud computing services also make the Backup recovery process is very easy in Infrastructure as a Service (IaaS) Providers. IV. CLOUD COMPUTING RISK ANALYSIS Cloud computing has different five sources of risk representing by Users, Enterprise, Network Provider, Cloud Provider and Environment. Three factors are needed to determine if the risk is high or low, first one is the likelihood of an event, second factor is On-demand capabilities Broad network access Resource Pooling Rapid elasticity Measured service
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290 3384 the size of impact if that event happens. While the third factor is the ease by which such an event can be mitigated [8]. In this sections we discuss the different risks for cloud computing. 4.1. Security Risks The state of preventing a system from vulnerable attacks is considered as the system’s security"[1]. Security risks apply for four categories covering physical access to infrastructure, systems & data, Physical location of systems, data, Logical access to the network, OS, applications & databases and network & data segregation Seven important arguments identity factors for risk in a cloud computing model (3) 4.1.1. Access control “Organization allows only the authenticated users to access the data”[1]. The possibility of risk is more in case of sensitive data." 4.1.2. Availability “Needs of the customers should be attended on time” [1] availability represented in some main arguments as cloud provider service interruptions, Data location/availability for restoration, network/connectivity interruptions, failure of the provider to adhere to SLAs and Service provider disaster recovery [3] 4.1.3. Network Load "The computers and the servers crash due to high volume motion of data between the disks" [1], cloud network load can also prove to be detrimental to performance of the cloud computing system. Flexibility and scalability should be considered pivotal when designing and implementing a cloud infrastructure. The durability and the efficiency of the system, implementation of the application programming interface (API). 4.1.4. Integrity In a cloud computing model data validity, quality and security affect’s the system’s operations and desired outcomes. The program efficiency and performance are addressed by the integrity of adherence to change management, procedures, incident management, and failure of the provider to adhere to SLAs, timeliness, accuracy, authorization and completeness [3]. 4.1.5. Data Security Data has “to be appropriately secured from the outside world” [3], Trust is an important factor which is missing in the present models as the service providers use diversified mechanisms. 4.1.6. Data Location Service providers are not concentrated in a single location but are distributed throughout the globe. This could hinder investigations within the cloud and is difficult to access the activity of the cloud, where the data is not stored in a particular data center but in a distributed format. [1] 4.1.7. Data Segregation Data segregation is represented in many ways first the available data is not correctly sent to the customer at all times of need. Second when recovering the data there could be instances of replication of data in multiple sites. Third the restoration of data must be quick and complete to avoid further risks. The data can be manipulated, deleted or destroyed as a result of the attack. Such attacks can have serious implications to the end users. To prevent these attacks we need the Encrypting to ensure that the data is not hacked or attacked. Different types of attacks samples as comingling of data & other assets and unauthorized access to sensitive or trade secret information [3] 4.2. Privacy Risks Privacy determines if the whether the data is disclosed to authorize recipients only. Another privacy issue in the domestic cloud structure is related to the rights possessed by the data owners to access their data.Two distinct cloud structures first structure is domestic clouds and trans- border clouds.In a domestic cloud structure, the complete cloud is physically located within the The above privacy issues can also be extended to all other cloud computing environments in general [1]. As International laws affecting service provider location, regulatory compliance/legal liability and breach & incident management [3]. 4.3. Consumer Risks “The use of cloud computing services can cause risks to consumers” [1], when the provider makes changes to the terms on which the product is provided and the consumers remain unaware about it. These types of risks may be avoided by universal Terms of Service, Additional Terms, Program Policies, Privacy Policy and Copy Right Notices.
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290 3385 Figure3.Cloud Computing Risk analysis V. SOLVING APPROACHES Some important arguments play an important role for eliminating different cloud computing risks first is Risk Response Once risks have been identified and assessed in the context of organizational objectives relative to cloud computing, management needs to determine its risk response. There are four types of risk responses: Avoidancenot moving to the cloud or considering only private cloud types of solutions as viable options, ReductionImplementing control activities and taking actions to reduce risk likelihood, risk impact, or both, SharingReducing risk likelihood or risk impact by transferring or otherwise sharing a portion of the risk and AcceptanceTaking no action to affect risk likelihood or impact. For example, when an organization does not have direct ability to manage the controls of its CSP, the organization is accepting an increased level of inherent risk [9]. Users need to ensure that all the security risks are eliminated by having various security mechanisms in place to estimate data security risk before placing data in the cloud and assure customers that their data is safe with the service various providers within the cloud network Some good mechanisms help to increase and identify the risk response, first are Data-flow analysis tounderstand the information life cycle by develop data-flow schematics and develop policies to periodically review & update data- flow documentation [3]. Second is Managing risks associated with unique cloud computing componentscan be reached by Maintain application & technology layer inventory when develop inventory in conjunction with the data-flow analysisanddevelop controls to address risks associated with each layer of the cloud “stack” [3]. Third is Audit & compliance is an understanding cloud risks & regulatory implications by Leverage existing risk assessment tools & control frameworks, Assessing control maturity and vendor management [3]. When considering risk mitigation strategies, the options are to avoid - prevent it from happening, Reduce - actively plan and manage to limit occurrence and severity or to outsource - hand over to other parties such as the provider. Also to accept - because the cost of mitigation outweighs the risk itself or simply because you cannot control it [8]. Many proper risks analysis approaches for cloud computing helping to identify and eliminate the different risks as: 5.1. Secure Socket Layer (SSL) The Secure Sockets Layer (SSL) is "a commonly-used protocol for managing the security of a message transmission on the Internet". SSL is a secure protocol developed for sending information securely over the Internet. Many websites use SSL for secure areas of their sites, such as user account pages and online checkout. Usually, when you are asked to "log in" on a website, the resulting page is secured by SSL. 5.2. Digital signatures "Electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged". Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender Security Risks •Access control •Availability •Cloud provider service interruptions •Data location/availability for restoration •Network/connectivity interruptions •Failure of the provider to adhere to SLAs •Service provider disaster recovery •Network Load •Integrity •Adherence to change management •procedures •Incident management •Failure of the provider to adhere to SLAs •Timeliness •Accuracy •Authorization •Completeness •Data Security •Data Location •Data Segregation Privacy Risks •International laws affecting service provider location •Regulatory compliance/legal liability •Breach & incident management Consumer Risks •Universal Terms of Service •Additional Terms •Program Policies •Privacy Policy •Copy Right Notices
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3382-3386 (2017) ISSN: 0975-0290 3386 cannot easily repudiate it later. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate- issuing authority so that anyone can verify that the certificate is real. Signatures are commonly used to authenticate documents. When you sign a physical document, you are authenticating its contents. Similarly, digital signatures are used to authenticate the contents of electronic documents. They can be used with PDF, e-mail messages, and word processing documents. 5.3. Authentication Protocols The protocol by which an entity on a network proves its identity to a remote entity. Typically, identity is proved with the use of a secret key, such as a password, or with a stronger key, such as the key on a smart card. Some authentication protocols also implement mechanisms to share keys between client and server to provide message integrity or privacy. VI. TRUST MATRIX Trust matrix use three variables, ‘Data cost’ is considered as one of the variables because the users can assign a cost to the data based on the data’s criticality. ‘Provider’s History’ is considered as another parameter since it includes the record of the past services provided by the provider to the customers. The variable parameter ‘Data Location’ is used to provide details about the data located in sensitive sites [1].  X axis represents the data cost.  Y axis represents the service provider’s history.  Z axis represents the data location. The trust matrix helps to show areas of Low Risk/High Trust Zone and High Risk/ Low Trust Zone [1]. In all ways you need to continue monitor the effectiveness of its ERM program to verify that the program adequately addresses the relevant risks and facilitates achieving the organization’s objectives. VII. CONCLUSION AND FUTURE WORK This study highlights different cloud computing approaches, and its business benefits and a list of security risks and some solving approaches for these risks. The development of cloud computing may lead to significant changes in the way companies consume IT, moving from managing large technology stacks to purchasing business- level services. Companies will lose control of the way in which their services are run, needing instead to choose between the terms and conditions offered by different service providers. That make as important need to have a better understanding of risk and how it is mitigated. Being aware of the risks and other issues related to cloud computing, executives are more likely to achieve their organization’s objectives. Future work is to give more researches for cloud computing risk analysis to develop a cloud management frameworkwill be based on different business-driven policies that help organization to identify and eliminate the risk cloud computing factors to improve its reliability and to aid different organization to achieve its goals. REFERENCES [1] Chandran S. and Angepat M., “Cloud Computing: Analyzing the risks involved in cloud computing environments,” in Proceedings of Natural Sciences and Engineering, Sweden, pp. 2-4, 2010. [2] Morin, J. H., Gateau, B.: Towards Cloud Computing SLA Risk Management: Issues and Challenges. In 45th Hawaii International Conference on System Sciences, 2012 [3] Seth, F., Matt, L., Rod, W., "Risk Management & Cloud Security Setting & Enforcing Policy", BKD, LLP, accounting today. [4] Turner, S. "Benefits and risks of cloud computing.‫‏‬",Journal of Technology Research, 2012 [5] Baldwin, A., Pym, D., & Shiu, S. Enterprise information risk management: Dealing with cloud computing. In Privacy and Security for Cloud Computing (pp. 257-291). Springer London.(2013). ‫‏‬ [6] Stokes, D. (2013). Compliant Cloud Computing– Managing the Risks. PHARMACEUTICAL ENGINEERING.‫‏‬ [7] Fitó, J. O., & Guitart Fernández, J. (2012). Introducing risk management into cloud computing.‫‏‬ [8] Schotman, R., Shahim, A. & Mitwalli, AH,"Cloud Risks - Are we looking in the right direction?", (May 2013). [9] C. Horwath. “Enterprise Risk Management for Cloud Computing,” COSO, 2012, June. [10] Catteddu, D. Cloud Computing: benefits, risks and recommendations for information security (pp. 17- 17). Springer Berlin Heidelberg.‫‏‬(2010). [11] Chou, Y., & Oetting, J. (2011). Risk assessment for cloud-based IT systems. International Journal of Grid and High Performance Computing (IJGHPC), 3(2), 1- 13.‫‏‬