Companies are doing marketing or branding of their products and services using digital media. Life is becoming so smooth and transparent by the sharing of information through the digital mediums. Whether it is a small or a big company, everybody is running for the competition, because they want to lock their customers. In this paper current market scenario is included with respect to cloud computing solution. Data access at present has limitations. Government data which is publicly accessible should have some policy. Cloud Computing is likely to be one of the key pillars on which various e-Governance services would ride. Digital India is a program to prepare India for a knowledge future. Digital India should have policy wherein the Government will be providing information and services to internal and external stakeholders. Cloud computing has become the most stimulating development and delivery alternative in the new millennium. A lot of departments are showing interest to adopt Cloud technology, but awareness on Cloud security needs to be increased. The adoption of Cloud is helping organizations innovate, do things faster, become more agile and enhance their revenue stream. In this paper, the information regarding cloud services and models are provided. Also, the main focus is on what government can do with the help of it for Digital India mission?
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
This document discusses cloud based marketing systems for small and medium enterprises (SMEs) in India. It begins with an introduction and overview of SME classifications in India. The rest of the document is divided into various sections that discuss: the benefits of cloud computing for SMEs; literature review on cloud adoption among SMEs; the research methodology used; data analysis and interpretations from surveys of SME personnel; findings on awareness and perceptions of cloud and marketing cloud tools; and recommendations. Factor analysis was used to identify key drivers and concerns regarding cloud adoption. Most SMEs were found to be aware of cloud computing but less aware of marketing clouds specifically.
IRJET- Cloud Computing Adoption and its Impact in IndiaIRJET Journal
This document discusses cloud computing adoption and its impact in India. It begins with an introduction to cloud computing and how it provides on-demand access to computing resources over the Internet. It then discusses some of the key challenges to cloud adoption in India, such as data security and lack of internet connectivity in rural areas. However, it notes that cloud adoption is growing and forecasted to increase significantly by 2022 across various sectors in India like government, healthcare, education, and small and medium enterprises. The impacts of cloud computing discussed include increased mobility and collaboration, reduced costs, improved productivity, and environmental benefits from more efficient data centers. The document concludes that cloud computing frees companies from expensive infrastructure costs while providing opportunities for Indian markets.
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
Cloud Computing: Applications and Benefits for Small Businesses
Abstract
Cloud computing is one of the most talked about topics in the world of technology and entrepreneurship. Until now it has never been so easy for people, especially small business owner’s, to have the tools and resources readily available just one click away and at the fraction of the cost of the typical investment a few years back. Cloud computing offers cost-effective solutions at various levels that can be customize to meet the needs of anyone. Cloud computing can be thought of as a new found technology and this paper defines the concept of the cloud and provides a brief background of where most business are in regards to the use of this technology. This is then continued by describing the types of cloud currently available and potential use. The paper then presents a short but important section of cloud security issues and challenges. Finally, the paper discusses the benefits each of the different levels of cloud computing can provide small business.
Introduction
The use of cloud computing has grown exponentially in the last decade, according to Weins (2015) eight-four percent of enterprises that make use of such services in one way or another. Could computing by definition is internet-based computing, where by shared resources, software and information are provided to the end user as metered services much like a utility does(Bradley, 2014). For businesses in many cases could computing is use for IT solution purposes as it can provide IT-related capabilities as a service using internet technologies.
With the fast pace of today’s market businesses need to provide fast and reliable services to their customers in order to remain competitive. The concept of could computing is not something new as it uses existing technology and processes; however it can be consider new in sense that using these technologies has revolutionized the manner in which we host and cater services to customers. Startup companies and small businesses can take advantage of could computing to reduce spending on IT, be more adept to changes in the market, change scale and lower risk and cost.
Given the structural complexity of larger organization, Alijani (2014) states that it is essential for cloud computing to deliver rear value rather than serve as a platform for simple task. The need to deliver rear value is just as important for small businesses. For small businesses value is important but it’s their customer relationship and public image, flexibility and continuity. As such small business owners need to consider the benefits, drawback s and the effect of cloud computing on their organization before taking the decision to implement.
Types of cloud computing
There are three categories or levels cloud computing, this are: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (I ...
1) Cloud computing adoption is growing in India due to rising adoption by large enterprises and SMEs seeking cost benefits over traditional data storage. However, migration challenges like legacy system compatibility and data security issues remain.
2) The market for cloud computing in India is expected to grow significantly in the coming years due to the exploding digital universe and increasing cloud adoption across both private and government sectors. However, data security, vendor lock-in, and lack of IT infrastructure in some areas may hamper growth.
3) Cloud computing provides significant benefits to organizations of all sizes by optimizing costs and increasing productivity, profitability, and business efficiency through accessible and scalable resources. However, concerns around data privacy, security
An Analysis on Business Value of Cloud ComputingIOSR Journals
This document analyzes the business value of cloud computing. It begins by defining cloud computing as a model for enabling on-demand access to shared computing resources over the internet. The key concepts of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service are described. The three cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - are outlined. The four deployment models of public, private, hybrid, and community clouds are also discussed. The document explores how cloud computing benefits business models by providing flexibility and a pay-as-you-go option. Ch
Implementing Iris in the Railway Control Office Application for Secure Saas i...IJERA Editor
Technology plays a vital role in each and every part of the world. In particular ―Cloud‖ computing - a
moderately recent term, characterizes the path to develop the advancement in the world of computer science.
Further, Cloud provides an affordable environment for its users through different forms of services such as SaaS
(Software as a service), PaaS (Platform as a service), and IaaS (Infrastructure as a Service). Cloud computing is
also an Internet-based computing where a large pool of systems are connected in private or public networks, and
provide dynamically scalable infrastructure for application data as well as file storage. Security of Cloud
computing is an evolving sub-domain of network security, computer security and information security. In spite
of its advantages, Cloud environment has many security flaws such as loss of important data, data leakage and
something related to cloning, resource pooling etc. Security of Cloud Computing is an emerging area for study.
It includes several security and privacy issues with challenges and solutions for many security issues of cloud
computing. The Control Office Application (COA) is the latest addition to train operations related IT application
of Indian Railways. Along with the Freight Operations Information System (FOIS), COA has led to a complete
transformation in train operations and facilitates all information on train operations being computer generated. It
is this application that feeds the National Train Enquiry System (NTES) which provides passengers with up to
date information on train running. COA also provides train operations information to FOIS and ICMS. The
objective of the Indian Railways is to further improve the operations by using technological aids that enable
quicker data capture and intelligent applications that provide better planning and forecasting tools. To overcome
these issues, in Cloud computing, we can use SaaS (software as a service). In this paper, we have proposed a
new IRIS algorithm to authenticate the users of COA software in the cloud environment.
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
This document discusses cloud based marketing systems for small and medium enterprises (SMEs) in India. It begins with an introduction and overview of SME classifications in India. The rest of the document is divided into various sections that discuss: the benefits of cloud computing for SMEs; literature review on cloud adoption among SMEs; the research methodology used; data analysis and interpretations from surveys of SME personnel; findings on awareness and perceptions of cloud and marketing cloud tools; and recommendations. Factor analysis was used to identify key drivers and concerns regarding cloud adoption. Most SMEs were found to be aware of cloud computing but less aware of marketing clouds specifically.
IRJET- Cloud Computing Adoption and its Impact in IndiaIRJET Journal
This document discusses cloud computing adoption and its impact in India. It begins with an introduction to cloud computing and how it provides on-demand access to computing resources over the Internet. It then discusses some of the key challenges to cloud adoption in India, such as data security and lack of internet connectivity in rural areas. However, it notes that cloud adoption is growing and forecasted to increase significantly by 2022 across various sectors in India like government, healthcare, education, and small and medium enterprises. The impacts of cloud computing discussed include increased mobility and collaboration, reduced costs, improved productivity, and environmental benefits from more efficient data centers. The document concludes that cloud computing frees companies from expensive infrastructure costs while providing opportunities for Indian markets.
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
Cloud Computing: Applications and Benefits for Small Businesses
Abstract
Cloud computing is one of the most talked about topics in the world of technology and entrepreneurship. Until now it has never been so easy for people, especially small business owner’s, to have the tools and resources readily available just one click away and at the fraction of the cost of the typical investment a few years back. Cloud computing offers cost-effective solutions at various levels that can be customize to meet the needs of anyone. Cloud computing can be thought of as a new found technology and this paper defines the concept of the cloud and provides a brief background of where most business are in regards to the use of this technology. This is then continued by describing the types of cloud currently available and potential use. The paper then presents a short but important section of cloud security issues and challenges. Finally, the paper discusses the benefits each of the different levels of cloud computing can provide small business.
Introduction
The use of cloud computing has grown exponentially in the last decade, according to Weins (2015) eight-four percent of enterprises that make use of such services in one way or another. Could computing by definition is internet-based computing, where by shared resources, software and information are provided to the end user as metered services much like a utility does(Bradley, 2014). For businesses in many cases could computing is use for IT solution purposes as it can provide IT-related capabilities as a service using internet technologies.
With the fast pace of today’s market businesses need to provide fast and reliable services to their customers in order to remain competitive. The concept of could computing is not something new as it uses existing technology and processes; however it can be consider new in sense that using these technologies has revolutionized the manner in which we host and cater services to customers. Startup companies and small businesses can take advantage of could computing to reduce spending on IT, be more adept to changes in the market, change scale and lower risk and cost.
Given the structural complexity of larger organization, Alijani (2014) states that it is essential for cloud computing to deliver rear value rather than serve as a platform for simple task. The need to deliver rear value is just as important for small businesses. For small businesses value is important but it’s their customer relationship and public image, flexibility and continuity. As such small business owners need to consider the benefits, drawback s and the effect of cloud computing on their organization before taking the decision to implement.
Types of cloud computing
There are three categories or levels cloud computing, this are: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (I ...
1) Cloud computing adoption is growing in India due to rising adoption by large enterprises and SMEs seeking cost benefits over traditional data storage. However, migration challenges like legacy system compatibility and data security issues remain.
2) The market for cloud computing in India is expected to grow significantly in the coming years due to the exploding digital universe and increasing cloud adoption across both private and government sectors. However, data security, vendor lock-in, and lack of IT infrastructure in some areas may hamper growth.
3) Cloud computing provides significant benefits to organizations of all sizes by optimizing costs and increasing productivity, profitability, and business efficiency through accessible and scalable resources. However, concerns around data privacy, security
An Analysis on Business Value of Cloud ComputingIOSR Journals
This document analyzes the business value of cloud computing. It begins by defining cloud computing as a model for enabling on-demand access to shared computing resources over the internet. The key concepts of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service are described. The three cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - are outlined. The four deployment models of public, private, hybrid, and community clouds are also discussed. The document explores how cloud computing benefits business models by providing flexibility and a pay-as-you-go option. Ch
Implementing Iris in the Railway Control Office Application for Secure Saas i...IJERA Editor
Technology plays a vital role in each and every part of the world. In particular ―Cloud‖ computing - a
moderately recent term, characterizes the path to develop the advancement in the world of computer science.
Further, Cloud provides an affordable environment for its users through different forms of services such as SaaS
(Software as a service), PaaS (Platform as a service), and IaaS (Infrastructure as a Service). Cloud computing is
also an Internet-based computing where a large pool of systems are connected in private or public networks, and
provide dynamically scalable infrastructure for application data as well as file storage. Security of Cloud
computing is an evolving sub-domain of network security, computer security and information security. In spite
of its advantages, Cloud environment has many security flaws such as loss of important data, data leakage and
something related to cloning, resource pooling etc. Security of Cloud Computing is an emerging area for study.
It includes several security and privacy issues with challenges and solutions for many security issues of cloud
computing. The Control Office Application (COA) is the latest addition to train operations related IT application
of Indian Railways. Along with the Freight Operations Information System (FOIS), COA has led to a complete
transformation in train operations and facilitates all information on train operations being computer generated. It
is this application that feeds the National Train Enquiry System (NTES) which provides passengers with up to
date information on train running. COA also provides train operations information to FOIS and ICMS. The
objective of the Indian Railways is to further improve the operations by using technological aids that enable
quicker data capture and intelligent applications that provide better planning and forecasting tools. To overcome
these issues, in Cloud computing, we can use SaaS (software as a service). In this paper, we have proposed a
new IRIS algorithm to authenticate the users of COA software in the cloud environment.
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
Cloud Computing: Overview and its Deployment ModelIJERA Editor
We live in the era of gigantic complexity. With the daze elevation in technology, the IT infrastructure has remoulded to the core. However, in the fullness of time the epoch of cloud computing is now arising also acknowledged as on-demand computing. It provides marketability, fidelity, coherence, high-performance and adequately low-lying cost conceivable way out as compared to dyed-in-the-wool infrastructure .Aloft the internet, it is the technology yielded in the form of service and these services are furnished with the hardware system in the data centres .This paper gives the meticulous outlining for cloud and focuses on the primarily outlook of Cloud Computing. In the long run, this paper comes to light to render the service modal, types of cloud computing : IaaS , PaaS, SaaS , ways of cloud computing as well as advantages and disadvantages of Cloud Computing. The future of this technology is at top of ladder. It is the next generation and can be of tremendous value to the worldwide companies.
A PROPOSED MODEL FOR IMPROVING PERFORMANCE AND REDUCING COSTS OF IT THROUGH C...ijccsa
This document discusses a proposed model for improving performance and reducing costs of IT through cloud computing for Egyptian business enterprises. It begins with an introduction and background on cloud computing. The proposed model has four layers: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), and client layer. The IaaS layer provides virtual hardware resources using virtualization. The PaaS layer manages data processing and resource management. The SaaS layer provides internet-based application services. Finally, the client layer directly interfaces with users. The model aims to improve performance and reduce costs for Egyptian businesses through flexible, efficient cloud services and infrastructure.
A Proposed Model for Improving Performance and Reducing Costs of IT Through C...neirew J
Information technologies are affecting the big business enterprises of todays from data processing and
transactions to achieve the goals efficiently and effectively, affecting creates new business opportunities
and towards new competitive advantage, service must be enough to match the recent trends of IT such as
cloud computing. Cloud computing technology has provided all IT services. Therefore, cloud computing
offers an alternative to adaptable with technology model current , creating reducing cost (Fixed costs and
ongoing), the proliferation of high speed Internet connections through Rent, not acquisitions, cheaper
powerful computing technology and effective performance. The public and private clouds are characterized
by flexibility, operational efficiency that reduces costs improve performance. Also cloud computing
generates business creativity and innovation resulted from collaborative ideas of users; presents cloud
infrastructure and services; paving new markets; offering security in public and private clouds; and
providing environmental impact regarding utilizing green energy technology. In this paper, the main
concentrate the cloud computing.
CIO's implanting digital transformation strategies are facing increasing challenges on how to migrate security integrated hybrid technologies. Find out here the future of Future Networks today
The document discusses the future of cloud computing and the Internet of Things (IoT). It covers several topics:
1) The evolution and current state of cloud computing including public, private, hybrid, and community cloud models.
2) Technical pillars of IoT including RFID, wireless sensor networks, machine-to-machine communication, and SCADA systems.
3) The relationship between cloud computing and IoT, and how they will converge with mobile cloud computing.
4) Emerging paradigms like MAI and XaaS for connecting IoT devices within and outside organizations via the cloud.
This document summarizes a study on barriers to government cloud adoption in Ghana. The study interviewed IT personnel from 12 public agencies to identify challenges they may face in adopting cloud computing. Major inhibiting factors identified include lack of basic infrastructure, data security concerns, unreliable internet connectivity, and a general lack of institutional readiness. The study uses the technology, organization and environment framework to classify adoption factors into technological, organizational, and environmental contexts.
This document discusses green cloud computing and the need to develop optimized algorithms and applications to improve energy efficiency. It notes that while cloud computing provides economic benefits through shared infrastructure, the growing demand has increased energy consumption and carbon emissions. The document examines various technologies that enable green computing in clouds, such as virtualization, and proposes a green cloud architecture framework to improve efficiency from both user and provider perspectives. It stresses the importance of developing optimized algorithms and applications to minimize resource usage and route data to lower-cost energy regions.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
This document discusses cloud computing, including its key characteristics, service models, deployment models, and importance for India. It notes that cloud computing provides on-demand access to computing resources over the internet and allows users to access applications, resources, and services from cloud providers. The document also outlines some of the top cloud computing service providers in India and discusses legal and regulatory issues around cloud adoption in India.
This document discusses how cloud computing can provide a framework called Education Cloud to help non-profit organizations (NGOs) with e-management. It proposes that the Education Cloud could help NGOs save costs, focus on their missions rather than IT infrastructure, and provide improved and scalable educational services. The document also presents a case study of an NGO in India called Kalgidhar Trust that is using education to address social issues.
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document discusses cloud computing and its opportunities for telecommunications companies. It provides an overview of cloud computing concepts and categories. It then discusses True IDC, a major cloud computing provider in Thailand, and how it offers infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document also outlines opportunities and challenges for telecommunications companies to leverage their network expertise and enterprise relationships to provide cloud services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits like scalability, flexibility and cost savings. However, cloud computing also faces security risks due to its multi-tenant architecture, where resources are shared among multiple users. Specific security risks discussed include data loss and leakage if strong encryption and access controls are not implemented. The open accessibility of cloud services also makes it easier for malicious users to attack innocent users. Finally, proper identity management is needed to securely manage access across different cloud technologies and services.
Addressing the cloud computing security menaceeSAT Journals
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits, including scalability, flexibility, and a pay-as-you-go model. However, it notes that security is a major concern for cloud computing. It then analyzes specific security threats like multi-tenancy allowing access to competitors' data, potential for data loss and leakage, easy accessibility opening the cloud to malicious users, and challenges of identity management with multiple technologies. The document provides an overview of cloud computing deployment models and service models to provide context on the discussed security issues.
This document provides an overview of secure cloud hosting best practices for enterprise messaging solutions. It discusses the benefits and risks of cloud computing, as well as common deployment and service models. The document then focuses on Infinite Convergence's Enterprise Messaging Service (EMS), which is hosted privately and securely at Infinite's premises. Some key security practices for EMS include robust identity and access management, comprehensive monitoring and metering, adherence to service level agreements, and lifecycle management of applications and data. Virtualization is also discussed as the core technology enabling efficient cloud hosting.
This document discusses the basics of cloud computing, including definitions, characteristics, deployment strategies, service models, opportunities, challenges, and issues. Specifically, it defines cloud computing as on-demand access to configurable computing resources via the internet. The key characteristics of cloud computing are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The document also outlines the public, private, and hybrid deployment strategies as well as software (SaaS), platform (PaaS), and infrastructure (IaaS) service models. Finally, it discusses opportunities for end users, businesses and developers, and examines challenges related to security, performance, availability, cost, and regulatory requirements.
This document summarizes a research paper on security issues related to cloud computing for micro, small, and medium enterprises (MSMEs). The paper discusses how MSMEs have started adopting cloud computing solutions to improve operations and cope with challenges from increasing competition. While cloud computing provides benefits like efficient applications and flexibility, security poses challenges when storing data remotely with unknown providers. The paper focuses on analyzing security risks for MSMEs adopting cloud technologies and identifying their needs, requirements, and expectations around cloud computing services.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...ijistjournal
5th International Conference on Cloud, Big Data and IoT (CBIoT 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
More Related Content
Similar to CLOUD COMPUTING – KEY PILLAR FOR DIGITAL INDIA
Cloud Computing: Overview and its Deployment ModelIJERA Editor
We live in the era of gigantic complexity. With the daze elevation in technology, the IT infrastructure has remoulded to the core. However, in the fullness of time the epoch of cloud computing is now arising also acknowledged as on-demand computing. It provides marketability, fidelity, coherence, high-performance and adequately low-lying cost conceivable way out as compared to dyed-in-the-wool infrastructure .Aloft the internet, it is the technology yielded in the form of service and these services are furnished with the hardware system in the data centres .This paper gives the meticulous outlining for cloud and focuses on the primarily outlook of Cloud Computing. In the long run, this paper comes to light to render the service modal, types of cloud computing : IaaS , PaaS, SaaS , ways of cloud computing as well as advantages and disadvantages of Cloud Computing. The future of this technology is at top of ladder. It is the next generation and can be of tremendous value to the worldwide companies.
A PROPOSED MODEL FOR IMPROVING PERFORMANCE AND REDUCING COSTS OF IT THROUGH C...ijccsa
This document discusses a proposed model for improving performance and reducing costs of IT through cloud computing for Egyptian business enterprises. It begins with an introduction and background on cloud computing. The proposed model has four layers: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), and client layer. The IaaS layer provides virtual hardware resources using virtualization. The PaaS layer manages data processing and resource management. The SaaS layer provides internet-based application services. Finally, the client layer directly interfaces with users. The model aims to improve performance and reduce costs for Egyptian businesses through flexible, efficient cloud services and infrastructure.
A Proposed Model for Improving Performance and Reducing Costs of IT Through C...neirew J
Information technologies are affecting the big business enterprises of todays from data processing and
transactions to achieve the goals efficiently and effectively, affecting creates new business opportunities
and towards new competitive advantage, service must be enough to match the recent trends of IT such as
cloud computing. Cloud computing technology has provided all IT services. Therefore, cloud computing
offers an alternative to adaptable with technology model current , creating reducing cost (Fixed costs and
ongoing), the proliferation of high speed Internet connections through Rent, not acquisitions, cheaper
powerful computing technology and effective performance. The public and private clouds are characterized
by flexibility, operational efficiency that reduces costs improve performance. Also cloud computing
generates business creativity and innovation resulted from collaborative ideas of users; presents cloud
infrastructure and services; paving new markets; offering security in public and private clouds; and
providing environmental impact regarding utilizing green energy technology. In this paper, the main
concentrate the cloud computing.
CIO's implanting digital transformation strategies are facing increasing challenges on how to migrate security integrated hybrid technologies. Find out here the future of Future Networks today
The document discusses the future of cloud computing and the Internet of Things (IoT). It covers several topics:
1) The evolution and current state of cloud computing including public, private, hybrid, and community cloud models.
2) Technical pillars of IoT including RFID, wireless sensor networks, machine-to-machine communication, and SCADA systems.
3) The relationship between cloud computing and IoT, and how they will converge with mobile cloud computing.
4) Emerging paradigms like MAI and XaaS for connecting IoT devices within and outside organizations via the cloud.
This document summarizes a study on barriers to government cloud adoption in Ghana. The study interviewed IT personnel from 12 public agencies to identify challenges they may face in adopting cloud computing. Major inhibiting factors identified include lack of basic infrastructure, data security concerns, unreliable internet connectivity, and a general lack of institutional readiness. The study uses the technology, organization and environment framework to classify adoption factors into technological, organizational, and environmental contexts.
This document discusses green cloud computing and the need to develop optimized algorithms and applications to improve energy efficiency. It notes that while cloud computing provides economic benefits through shared infrastructure, the growing demand has increased energy consumption and carbon emissions. The document examines various technologies that enable green computing in clouds, such as virtualization, and proposes a green cloud architecture framework to improve efficiency from both user and provider perspectives. It stresses the importance of developing optimized algorithms and applications to minimize resource usage and route data to lower-cost energy regions.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
This document discusses cloud computing, including its key characteristics, service models, deployment models, and importance for India. It notes that cloud computing provides on-demand access to computing resources over the internet and allows users to access applications, resources, and services from cloud providers. The document also outlines some of the top cloud computing service providers in India and discusses legal and regulatory issues around cloud adoption in India.
This document discusses how cloud computing can provide a framework called Education Cloud to help non-profit organizations (NGOs) with e-management. It proposes that the Education Cloud could help NGOs save costs, focus on their missions rather than IT infrastructure, and provide improved and scalable educational services. The document also presents a case study of an NGO in India called Kalgidhar Trust that is using education to address social issues.
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document discusses cloud computing and its opportunities for telecommunications companies. It provides an overview of cloud computing concepts and categories. It then discusses True IDC, a major cloud computing provider in Thailand, and how it offers infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document also outlines opportunities and challenges for telecommunications companies to leverage their network expertise and enterprise relationships to provide cloud services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits like scalability, flexibility and cost savings. However, cloud computing also faces security risks due to its multi-tenant architecture, where resources are shared among multiple users. Specific security risks discussed include data loss and leakage if strong encryption and access controls are not implemented. The open accessibility of cloud services also makes it easier for malicious users to attack innocent users. Finally, proper identity management is needed to securely manage access across different cloud technologies and services.
Addressing the cloud computing security menaceeSAT Journals
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits, including scalability, flexibility, and a pay-as-you-go model. However, it notes that security is a major concern for cloud computing. It then analyzes specific security threats like multi-tenancy allowing access to competitors' data, potential for data loss and leakage, easy accessibility opening the cloud to malicious users, and challenges of identity management with multiple technologies. The document provides an overview of cloud computing deployment models and service models to provide context on the discussed security issues.
This document provides an overview of secure cloud hosting best practices for enterprise messaging solutions. It discusses the benefits and risks of cloud computing, as well as common deployment and service models. The document then focuses on Infinite Convergence's Enterprise Messaging Service (EMS), which is hosted privately and securely at Infinite's premises. Some key security practices for EMS include robust identity and access management, comprehensive monitoring and metering, adherence to service level agreements, and lifecycle management of applications and data. Virtualization is also discussed as the core technology enabling efficient cloud hosting.
This document discusses the basics of cloud computing, including definitions, characteristics, deployment strategies, service models, opportunities, challenges, and issues. Specifically, it defines cloud computing as on-demand access to configurable computing resources via the internet. The key characteristics of cloud computing are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The document also outlines the public, private, and hybrid deployment strategies as well as software (SaaS), platform (PaaS), and infrastructure (IaaS) service models. Finally, it discusses opportunities for end users, businesses and developers, and examines challenges related to security, performance, availability, cost, and regulatory requirements.
This document summarizes a research paper on security issues related to cloud computing for micro, small, and medium enterprises (MSMEs). The paper discusses how MSMEs have started adopting cloud computing solutions to improve operations and cope with challenges from increasing competition. While cloud computing provides benefits like efficient applications and flexibility, security poses challenges when storing data remotely with unknown providers. The paper focuses on analyzing security risks for MSMEs adopting cloud technologies and identifying their needs, requirements, and expectations around cloud computing services.
Similar to CLOUD COMPUTING – KEY PILLAR FOR DIGITAL INDIA (20)
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...ijistjournal
5th International Conference on Cloud, Big Data and IoT (CBIoT 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...ijistjournal
Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is considered as information propagation channel with an amount of distortion. HLA gene SE is considered as sink regulated by the inducible transcription factors (TFs) (source). Previous work with a certain number of bin size, IEs for source and receiver is computed and computation of mutual information characterizes the dependencies of HLA gene SE on some certain TFs in different cells types of hematopoietic system under the condition of leukemia. Though in recent time information theory is utilized for different biological knowledge generation and different rules are available in those specific domains of biomedical areas; however, no such attempt is made regarding gene expression regulation, hence no such rule is available. In this work, IE calculation with varying bin size considering the number of bins is approximately half of the sample size of an attribute also confirms the previous inferences.
Call for Research Articles - 5th International Conference on Artificial Intel...ijistjournal
5th International Conference on Artificial Intelligence and Machine Learning (CAIML 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and Machine Learning. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Machine Learning in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science, Engineering and Applications.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...ijistjournal
System identification from the experimental data plays a vital role for model based controller design. Derivation of process model from first principles is often difficult due to its complexity. The first stage in the development of any control and monitoring system is the identification and modeling of the system. Each model is developed within the context of a specific control problem. Thus, the need for a general system identification framework is warranted. The proposed framework should be able to adapt and emphasize different properties based on the control objective and the nature of the behavior of the system. Therefore, system identification has been a valuable tool in identifying the model of the system based on the input and output data for the design of the controller. The present work is concerned with the identification of transfer function models using statistical model identification, process reaction curve method, ARX model, genetic algorithm and modeling using neural network and fuzzy logic for interacting and non interacting tank process. The identification technique and modeling used is prone to parameter change & disturbance. The proposed methods are used for identifying the mathematical model and intelligent model of interacting and non interacting process from the real time experimental data.
Call for Research Articles - 4th International Conference on NLP & Data Minin...ijistjournal
4th International Conference on NLP & Data Mining (NLDM 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Data Mining.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)ijistjournal
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
Online Paper Submission - 6th International Conference on Machine Learning & ...ijistjournal
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systemsijistjournal
Almouti published the error performance of the 2x2 space-time transmit diversity scheme using BPSK. One of the key techniques employed for correcting such errors is the Quadrature amplitude modulation (QAM) because of its efficiency in power and bandwidth.. In this paper we explore the error performance of the 2x2 MIMO system using the Almouti space-time codes for higher order PSK and M-ary QAM. MATLAB was used to simulate the system; assuming slow fading Rayleigh channel and additive white Gaussian noise. The simulated performance curves were compared and evaluated with theoretical curves obtained using BER tool on the MATLAB by setting parameters for random generators. The results shows that the technique used do find a place in correcting error rates of QAM system of higher modulation schemes. The model can equally be used not only for the criteria of adaptive modulation but for a platform to design other modulation systems as well.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
Feature extraction is a method of capturing visual content of an image. The feature extraction is the process to represent raw image in its reduced form to facilitate decision making such as pattern classification. We have tried to address the problem of classification MRI brain images by creating a robust and more accurate classifier which can act as an expert assistant to medical practitioners. The objective of this paper is to present a novel method of feature selection and extraction. This approach combines the Intensity, Texture, shape based features and classifies the tumor as white matter, Gray matter, CSF, abnormal and normal area. The experiment is performed on 140 tumor contained brain MR images from the Internet Brain Segmentation Repository. The proposed technique has been carried out over a larger database as compare to any previous work and is more robust and effective. PCA and Linear Discriminant Analysis (LDA) were applied on the training sets. The Support Vector Machine (SVM) classifier served as a comparison of nonlinear techniques Vs linear ones. PCA and LDA methods are used to reduce the number of features used. The feature selection using the proposed technique is more beneficial as it analyses the data according to grouping class variable and gives reduced feature set with high classification accuracy.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
1. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
DOI : 10.5121/ijist.2016.6203 27
CLOUD COMPUTING – KEY PILLAR FOR
DIGITAL INDIA
Kirtankumar R. Rathod
Institute of Information and Communication Technology,
Indus University, Ahmedabad, Gujarat, INDIA
ABSTRACT
Companies are doing marketing or branding of their products and services using digital media. Life is
becoming so smooth and transparent by the sharing of information through the digital mediums. Whether it
is a small or a big company, everybody is running for the competition, because they want to lock their
customers. In this paper current market scenario is included with respect to cloud computing solution.
Data access at present has limitations. Government data which is publicly accessible should have some
policy. Cloud Computing is likely to be one of the key pillars on which various e-Governance services
would ride. Digital India is a program to prepare India for a knowledge future. Digital India should have
policy wherein the Government will be providing information and services to internal and external
stakeholders. Cloud computing has become the most stimulating development and delivery alternative in
the new millennium. A lot of departments are showing interest to adopt Cloud technology, but awareness
on Cloud security needs to be increased. The adoption of Cloud is helping organizations innovate, do
things faster, become more agile and enhance their revenue stream. In this paper, the information
regarding cloud services and models are provided. Also, the main focus is on what government can do with
the help of it for Digital India mission?
KEYWORDS
Cloud computing, Digital India, Pay-per-use model, Security
1. INTRODUCTION
Now a day’s everybody wants to get connected with the world. People are getting notifications or
messages from the various companies in their mobile phones. These companies are doing
marketing of their products and services using digital media [4]. It is very easy to share the
information through the digital medium. For a small, medium or big company competition is
everywhere because they want to lock their customers. Customers are looking for the
organizations or companies from where they can gain more and more profits. Market is also
growing fast with the usage of latest technology.
To enable Digital India it is necessary to evaluate the type of services that will be provided to
citizens. Government services will be real time for both online and mobile platform by making
integration with government laws and jurisdictions. One of the simplest technologies is Cloud
Computing. Some of the industry uses of cloud computing are Banking, Education, Government,
Healthcare, Media, Manufacturing, etc. With the help of cloud computing basically we can
2. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
28
maximize the effectiveness of the shared resources. The cloud has changed the nature of
computing and it will continue to do so through 2020.
One of the key features of cloud is that it is provisioned by the user. Cloud is elastic and it can be
metered, so that you can charge on usage basis. The information and services from the
Government bodies can use public cloud vendors such as AWS or Microsoft Azure of Google
Cloud [2]. This might not be totally secure and it requires having a strong architecture principle
and policy to host data and services to relevant cloud delivery model. In this paper I have discuss
market scenario with respect to cloud technology and pay-per-use model [1] with the comparison
of subscription based model.
2. CURRENT MARKET SCENARIO
Large organizations are focusing on the private cloud to build efficiency within their IT
infrastructure. They are exploring applications such as document management systems, CRM and
learning solutions [3]. Smaller organizations are looking at public clouds for end-to-end
propositions including mailing solutions and ERP. Industry wide alliances are on to offer end-to-
end cloud computing services for enterprises.
For example, Mankind Pharma Company [6] wanted to align its IT infrastructure with the
business goals of the company, while keeping operations and capital expenditures to a minimum
in 2014. So, the company has chosen SoftLayer’s infrastructure as the ideal solution to fit the
business needs of Mankind Pharma. It is providing the perfect combination of pay-as-you-use
option as well as scalability to suit business requirements.
In tiny transaction, pay-per-use media framework must be organized to distribute high-quality
data and information automatically on a huge scale. For pay-per-use online services, transactions
and service delivery must be similarly automatic. Traditionally, employee’s daily computing
resources are available in one server at one location, i.e., the infrastructure is fixed. With cloud
computing, the infrastructure is provided to the user in an on-demand manner. Security, data
availability and privacy are the big issues that need to be overcome for cloud to assume its full
potential [2]. According to an International Data Corporation report, the overall Cloud market in
India stood at $688 million in 2012. This figure is expected to rise to a staggering $3.5 billion by
2016.
3. CLOUD AT A GLANCE
3.1. Cloud Flavours
Public cloud where resources are dynamically provisioned on a fine-grained, self-service
basis over the Internet from an off-site third-party provider [2].
Private cloud provides computing on private networks. These capitalize on data security,
corporate governance and reliability.
Hybrid cloud environment is combination of both Public and Private Cloud. This is more
typical of cloud computing for most enterprises.
3. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
29
Figure 1. Cloud Computing Architecture
3.2. Cloud Services
Cloud-computing providers offer different type of services according to different models.
IaaS refers to online services that abstract user from the detail of infrastructure like physical
computing resources, location, data partitioning, scaling, security, backup etc.
PaaS provider typically develops toolkit and standards for development and channels for
distribution and payment. In the PaaS models, cloud providers deliver a computing platform,
typically including operating system, programming-language execution environment, database,
and web server [2].
SaaS is where a user no longer owns the software but instead uses it when required using cloud
computing. The software remains the property of the service provider and the user pays for access
either by annual subscription or on a pay-per-use basis.
4. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
30
Figure 2. Cloud Services
Many questions are arising in the mind before implementing cloud computing model such as,
What cloud can deliver?
When it should be / not be used?
What technologies need to be adopted for rolling out a cloud?
Whether to go for private, public or hybrid cloud?
Cloud computing is about paying for what you need when you need it; infrastructure scaled to the
mean of your requirements, not the max out [1]. In the next section one of the model of cloud
computing is discussed which can be better utilized for digital India vision and mission.
4. HOW PAY-PER-USE MODEL WORKS?
Software as a Service is deployed typically as a pay-per- use model [1], a subscription model, or
a combination of both.
4.1. Pay-Per-Use pricing model is suitable for the following reasons,
The services are not being used constantly by the customers.
It gives greater feedback on accurate pricing and allows the user to dictate their costs.
Due to minimum startup fees, companies are making fast decision to try the services without
waiting for a year to finish.
Pay-per-use model actually give the information about how customers are using their products
and services. Also, it leads to their profitability.
To consider material cost, i.e. an offline completion cost. If we add various type of costs in the
material cost than the pay-per-use approach is better.
Some companies like to go for it because the significance relationship is made very clear to the
customer, and they are capable to prioritize quality and service expansion based on the
customer’s expressed needs [1].
4.2. PROS & CONS OF PAY-PER-USE MODEL
In pay per usage model, customers can get benefit of their services as and when they require of it.
That means customers can use their web browser regardless of their locations or devices to
acquire the services they want to use from the cloud servers. Here, the multi- tenancy (i.e. an
architecture in which a single instance of a software application serves multiple customers)
enables sharing of information and resources across a large number of customers. More number
of hardware available will increase the availability of information for customers easily [2].
5. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
31
Maintenance of cloud application is easy because, it is not going to be installed on every
customer’s device. It is installed only in centralized or distributed server. It is important to
provide security and privacy to the information which can be shared through cloud computing.
There is also a requirement for high level of data control.
Because customers are only paying to use the service when they consciously think they need the
service, revenue is less predictable than a subscription or licensing model.
If amount of the bill is unpredictable and not controllable, then neither the subscriber nor the
provider can budget effectively.
Customers complain of being burned by pay-per-use models when they fail to warm up when the
demand is required. The company which offers pay-per-use model must still operate with the
strength of a public utility and be available.
5. LOOKING AHEAD WITH THE CLOUD
The speed of implementation of cloud computing in the government sector is slow compared to
private organizations. Public sector institutions are now increasingly discovering the benefit of
information systems which is hosted at third-party data centers by the SaaS, PaaS or IaaS [2]. The
government is already knowing about the benefits that cloud computing can bring and how it can
be an excellent platform for fast and affordable service deployment and delivery. Cloud
computing leads to flexible resource allocation since it allows Information Technology to
respond to changing demands of system administrators. Administrator can better manage the
resources as the demand occurs. Not all IT services and applications are suited for the cloud [1].
5.1. Vision On Cloud
Digital India initiative, which we are trying to absorb, is going to be on Cloud as the Cloud First
Policy. We will see new architectures propagating and applications getting restored to ensure the
benefits that Cloud can give, and it would be made available in the various projects that are going
to come up in the near future. Clearly, the move to Cloud is about business-aligned IT where
Cloud drives business innovation and helps meet business goals.
High speed internet shall be made available in all villages. With the help of mobile banking and
net banking in villages participation in digital and financial space at individual level will be
increase. All digital resources are universally accessible such as government documents /
available on the cloud. Also, the collaborative digital platforms for participative governance
provide portability of all entitlements for individuals through the cloud [4].
On the occasion of launch of Digital India week, Microsoft CEO Satya Nadella said technology
can support the government's initiatives in key areas of the program including rural internet
connectivity, digital cloud services for all and communications and productivity services for the
government. Also, he said, we are bringing our marquee cloud services - Microsoft Azure,
Dynamics and Office 365 - to local data centers in India to accelerate cloud innovation, connect
every Indian and every Indian business to the world through our global hyper-scale cloud [8].
6. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
32
In India, broadband network initiatives will eventually stimulate greater acceptance and
convenience of cloud services. Cloud computing allow common platforms across multiple
agencies, reduce ownership of infrastructure and improve citizen access to service and
information. Government can make things more transparent and helps bridge the digital divide by
simplifying access using cloud computing.
5.2. What Government of India can do with Cloud?
A government organization should start with non-critical applications and non-sensitive data
when getting on to the cloud. Government may adopt for private cloud only, to be built and
managed within an enterprise. The main concept is to utilize the maximum resources in a more
flexible, scalable and lower-cost manner. In case of private cloud data can be more secure. Many
people have anxiety that their data will not be in their control. But a clear understanding of
setting up Cloud should be there. Another problem is that various departments also do not have
the technical resources and strengths [4].
Many Indian projects like Indian Railway, Aadhaar would benefit enormously from cloud
computing. Also, creating more and more servers for information sharing will be helpful for
government and citizen of India. The Digital India project demands very strong network security
at all levels of operation. We should ensure that data will be managed and controlled by each data
centers using security policy. Some of the barriers to adoption of cloud in the government are can
be attributed to diverse service level agreements, data privacy, open standards, business stability
and vendor lock-in [8].
Mr. Anil Ambani said “the availability of unlimited cloud computing power and data centers are
crucial pre-condition for the success of Digital India.” Also, as per his talk “We have committed
to invest nearly Rs 10,000 crore over the next few years to fund these transformational initiatives
across the digital, cloud and telecom space.” Cloud will be the pillar in facilitating in the delivery
of various e-governance services. The Government of India has embarked upon a very striving
and important initiative. It is going to be an extremely important component that can bring a
standard shift in the way government secures and deploys IT tools and implements e-Governance
applications in the country. Many applications of e-governance were written using the client
server paradigm. So, there is a very tight coupling trying to split up the applications to make it
multi- talented, so that the same application could be used by multiple departments across
multiple states, which would not be an easy task [7].
There is a cloud server which is managed by government but hosted by a cloud service provider
as a private cloud. This type of model can be cost-effective and secure in terms of capital
investments and infrastructures. The public cloud which is cost optimizer, controllable,
responsive, secure, scalable, and citizen service-oriented. The tools required to create multi-
talented, user-provisioned, highly secure applications that can scale across hundreds of thousands
of servers is still not being used in our country. The government has policy to release its open
data policy to provide access to the data. [5].
To achieve a secure cloud environment we require combine effort between cloud service vendors
and users. Building trust with public cloud services providers while maintaining control of
security policies internally are the foundation of building security in the cloud. Gartner said that
just 7 percent of consumer content was stored in the cloud in 2011, but this will grow to 36
percent in 2016.
7. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
33
6. CONCLUSIONS
Currently, it is in an early stage but will continue to move into normal adoption, with its
economic, green and scalable development and delivery mechanism. A look at the present
government’s manifesto is good enough to suggest that it intends to leverage IT in each and every
segment, without an exception. Multiple levels of security for networks, software and
applications are required. If there are thousands of servers in a data centre, lots of care needs to be
taken about how those are designed and built, because the current generation of data centers have
efficiency that is two to four times better than what we are seeing currently in India. [3, 4]. More
industries are turning to cloud technology as an efficient way to improve quality services due to
its capabilities to reduce overhead costs, downtime, and automate infrastructure deployment. The
DIT, Government of India, is in discussion with industry representatives on faster adoption and
selection of right paths for sharing of resources [8].
REFERENCES
[1] R. Buyya, C. S. Yeo, and S. Venugopal, Market-Oriented Cloud Computing Vision, Hype, and
Reality for Delivering IT Services as Computing Utilities, Proceedings of the 10th IEEE International
Conference on High Performance Computing and Communications, Sept. 25_27, 2008, Dalian,
China.
[2] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, The
Eucalyptus open-source cloud- computing system, in Proceedings of IEEE/ACM International
Symposium on Cluster Computing and the Grid (CCGrid 2009), Shanghai, China, pp. 124_131,
University of California, Santa Barbara. (2009, Sep.) Eucalyptus [online]. http://open.eucalyptus.com.
[3] The European e-ID interoperability Conference Current Perspective and Initiatives from around
Europe in Government and Business, http://www.eema.org/downloads/2009/e-ID_interoperability/e-
ID_interop_prog_2009_web.pdf, March 2009.
[4] https://www2.deloitte.com/content/dam/Deloitte/in/Documents/technology-media-
telecommunications/in-tmt-tele-tech-2015-noexp.pdf
[5] S. Venugopal, J. Broberg, and R. Buyya, OpenPEX: An open provisioning and execution systems for
virtual machines, in Proceedings of the 17th International Conference on Advanced Computing and
Communications (ADCOM 2009), Bengaluru, India, December 14_18, 2009.
[6] http://www.cxotoday.com/story/mankind-pharma-to-drive-growth-with-softlayers-cloud-platform/
[7] http://www.imanagerpublications.com/Archives.aspx?JournalIssueID=663
[8] http://www.indiaonward.com/cloud-helps-businesses-level-up-in-digital- india/
[9] http://www.cmai.asia/digitalindia/
AUTHORS
Mr. Kirtankumar R. Rathod received Bachelors degree of computer application in
2005, and Masters degree of computer applications in 2008 from Gujarat
University. He is having more than 7 Years of teaching experience. He has
presented 2 International and 5 National level conference papers. He is pursuing
Ph.D. in the field of spatial data mining.