Since Cloud Providers Supply Different Types Of Services, It Service Management And The Maturity Of
The Infrastructure, Virtualization And Automation Should Be Considered Crucial And Important. Cloud
Services Must Be Fully Managed And Designed To Provide Flexible And Reliable Access To Applications,
Resources And Services. In This Paper A Comprehensive Cloud Architecture Is Proposed, Which Based On
The It Service Management Frameworks, Reference Models And Cloud Architectures To Deliver Better
Services In Cloud Computing Environment. This Architecture Reuses Concepts And Techniques Already
Exist In A Few Best Itsm Reference Models In Operational Support Services Section Such As Prm-It, Itil
V3, Hp And Mof. In Addition Etom’s Processes Are Used In Business Support Services For Billing &
Revenue Management Also Cobit5’s Process Govern Itsm Of This Architecture In Governance Of It
Section. At The Same Time, This Paper Illustrates The Relationship Between Participating Processes. Four
Core Cloud Roles Are Defined And In The Last, Five Key Processes That Any Cloud Provider Must
Manage, Are Introduced. Finally, The Quality Management Processes Are Presented In Last Section.
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.
Delivering IT as A Utility- A Systematic Reviewijfcstjournal
Utility Computing has facilitated the creation of new markets that has made it possible to realize the longheld
dream of delivering IT as a Utility. Even though utility computing is in its nascent stage today, the
proponents of utility computing envisage that it will become a commodity business in the upcoming time
and utility service providers will meet all the IT requests of the companies. This paper takes a crosssectional
view at the emergence of utility computing along with different requirements needed to realize
utility model. It also surveys the current trends in utility computing highlighting diverse architecture
models aligned towards delivering IT as a utility. Different resource management systems for proficient
allocation of resources have been listed together with various resource scheduling and pricing strategies
used by them. Further, a review of generic key perspectives closely related to the concept of delivering IT
as a Utility has been taken citing the contenders for the future enhancements in this technology in the form
of Grid and Cloud Computing.
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM cscpconf
Cloud computing is a new emerging system which offers information technologies via Internet. Clients use services they need when they need and at the place they want and pay only for what they have consumed. So, cloud computing offers many advantages especially for business. A deep study and understanding of this emerging system and the inherent components help a lot in identifying what should we do in order to improve its performance. In this work, we present first cloud computing and its components then we describe an idea which attempts to optimize the management of cloud computing system that are composed of many data centers.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.
Delivering IT as A Utility- A Systematic Reviewijfcstjournal
Utility Computing has facilitated the creation of new markets that has made it possible to realize the longheld
dream of delivering IT as a Utility. Even though utility computing is in its nascent stage today, the
proponents of utility computing envisage that it will become a commodity business in the upcoming time
and utility service providers will meet all the IT requests of the companies. This paper takes a crosssectional
view at the emergence of utility computing along with different requirements needed to realize
utility model. It also surveys the current trends in utility computing highlighting diverse architecture
models aligned towards delivering IT as a utility. Different resource management systems for proficient
allocation of resources have been listed together with various resource scheduling and pricing strategies
used by them. Further, a review of generic key perspectives closely related to the concept of delivering IT
as a Utility has been taken citing the contenders for the future enhancements in this technology in the form
of Grid and Cloud Computing.
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM cscpconf
Cloud computing is a new emerging system which offers information technologies via Internet. Clients use services they need when they need and at the place they want and pay only for what they have consumed. So, cloud computing offers many advantages especially for business. A deep study and understanding of this emerging system and the inherent components help a lot in identifying what should we do in order to improve its performance. In this work, we present first cloud computing and its components then we describe an idea which attempts to optimize the management of cloud computing system that are composed of many data centers.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
The computer technologies have rapidly developed in both software and hardware field. The complexity of software is increasing as per the market demand because the manual systems are going to become automation as well as the cost of hardware is decreasing. High Performance Computing (HPC) is very demanding technology and an attractive area of computing due to huge data processing in many applications of computing. The paper focus upon different applications of HPC and the types of HPC such as Cluster Computing, Grid Computing and Cloud Computing. It also studies, different classifications and applications of above types of HPC. All these types of HPC are demanding area of computer science. This paper also done comparative study of grid, cloud and cluster computing based on benefits, drawbacks, key areas of research, characterstics, issues and challenges.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing performance evaluation issues and challenges3ijccsa
Cloud Computing makes the dream of computin
g real as a tool and in the form of service. This internet
-
based ongoing technology which has brought flexibility, capacity and power of processing has realized
service
-
oriented idea and has created a new ecosystem in the computing world with its great p
ower and
benefits. Cloud capabilities have been able to move IT industry one step forward. Nowadays, large and
famous enterprise have resorted to cloud computing and have transferred their processing and storage to
it. Due to popularity and progress of clo
ud in different organizations, cloud performance evaluation is of
special importance and this evaluation can help users make right decisions.
In
this paper
,
we
provide an
overall perspective on cloud evaluation criteria and highlight it with help of simula
tion.
For this purpose,
we present different major factors in cloud computing performance and we analyze and evaluate cloud
performance in various scenarios considering these factors.
There are five disruptive forces shaping IT today, but none has more wide-ranging impact on all enterprises than the emergence of cloud as a preferred means of service delivery. This article discusses the cloud industry and how WGroup can help give client a competitive advantage using a service delivery strategy and new IT operating models.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Model-Driven Architecture for Cloud Applications Development, A survey Editor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research problems.
SUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERSneirew J
ABSTRACT Market analyses show that some cloud providers are significantly more successful than others. The research on the success-driving business model characteristics of cloud providers and thus, the reasons for this performance discrepancy is, however, still limited. Whereas cloud business models have mostly been examined comprehensively, independently from the distinctly different cloud ecosystem roles, this paper takes a perspective shift from an overall towards a selective, role-specific and thereby ecosystemic perspective on cloud business models. The goal of this paper is specifically to identify the success-driving business model characteristics of the so far widely neglected cloud ecosystem’s core roles, IaaS and PaaS provider, by conducting an exploratory multiple-case study. 21 expert interviews with representatives from 17 cloud providers serve as central data collection instrument. The result is a catalogue of generic as well as cloud-specific, subdivided into role-overarching and role-specific, business model characteristics. This catalogue supports cloud providers in the initial design, comparison and revision of their business models. Researchers obtain a promising starting and reference point for future analysis of business models of various cloud ecosystem roles.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Presentation from Chesapeake Regional Tech Council\'s TechFocus Seminar on Cloud Security; Presented by Scott C Sadler, Business Development Executive - Cloud Computing, IBM US East Mid-Market & Channels on Thursday, October 27, 2011. http://www.chesapeaketech.org
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Cloud computing and Innovation in ManufacturingInfosys
The Cloud has the power to change the way products are made, by accelerating the development lifecycle, enabling seamless collaboration and creating a smooth and agile supply chain. This paper discusses how Cloud computing - representing a paradigm shift for manufacturers who strive for a smarter IT organization and business processes - provides an answer.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
Understanding Cloud Computing, It's Services, Benefits, And Challengestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSijccsa
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide
advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
"A brave, new business world."
It’s difficult to imagine any landscape that’s changed more than business-to-business. The last 5 years has seen almost all the rules re-written, re-worked or simply revoked. Social platforms. Mobile connectivity. Niche business media. Content as a sales source. Targeting business people as people. They're just the tip of a moving landscape. In the pages of 'Engaging a business audience of One,' the OgilvyOne thought-leaders examine each of these game-changers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
The computer technologies have rapidly developed in both software and hardware field. The complexity of software is increasing as per the market demand because the manual systems are going to become automation as well as the cost of hardware is decreasing. High Performance Computing (HPC) is very demanding technology and an attractive area of computing due to huge data processing in many applications of computing. The paper focus upon different applications of HPC and the types of HPC such as Cluster Computing, Grid Computing and Cloud Computing. It also studies, different classifications and applications of above types of HPC. All these types of HPC are demanding area of computer science. This paper also done comparative study of grid, cloud and cluster computing based on benefits, drawbacks, key areas of research, characterstics, issues and challenges.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing performance evaluation issues and challenges3ijccsa
Cloud Computing makes the dream of computin
g real as a tool and in the form of service. This internet
-
based ongoing technology which has brought flexibility, capacity and power of processing has realized
service
-
oriented idea and has created a new ecosystem in the computing world with its great p
ower and
benefits. Cloud capabilities have been able to move IT industry one step forward. Nowadays, large and
famous enterprise have resorted to cloud computing and have transferred their processing and storage to
it. Due to popularity and progress of clo
ud in different organizations, cloud performance evaluation is of
special importance and this evaluation can help users make right decisions.
In
this paper
,
we
provide an
overall perspective on cloud evaluation criteria and highlight it with help of simula
tion.
For this purpose,
we present different major factors in cloud computing performance and we analyze and evaluate cloud
performance in various scenarios considering these factors.
There are five disruptive forces shaping IT today, but none has more wide-ranging impact on all enterprises than the emergence of cloud as a preferred means of service delivery. This article discusses the cloud industry and how WGroup can help give client a competitive advantage using a service delivery strategy and new IT operating models.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Model-Driven Architecture for Cloud Applications Development, A survey Editor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research problems.
SUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERSneirew J
ABSTRACT Market analyses show that some cloud providers are significantly more successful than others. The research on the success-driving business model characteristics of cloud providers and thus, the reasons for this performance discrepancy is, however, still limited. Whereas cloud business models have mostly been examined comprehensively, independently from the distinctly different cloud ecosystem roles, this paper takes a perspective shift from an overall towards a selective, role-specific and thereby ecosystemic perspective on cloud business models. The goal of this paper is specifically to identify the success-driving business model characteristics of the so far widely neglected cloud ecosystem’s core roles, IaaS and PaaS provider, by conducting an exploratory multiple-case study. 21 expert interviews with representatives from 17 cloud providers serve as central data collection instrument. The result is a catalogue of generic as well as cloud-specific, subdivided into role-overarching and role-specific, business model characteristics. This catalogue supports cloud providers in the initial design, comparison and revision of their business models. Researchers obtain a promising starting and reference point for future analysis of business models of various cloud ecosystem roles.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Presentation from Chesapeake Regional Tech Council\'s TechFocus Seminar on Cloud Security; Presented by Scott C Sadler, Business Development Executive - Cloud Computing, IBM US East Mid-Market & Channels on Thursday, October 27, 2011. http://www.chesapeaketech.org
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Cloud computing and Innovation in ManufacturingInfosys
The Cloud has the power to change the way products are made, by accelerating the development lifecycle, enabling seamless collaboration and creating a smooth and agile supply chain. This paper discusses how Cloud computing - representing a paradigm shift for manufacturers who strive for a smarter IT organization and business processes - provides an answer.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
Understanding Cloud Computing, It's Services, Benefits, And Challengestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSijccsa
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide
advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
"A brave, new business world."
It’s difficult to imagine any landscape that’s changed more than business-to-business. The last 5 years has seen almost all the rules re-written, re-worked or simply revoked. Social platforms. Mobile connectivity. Niche business media. Content as a sales source. Targeting business people as people. They're just the tip of a moving landscape. In the pages of 'Engaging a business audience of One,' the OgilvyOne thought-leaders examine each of these game-changers.
Cloud Approach to IT Service Desk and Incident Management Bring Analysis, Low...Dana Gardner
Transcript of a BriefingsDirect podcast on how SaaS delivery and BMC Software’s “truth in data” architecture deliver big payoffs for IT support at Comverge and Design Within Reach.
Use of free or cheap tools from SAAS and the cloud to support ITSM. There's a lot out there that can plug a hole if you can't afford the big expensive tool sets.
Presented at itSMFA August 2010.
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
his article explores the question whether the relationship will be “a marriage made in heaven?” It also explores the issue of “who is the bride and who is the groom?” As you read further, you can also decide whether the relationship between Cloud Computing and ITSM is “for better or for worse?”
Integrating Service Catalog with the Business - Rapid and Relevant SLAsAxios Systems
To view this complimentary webcast in full, visit: http://forms.axiossystems.com/LP=298
Business and customer buy-in is essential for a successful Service Catalog so it is therefore important to ensure it is integrated with the business for maximum ROI. This video discusses how to get the most out of having a service catalog.
Revolutionising Cloud Operations with AWS Config, AWS CloudTrail and AWS Clou...Amazon Web Services
This session dives deep into several patterns from the checklist and shows how to apply and extend these patterns to support the Hybrid Cloud using AWS services such as AWS Config, AWS Cloudtrail and AWS Cloudwatch. Practical examples will demonstrate how these services can be combined with other AWS tools such as the AWS CLI and PowerShell in order to maximize the benefit to your organisation.
RightScale Webinar: Don’t pave the cow path. Cloud infrastructure is very different from traditional infrastructure and requires different approaches to really harness cloud value. From dev/test/prod lifecycle management to deployment automation, patch management, monitoring and automation for autoscaling and disaster recovery... we’ll provide insight into how we automate and manage cloud servers at RightScale to avoid having to get hands on. Especially at 3am.
This is my presentation to SecureCloud 2014.
Incident Response in the Cloud.
The presentation looks at the challenges in dealing with incident response in the cloud compared to traditional onsite response. It also suggests ways to overcome those challenges
For the past few years, the evolution of cloud computing has been potentially becoming one of the major advances in the history of computing. But is cloud computing the saviour of business? Does it signal the demise of the corporate IT functionality entirely? However, if cloud computing has to achieve its potential, there is a need to have a clear understanding of various issues involved, both from the perspectives of the providers and the consumers related to the technology, management and business aspects. Objective of this research is to explore the strategic business, management and technical challenges existing in cloud
systems. It is believed that adopting a methodology and suggesting a corresponding architectural framework would serve as a potential comprehensive conceptual tool, which shows path for mitigating challenges and hence effort are put in bringing in by mentioning a suitable methodology and its brief description. It concludes that International Business Machine Common Cloud Management Platform is one
way to realize the combined features of various models such as Hub & Spoke Model as a quality of Governance model; Gen-Spec Research Methodology design for semantic and quality research studies into one in the form of Reference Architecture. However in order to realize the full potential of the Customer- Respond-Adapt-Sense-Provider (conceptual) methodology for dealing with semantics, it is important to
consider Internet of Things Architecture Reference Model where in the resources are translated into Services.
Strategic Business Challenges in Cloud Systemsneirew J
For the past few years, the evolution of cloud computing has been potentially becoming one of the major
advances in the history of computing. But is cloud computing the saviour of business? Does it signal the
demise of the corporate IT functionality entirely? However, if cloud computing has to achieve its potential,
there is a need to have a clear understanding of various issues involved, both from the perspectives of the
providers and the consumers related to the technology, management and business aspects. Objective of this
research is to explore the strategic business, management and technical challenges existing in cloud
systems. It is believed that adopting a methodology and suggesting a corresponding architectural
framework would serve as a potential comprehensive conceptual tool, which shows path for mitigating
challenges and hence effort are put in bringing in by mentioning a suitable methodology and its brief
description. It concludes that International Business Machine Common Cloud Management Platform is one
way to realize the combined features of various models such as Hub & Spoke Model as a quality of
Governance model; Gen-Spec Research Methodology design for semantic and quality research studies into
one in the form of Reference Architecture. However in order to realize the full potential of the CustomerRespond-Adapt-Sense-Provider
(conceptual) methodology for dealing with semantics, it is important to
consider Internet of Things Architecture Reference Model where in the resources are translated into
Services.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
It auditing to assure a secure cloud computingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A PROPOSED MODEL FOR IMPROVING PERFORMANCE AND REDUCING COSTS OF IT THROUGH C...ijccsa
Information technologies are affecting the big business enterprises of todays from data processing and
transactions to achieve the goals efficiently and effectively, affecting creates new business opportunities
and towards new competitive advantage, service must be enough to match the recent trends of IT such as
cloud computing. Cloud computing technology has provided all IT services. Therefore, cloud computing
offers an alternative to adaptable with technology model current , creating reducing cost (Fixed costs and
ongoing), the proliferation of high speed Internet connections through Rent, not acquisitions, cheaper
powerful computing technology and effective performance. The public and private clouds are characterized
by flexibility, operational efficiency that reduces costs improve performance. Also cloud computing
generates business creativity and innovation resulted from collaborative ideas of users; presents cloud
infrastructure and services; paving new markets; offering security in public and private clouds; and
providing environmental impact regarding utilizing green energy technology. In this paper, the main
concentrate the cloud computing.
A Proposed Model for Improving Performance and Reducing Costs of IT Through C...neirew J
Information technologies are affecting the big business enterprises of todays from data processing and
transactions to achieve the goals efficiently and effectively, affecting creates new business opportunities
and towards new competitive advantage, service must be enough to match the recent trends of IT such as
cloud computing. Cloud computing technology has provided all IT services. Therefore, cloud computing
offers an alternative to adaptable with technology model current , creating reducing cost (Fixed costs and
ongoing), the proliferation of high speed Internet connections through Rent, not acquisitions, cheaper
powerful computing technology and effective performance. The public and private clouds are characterized
by flexibility, operational efficiency that reduces costs improve performance. Also cloud computing
generates business creativity and innovation resulted from collaborative ideas of users; presents cloud
infrastructure and services; paving new markets; offering security in public and private clouds; and
providing environmental impact regarding utilizing green energy technology. In this paper, the main
concentrate the cloud computing.
A review on serverless architectures - function as a service (FaaS) in cloud ...TELKOMNIKA JOURNAL
Emergence of cloud computing as the inevitable IT computing paradigm, the perception of the compute reference model and building of services has evolved into new dimensions. Serverless computing is an execution model in which the cloud service provider dynamically manages the allocation of compute resources of the server. The consumer is billed for the actual volume of resources consumed by them, instead paying for the pre-purchased units of compute capacity. This model evolved as a way to achieve optimum cost, minimum configuration overheads, and increases the application's ability to scale in the cloud. The prospective of the serverless compute model is well conceived by the major cloud service providers and reflected in the adoption of serverless computing paradigm. This review paper presents a comprehensive study on serverless computing architecture and also extends an experimentation of the working principle of serverless computing reference model adapted by AWS Lambda. The various research avenues in serverless computing are identified and presented.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Benefits and Challenges of the Adoption of Cloud Computing in Businessneirew J
The loss of business and downturn of economics almost occur every day. Thus technology is needed in
every organization. Cloud computing has played a major role in solving the inefficiencies problem in
organizations and increase the growth of business thus help the organizations to stay competitive. It is
required to improve and automate the traditional ways of doing business. Cloud computing has been
considered as an innovative way to improve business. Overall, cloud computing enables the organizations
to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs
in organizations expenses are avoided using cloud computing. Although cloud computing can provide
advantages but it does not mean that there are no drawbacks. Security has become the major concern in
cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud
storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some
solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary
research, that is collecting data from published journal papers and conference papers.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
Intellectual Point is a Global Information Technology, Training, Consulting and Software Development Company. Intellectual Point provides professional hands-on computer and IT training as well as certifications to prepare you with the marketable skills and knowledge needed for today’s competitive job market.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Developing a new architecture to improve itsm on cloud computing environment
1. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
DOI : 10.5121/ijccsa.2014.4102 11
DEVELOPING A NEW ARCHITECTURE TO IMPROVE
ITSM ON CLOUD COMPUTING ENVIRONMENT
Fatemeh Arabalidousti 1
, Ramin Nasiri 2
and Mahsa razavi Davoudi3
1,2,3
Department of Computer Engineering, Islamic Azad University, Central Tehran
Branch, Tehran, Iran
ABSTRACT
Since Cloud Providers Supply Different Types Of Services, It Service Management And The Maturity Of
The Infrastructure, Virtualization And Automation Should Be Considered Crucial And Important. Cloud
Services Must Be Fully Managed And Designed To Provide Flexible And Reliable Access To Applications,
Resources And Services. In This Paper A Comprehensive Cloud Architecture Is Proposed, Which Based On
The It Service Management Frameworks, Reference Models And Cloud Architectures To Deliver Better
Services In Cloud Computing Environment. This Architecture Reuses Concepts And Techniques Already
Exist In A Few Best Itsm Reference Models In Operational Support Services Section Such As Prm-It, Itil
V3, Hp And Mof. In Addition Etom’s Processes Are Used In Business Support Services For Billing &
Revenue Management Also Cobit5’s Process Govern Itsm Of This Architecture In Governance Of It
Section. At The Same Time, This Paper Illustrates The Relationship Between Participating Processes. Four
Core Cloud Roles Are Defined And In The Last, Five Key Processes That Any Cloud Provider Must
Manage, Are Introduced. Finally, The Quality Management Processes Are Presented In Last Section.
KEYWORDS
Cloud Computing Architecture, IT Service Management Frameworks, Reference Model, Cloud Roles,
Quality management.
1. INTRODUCTION
cloud computing brings along a new IT provisioning model, characterized by keywords like
ubiquitous, service-centric, scalable, consumption based and self-service. Cloud computing thus
can be defined “[…] as an IT deployment model, based on virtualization, where resources, in
terms of infrastructure, applications and data are deployed via the internet as a distributed
service by one or several service providers. These services are scalable on demand and can be
priced on a pay-per-use basis” [1].
The NIST definition lists three "service models" (software, platform and infrastructure), and four
"deployment models" (private, community, public and hybrid) that together categorize ways to
deliver cloud services. The definition is intended to serve as a means for broad comparisons of
cloud services and deployment strategies, and to provide a baseline for discussion from what is
cloud computing to how to best use cloud computing [2].
In the other hand, IT Service Management represents an evolution from managing IT as a
technology to managing IT as a business. As businesses move toward On Demand environments,
IT organizations are faced with the daunting challenge of increasing the quality of services
provided to business, while simultaneously addressing faster rates of change, rising technical
complexity, cost pressures, and compliance issues. IT Service Management provides for the
2. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
12
effective and efficient delivery of IT Services in support of changing business needs. When all of
these components come together, they can make IT more efficient and effective [3].
Using of ITSM frameworks, like PRM-IT, ITIL v3, HP, MOF, in cloud environments,
which is a service oriented environment, can be quite useful to manage IT services.
In addition, to propose this architecture, cloud computing reference architectures, such as IBM,
Oracle, Cisco, HP, NIST are used.
The next section presents related work about cloud and ITSM, and then proposed architecture is
introduced.
2. RELATED WORK
Different architectures have been presented for cloud computing environment. IBM Cloud
Computing Reference Architecture defines the basic elements of cloud computing
architecture. This architecture has been structured modularly such that main roles and
elements have been defined in the highest level of abstraction [4]. In the NIST Reference
Model, there are five main actors: consumers, cloud broker, cloud auditor, cloud carrier
and cloud provider .Each actor may be a person or an organization that plays role in
transactions or functions available in the cloud [5]. The key components of Oracle
architecture are physical resources, cloud builder, cloud application builder, SaaS
consumers, cloud management infrastructure and cloud application management. This
architecture provides three key perspectives on consumer, provider and broker [6]. HP Cloud
System is an integrated system for the management of cloud services across private, public
and hybrid clouds. The result of this composition is perfect solution for cloud which can
provide cloud driven services for organizations [7]. Cisco has developed the depiction of a
cloud reference architecture model, which portrays the architectural layers, connected via
APIs and repositories. Cisco’s layer are Data center technology architecture, security layer,
service orchestration layer, Service delivery and management layer and cloud services
consumer layer [8].
There are some papers about ITSM and cloud. A paper of itSMF Deutschland e.V. postulates
that there can be no cloud computing without ITSM [9]. Cloud computing allows to establish
a new provisioning model for IT and IT services [1]. Therefore, it can be assumed that the
common ITSM has to change or to self-propagate respectively. During the second half of the
20th century, increasing importance of Information Technology (IT) for business processes
required a process- and service-oriented IT service-delivery [10], Therefore different
approaches for effective and efficient IT provisioning have been developed. Some of them
are established as best practices [11]. ITSM thus stands for a process to plan and to control
the quality and quantity of provided IT services considering the objectives of business
processes, customer orientation and cost optimization [10] and can be defined as “[…] a
set of specialized organizational capabilities for providing value to customers in the form
of services” [12]. A collection of best practices in ITSM, the Information Technology
Infrastructure Library (ITIL), established as so called de-facto-standard in service oriented
IT management [13]. While ITIL was first published in 1989 by Central Computer and
Telecommunications Agency (CCTA) and recently the second revision of version 3 was released
by the Office of Government Commerce (OGC) [14], the term “cloud computing” has been
used only recently in scientific publications. “IT can be seen as the consequent evolution of
the traditional on-premise computing spanning outsourcing stages from total to the
selective, and from the multi-vendor outsourcing to an asset-free delivery” [15].
3. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
13
there are a lot of publications focusing on special aspects in ITSM in cloud Environments.
Mapping to the ITSM-processes according to the ITIL v3 standard, most of the publications
are about service level management (SLM), information security management (SEC),
service desk, incident and problem management (INC, PRO), service asset & configuration
management (CFG) and change management. Actually ITIL v3 defines approximately 26
processes and functions [16].
PRM-IT, IBM Process Reference Model, is an overall view of the processes involved in the
information technology management. This model was proposed by IBM in 2008[17].
Microsoft Operations Framework (MOF) was introduced in 2008, which manages IT services in 3
main phases and 1 managerial layer [18]. HP IT Service Management Reference Model is
composed of five services, which was published in 2000[19].
3. PROPOSED ARCHITECTURE
Proposed Architecture is composed of IT service Management process based on best practices,
including PRM-IT, ITIL v3, Cobit5 and eTOM [20]. This architecture gives Cloud Provider the
ability to significantly improve efficiency and effectiveness. This paper enables to easily
understand processes, the relationships between process, and the roles involved in an efficient
process implementation.
According to different mappings between ITIL v3, PRM-IT, HP and MOF, PRM-IT has been
chosen as a comprehensive reference model for the proposed architecture [20]. This architecture
uses eTOM processes associated with bills management [21]. COBIT5 has been considered as a
comprehensive governance framework in architecture because it is a robust business framework
for management and governance of IT organizations [22]. Therefore, its governance processes are
used in this architecture. Figure 1 shows the proposed architecture.
Figure 1. The Proposed Architecture Model
4. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
14
In this paper, the proposed architecture focuses on all potential activities that could occur within
the Governance of IT and CPAM. Service provider, Service developer, consumer, User, supplier
and Business are working based on processes of Governance and CPAM. Comprehensive and
effective activity sets in this architecture are shown in figure 2.
Figure 2. Cloud Activities Set
This architecture contains the following resources:
3.1. Cloud Process
A structured set of activities designed to accomplish a specific objective. A process may include
any of the roles, responsibilities, tools and management controls required to reliably deliver the
outputs [3].
This processes described within Proposed Architecture are closely aligned with PRM-IT, ITIL v3,
Cobit5 and eTOM. While IT reference models like ITIL provide high-level guidance for what
should be implemented, PRM-IT offers detailed process guidance for all activities.
3.2. Cloud Roles
A role is an abstract definition of a set of responsibilities that encompass tasks to be performed
and work products to be produced [3]. In the proposed architecture, there are 4 types of major
roles:
This Architecture proposes four core cloud roles – Cloud service developer, Cloud service
provider, Cloud service consumer and Cloud auditor- supplemented with several sub-roles as can
be seen in figure 3.
5. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
15
Figure 3. Major roles
The generic roles that are referenced by the specific roles assigned to the various processes in
Cloud provider.
There are three types of generic roles in CPAM part:
Cloud Process Administrator: The Process Administrator supports the Process Manager by
managing records, tracking action items, and providing process-related reports [3].
Cloud Process Manager: The Process Manager performs the day-to-day overall management of
the process. This role ensures that all process activities are being performed and that they are
staffed adequately [3].
Cloud Process Owner: The Process Owner is the sponsor of the process, and holds the
responsibility and executive authority for the overall process results across the enterprise [3].
4. DETAILED ARCHITECTURE COMPONENTS
4.1. Architecture Components in cloud Service Provider Section
4.1.1. Service Orchestration
Service Orchestration refers to the composition of system components to support the
Cloud Providers activities in arrangement, coordination and management of computing resources
in order to provide cloud services to Cloud Consumers [5].
This section composed of two parts:
Services: All services of cloud are delivered in this part by cloud provider. (Infrastructure-as-a-
Service, Platform-as-a-Service, Software-as-a-Service, Business-Process-as-a-Service, Data
Storage-as-a-Service)[4, 5].
6. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
16
Infrastructure: This layer includes all the physical computing resources. It has two elements.
Hardware and Facility [5].
4.1.2. Cloud Provision and Management(CPAM)
This part exposes a set of business and operational management focused services. These functions
must be exploited by Cloud Services to run within the context of the respective cloud service
provider.
4.1.2.1. Businesses Support Services
Business Support Services represents the set of business-related services, which are needed by
Cloud Service Developer to implement a cloud service. Figure 4 shows Details of Business
Support Services in the Proposed Architecture Model.
Figure 4. Details of Business Support Services in the Proposed Architecture Model
4.1.2.1.1. Account Management:
This section is part of the IBM architecture model and describes the processes involved in
managing of client accounts [4, 20].
4.1.2.1.2. Billing and Revenue Management:
This section is responsible for the collection of appropriate usage records, determining charging
and billing information, production of timely and accurate bills, for providing pre-bill use
information and billing to customers, for processing their payments, and performing
payment collections, These processes are part of the eTOM process framework [20, 21].
7. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
17
Process
This process category is composed of these processes:
• Bill Invoice Management
Ensure the bill invoice is created, physically and/or electronically produced and distributed
To customers, and that the appropriate taxes, discounts, adjustments, rebates and credits
For the products and services delivered to customers have been applied [21].
• Service Guiding & Mediation
Manage usage events by correlating and formatting them into a useful format as well as
Guiding them to an appropriate service [21].
• Bill Inquiry Handling
Ensure the timely and effective fulfillment of all customer bill inquiries and complaints Manage
Billing Events [21].
• Charging
The purpose of Charging is to assign a value (monetary or other) to an event or product,
Or combination [21].
• Bill Payments & Receivables Management
Ensure that enterprise revenue is collected through pre-established collection channels and put in
place procedures to recover past due payments [21].
• Resource Mediation & Reporting
Manage resource events by correlating and formatting them into a useful format [21].
• S/P Settlements & Payments Management
S/P Settlements & Payments Management processes manage all settlements and payments for the
enterprise, including invoice validation and verification and payment authorization [21].
• Manage Billing Events
The billing events management processes encompass the functions required to guide, distribute,
mediate, summarize, accumulate, and analyze billing event records [21].
4.1.2.2. Operational Support Services
This section represents the operational management and technical-related services, which are
needed by Cloud Service Developer to implement a cloud service [20]. These services use PRM-
IT Reference Model process. PRM-IT may be selected among other frameworks such as ITIL v3,
HP, MOF as a more complete reference and used set forth in the operational section of the
proposed architecture [20].
Figure 5 shows Details of Operational Support Services the Proposed Architecture Model.
8. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
18
Figure 5. Details of Operational Support Services the Proposed Architecture Model
4.1.2.2.1. Customer relationships Management
The Customer Relationships process category gives IT service providers a mechanism to
understand, monitor, perform and compete effectively in the marketplace they serve [17].
Processes
This process category is composed of these processes:
• Service Marketing and Sales
The process is Marketing IT services to IT customers [17].
• Service Catalog Management
The purpose of the Service Catalog Management process is to provide an authoritative source of
consistent information on all agreed services and ensure that it is widely accessible to those who
are approved to view this information. [17].
• Service Level Management
Service Level Management is the process of negotiating, defining, measuring, managing and
improving the quality of IT services at an acceptable cost [17].
• Demand Management
The purpose of the IT Demand Management process is to manage the demand for IT services
[17].
• IT Customer Transformation Management
The purpose of the IT Customer Transformation Management process is to assist customers in the
transformation of their business throughout the life cycle [17].
• Customer Satisfaction Management
The purpose of the Customer Satisfaction Management process is measuring how satisfied
customers are with IT services [17].
9. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
19
Figure 6 shows the relationship between Customer Relationships Management process category
and other process category.
Figure 6. Relationship between Customer Relationships Management process category and other process
category
4.1.2.2.2. Direction
The Direction process category aligns the IT outcomes to support the business strategy,
minimizes risk exposures, and manages the IT Architecture and IT Portfolio [17].
Processes
This process category is composed of these processes:
• IT Strategy
The purpose of the IT Strategy process is to determine the overall direction of the IT organization
[17].
• IT Research and Innovation
The IT Research and Innovation process exists to identify new IT technology trends [17].
• Architecture Management
The Architecture Management process exists to create, maintain, promote and govern the use of
IT architecture models and standards, across and within business change programs [17].
• Product Management
Product Management is the management of an IT product through its lifecycle [17].
• Portfolio Management
The purpose of the Portfolio Management process is to manage the set of all IT projects and
initiatives [17].
10. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
20
• Program and Project Management
The purpose of Program and Project Management is to manage IT development and other
projects [17].
Figure 7 shows the relationship between Direction process category and other process category.
Figure 7. Relationship between Direction process category and other process category
4.1.2.2.3. Realization Management
The Realization process category exists to create solutions that will satisfy the requirements of IT
customers and stakeholders, including both the development of new solutions and the
enhancements or maintenance of existing ones [17].
Processes
This process category is composed of these processes:
• Solution Requirements
This process focuses on Identifying and specifying IT solution requirements [17].
• Solution Analysis and Design
The Solution Analysis and Design process exists to create a fully documented design from the
agreed solution requirements, describing the behaviour of solution elements, the acceptance
criteria, and agreed measurements [17].
• Solution Development and Integration
11. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
21
The Solution Development and Integration process exists to bring together all of the elements
specified by the solution design [17].
• Solution Test
The Solution Test process exists to validate prior to deployment that the solution and its features
conform to design specifications and requirements [17].
• Solution Acceptance
The purpose of the Solution Acceptance process is to validate that the proposed solution, either as
individual artefacts or in its complete form, meets acceptance criteria at defined checkpoints [17].
Figure 8 shows the relationship between Realization process category and other process category.
Figure 8. Relationship between Realization process category and other process category
4.1.2.2.4. Transition Management
The Transition category of processes exists to support any aspect related to a life cycle status
change in solutions and services [17].
Processes
This process category is composed of these processes:
• Change Management
Change Management typically begins with the creation of a Change Request (RFC). The change
request documents details of the proposed change in order to support a range of business and
12. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
22
technical assessments, leading to approval (or rejection) and ultimately to application of the
change [17].
• Release Management
The purpose of the Release Management process is to prepare and finalize release packages [17].
• Deployment Management
The purpose of the Deployment Management process is to place releases and other desired
changes into their target environments [17].
• Configuration Management
Configuration Management identifies, controls, and maintains all elements in the IT infrastructure
called Configuration Items [17].
• Asset Management
Asset Management is to account for and manage all IT assets in the enterprise, throughout all
stages of their lifecycle [17].
Figure 9 shows the relationship between Transition process category and other process category.
Figure 9. Relationship between Transition process category and other process category
4.1.2.2.5. Operation Management
This category contains the operational service processes that enable daily IT activities using
available infrastructure, applications, and services to meet service level agreements (SLAs) and
business objectives [17].
13. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
23
Processes
This process category is composed of these processes:
• Request Fulfillment
Request Fulfilment is the initial support handling of contact with IT users [17].
• Service Execution
Service Execution is the actual delivery of a service to IT users [17].
• Data Management
Data Management oversees data lifecycles as well as backups and restores [17].
• Event Management
The purpose of the Event Management process is to identify and prioritize infrastructure, service,
business process and security events, and to establish the appropriate response to those events,
especially responding to conditions that could lead to potential faults or incidents. [17].
• Incident Management
Incident Management provides rapid response to possible service disruptions [17].
• Problem Management
Problem Management identifies and resolves the root causes of service disruptions [17].
Figure 10 shows the relationship between Operation process category and other process category.
Figure 10. Relationship between Operation process category and other process category
4.1.2.2.6. Resilience Management
The Resilience category of processes describes the analysis and proactive planning required
enabling resilient infrastructure, applications, and services [17].
14. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
24
Processes
This process category is composed of these processes:
• Compliance Management
The purpose of the Compliance Management process is to ensure adherence to laws and
regulations, internal policies, procedures, and stakeholder commitments [17].
• Availability Management
The purpose of Availability Management is to match the availability of the IT services against the
current and future identified needs of the business or to exceed them [17].
• Capacity Management
The purpose of Capacity Management is to match the capacity of the IT services and
infrastructure to the current and future identified needs of the business [17].
• Facilities Management
The purpose of the Facilities Management process is to create and maintain a physical
environment that houses IT resources and to optimize the capabilities and cost of that
environment [17].
• IT Service Continuity Management
The purpose of the Service Continuity Management process is to ensure that agreed IT services
will support business requirements in the event of a disruption to the business, based on the
committed recovery schedule [17].
Figure 11 shows the relationship between Resilience process category and other process category.
15. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
25
Figure 11. Relationship between Resilience process category and other process category
4.1.2.2.7. Administration
The Administration process category brings together the processes that look after many of the
non-technical resources: people, finances, and contracts, among others that support IT service
delivery [17].
Processes
This process category is composed of these processes:
• Financial Management
Financial Management aims to assist the internal IT organization with the cost-effective
management of the IT resources required for the provision of IT services [17].
• Supplier Management
The purpose of the Supplier Management process is to manage interactions with suppliers and
partners formally by selecting them based on their ability [17].
• Service Pricing and Contract Administration
The purpose of the Service Pricing and Contract Administration process is to establish a pricing
mechanism for the IT entity to sell its services [17].
• Workforce Management
The purpose of the Workforce Management process is to provide the optimal mix of staffing
(resources and skills) in order to deliver the agreed IT services at the negotiated service levels and
Commitments [17].
16. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
26
• Knowledge Management
The purpose of the Knowledge Management process is to Capture and manage IT intellectual
capital [17].
Figure 12 shows the relationship between Resilience Administration process category and other
process category.
Figure 12. Relationship between Administration process category and other process category
4.2. Architectural Components in cloud Service Consumer Section
4.2.1. Cloud Service Integration Tools
These tools integrate cloud services for consumer [4].
4.2.2. Consumer In-house IT
Consumer In-house IT should be integrated with cloud services consumed from a cloud service
provider, the aforementioned cloud service integration tools are required [4].
4.3. Architectural Components in cloud Service Developer Section
The service developer creates, publishes and monitors the cloud service. This section includes
three parts. Development environments for service creation vary. If developers are creating a
SaaS application, they are most likely writing code for an environment hosted by a cloud provider
[5].
17. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
27
4.3.1. Service Creation
Developers create cloud services [5].
4.3.2. Service publishing
Cloud services, will be published by the developers [5].
4.3.3. Service Analytics
During service creation, analytics involve remote debugging to test the service before it is
published to consumers [20]. Once the service is published, analytics allow developers to monitor
the performance of their service and make changes as necessary [5].
4.4. Architectural Components in cloud Auditor Section
A cloud auditor is a party that can perform an independent examination of cloud service controls
with the intent to express an opinion thereon. Audits are performed to verify conformance to
standards through review of objective evidence [5].
This section has three parts:
4.4.1. Security Audit
A cloud auditor can make an assessment of the security controls in the information system to
determine the extent to which the controls are implemented correctly, operating as
intended, and producing the desired outcome with respect to the security requirements for
the system [5].
4.4.2. Privacy Impact Audit
A privacy impact audit can help organization comply with applicable privacy laws and
regulations governing an individual’s privacy, and to ensure confidentiality and integrity[5].
4.4.3. Performance Audit
To evaluate the performance takes place [5].
4.5. Security, Resiliency, Performance & Consumability
These non-functional aspects must be viewed from an end-to-end perspective including the
structure of architecture by itself, the way the hardware infrastructure is set up (e.g. in terms of
isolation, network zoning setup, data center setup for disaster recovery, etc.) and how the cloud
services are implemented[10].
4.6. Governance of IT
Deal with the stakeholder governance objectives—value delivery, risk optimisation and resource
optimisation—and include practices and activities aimed at evaluating strategic options,
providing direction to IT and monitoring the outcome [22]. This domain contains five governance
components and uses COBIT5’s processes
Figure 13 shows Relationship between Governance of IT category and other process category
18. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
28
Figure 13. Relationship between Governance of IT category and other process category
4.6.1. Ensure Governance Framework Setting and Maintenance
Analyse and articulate the requirements for the governance of enterprise IT, and put in place and
maintain effective enabling structures, principles, processes and practices, with clarity of
responsibilities and authority to achieve the enterprise’s mission, goals and objectives [22].
4.6.2. Ensure Benefits Delivery
Optimise the value contribution to the business from the business processes, IT services and IT
assets resulting from investments made by IT at acceptable costs [22].
4.6.3. Ensure Risk Optimisation
Ensure that the enterprise’s risk appetite and tolerance are understood, articulated and
communicated, and that risk to enterprise value related to the use of IT is identified and managed
[22].
4.6.4. Ensure Resource Optimisation
Ensure that adequate and sufficient IT-related capabilities (people, process and technology) are
available to support enterprise objectives effectively at optimal cost [22].
19. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
29
4.6.5. Ensure Stakeholder Transparency
Ensure that enterprise IT performance and conformance measurement and reporting are
transparent, with stakeholders approving the goals and metrics and the necessary remedial actions
[22].
5. FIVE KEY PROCESSES OF ITSM
Implement of all the processes have a large overload. So some organization cannot implement all
of them. In this situation, at least five key processes must be implemented: Incident management,
problem management, Change management, Configuration management and service Level
management.
The traditional ITSM processes rely on a central CMDB. Looking to a cloud environment,
configuration items (CI) are distributed across a numerous service providers and there is no
single-point-of-truth. Thus the approach of a central CMDB does not work in a cross-
domain or cross-provider environment. Especially the lack in notion of dependency of one CI
on another seems to be an actual challenge. Given these pre-conditions, Wassermann et al. (2009)
respectively Ludwig et al. (2009) designed the “Distributed Configuration Management” (DCM)
and “Smart
Configuration Items” (SCI) which can be exposed to other domains using a defined interface
based on Representational State Transfer (REST), IBMs Web Sphere sMash, Mashups and
AJAX [23].
There is very legitimate need for a clear and formal methodology to handle SLAs in the context
of cloud computing. WSLA, which suggests very flexible architecture for managing SLAs
between providers and consumers, seem to be the most suitable candidate. In applying WSLA
however, the need for a host of support services arises. Some cloud computing providers may
provide these support services but WSLA does not strictly mandate such provisions and hence
third parties can step into provide the necessary services. We see this as one of the strong points
of WSLA where, true to the paradigm of SOA, every functionality is provided as a service that
may not necessarily come from the same provider [24].
Problem management has the dual goals of minimizing the adverse impact of errors within the IT
infrastructure, and preventing the recurrence of incidents related to those errors and classes of
those errors. However, many organizations believe they have implemented problem management
when in reality they may have only become better at managing incidents. These organizations do
not fully execute or manage all facets of problem management and therefore do not realize its full
benefits [25].
6. Quality management of proposal architecture
Quality Management ensures the quality of all IT products and services. This process focuses on
assuring that specific work outcomes are of a high quality. This applied process includes
workflow from Compliance Management, Solution Test, and Service Execution.
This is an ongoing research and further results would be published shortly.
20. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
30
7. CONCLUSION
Cloud computing is the fundamental change in technology at the moment. According to its many
advantages such as on-demand self-service , broad network access, resource pooling, rapid
elasticity or expansion , and measured service, Most organization are moved toward the cloud
computing. Since this environment is conceived service-oriented and many IT services are
provided to customer, service management and delivery of comprehensive architecture for this
environment are important. To improve the management of services in cloud computing the
proposed architecture is introduced.
IT service management frameworks and reference models such as PRM-IT, ITIL v3, HP, MOF,
eTOM, COBIT5 are used to provide better services in different parts of this architecture.
Operational support services section is composed of PRM-IT. eTOM’s processes are used in
business support services for billing & revenue management and COBIT5’s process govern ITSM
of this architecture in Governce of IT section. In addition, few important cloud architecture are
compared, the strengths of each have been obtained and deployed in proposed architecture.
At the same time, the relationship between processes of Operational support services and
Governce of IT are shown in detail. Any section of this architecture is described with its
processes in details. Four core cloud roles are defined. All of the processes in this architecture are
important to implement complete ITSM in cloud, but Due to the constraints, some organization
can not apply all the processes. So Five processes are introduced as fundamental and key of ITSM
processes. Finally, the Processes that are involved in quality management are presented in last
section. This processes ensures the quality of all IT products and services.
REFERENCES
[1] Böhm, M.; Leimeister, S.; Riedl, C.; Krcmar, H. 2009. Cloud computing: outsourcing 2.0 or a new
business model for IT provisioning. In: Information Management & Consulting, No. 24(2), pp.
6-14.
[2] Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft).2011." NIST
special publication 800.145.
[3] IBM Corporation, IBM Tivoli unified process.
[4] IBM Advisory Group.2011.“Introduction and Architecture Overview IBM Cloud Computing
Reference Architecture 2.0”.
[5] Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. 2011. NIST cloud computing
reference architecture. NIST special publication, 500, 292
[6] ORACLE Advisory Group,2011. “Oracle® Reference Architecture”.
[7] HP Advisory Group,2011. “Understanding the HP cloud System Reference Architecture”.
[8] Cisco Advisory Group, 2009. “Cisco Cloud Computing - Data Center Strategy, Architecture, and
Solutions”.
[9] Koll, S. 2010, Kein Cloud Computing ohne IT Service Management. Positionspapier Cloud
Computing und IT Service Management.
[10] Kopperger, D.; Kunsmann, J.; Weisbecker, A. 2009. IT-Servicemanagement. In: Handbuch IT-
Management. Eds.: Tiemeyer, E. Carl Hanser Verlag, München 2009, pp. 126-263.
[11] Schwarzer, B.; Krcmar, H. 2010.Wirtschaftsinformatik, Schäffer-Poeschel Verlag, Stuttgart .
[12] OGC .2007. Service Strategy, TSO, Norwich (GB) 2007.
[13] Krcmar, H. 2010. Informationsmanagment, Springer, Berlin, Heidelberg.
[14] Böttcher, R. 2010. IT-Service-Management mit ITIL V3, Heise, Hannover.
[15] Böhm, M.; Leimeister, S.; Riedl, C.; Krcmar, H. 2009. Cloud computing: outsourcing 2.0 or a new
business model for IT provisioning. In: Information Management & Consulting. No. 24(2), pp.
6-14.
[16] Wischki, C. 2009. ITIL V2, ITIL V3 und ISO/IEC 20000, Cal Hanser Verlag, München, Wien.
[17] IBM Advisory Group,2008. PRM – IT IBM Process Reference Model for IT, IBM Corporation.
21. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 4, No. 1, February 2014
31
[18] Pultorak, D., Henry, C., & Leenards, P. 2008. MOF 4.0: Microsoft Operations Framework 4.0. Van
Haren Publishing.
[19] ITSMRM, H. 2000. HP IT Service Management Reference Model. Technical White Paper. Palo Alto,
California, USA: Hewlett–Packard Company. Accessed on Sptember.
[20] Arabalidousti, Fatemeh, and Ramin Nasiri.2013, Improving IT Service Management Architecture in
Cloud Environment on Top of Current Frameworks. The International Conference on Digital
Information Processing, E-Business and Cloud Computing (DIPECC2013). The Society of Digital
Information and Wireless Communication.
[21] TM Forum Advisory Group,2012. “eTOM (Business Process Framework)”, TM Forum.
[22] Information Systems Audit, 2012. Control Association, & Control Association. ISACA. COBIT5
Five: A Business Framework for the Governance and Management of Enterprise IT. ISACA.
[23] Wassermann, B.; Ludwig, H.; Laredo, J.; Bhattacharya, K.; Pasquale, L. 2009. Distributed cross-
domain change management. Paper presented at the IEEE International Conference on Web
Services, pp. 59-66.
[24] Pankesh Patel , Ajith Ranabahu , Amit Sheth . 2009. Service Level Agreement in Cloud Computing.
(2009) No. 24(2), pp. 6-14.
[25] MOF Advisory Group. 2013. ” Problem management for reliable online services”,2013
Authors
1. Fatemeh arabalidousti was born in 1985 in Tehran (Iran) Where she received B.Sc in Computer
software engineering from Dr. Shariaty University in 2011. She is studing M.Sc in Islamic Azad
University, Central Tehran Branch from 2011 up to now. She has been working in business process
improvement and system design field. She is interested in Cloud Architecture, Cloud Security, IT Service
Management Frameworks (ITIL, PRM-IT, MOF, HP), Cloud Computing and Grid Computing. She
published some papers in these fields.
2. Ramin Nassiri was born in 1967 in Tehran(Iran) where he receiced B.Sc in
Computersoftware engineering from Tehran University in 1989. Later on he recived
his M.Scand PhD in the same area in 2003. He joined to Islamic Azad
University,Central Tehran Branch,College of Engineering since 2000 as a faculty
member and is a full time assistant professor there.He is a member of editorial team
of Internation journal of Computing intelligence, resarch and practices in SIU
university,IL,USA. He has been managing a few Nation-wide and enterprise wide
ICT project in a variety of ICT areas including ERP, Electronic Transactions,
ITSM, Software testing and etc. He has been also managing well-known IT and
telecom companies since last 15 years onwards in Iran and UAE.
3. Mahsa Razavi Davoudi, Assistant Professor of Computer Engineering Department of Central Tehran
Branch, Islamic Azad University of Iran. She has earned her Doctor of Philosophy at the Computer
Engineering Department, Science and Research Branch, Islamic Azad University of Iran. Her research
interests are Enterprise Architecture, Software Architecture, Service-oriented Architectures, Cloud
Computing, Quality attributes, Assessment methods and Decision making.