Effective Methodologies for Enhancing Cloud Management in New Modern Enterprises

L. Aruna

Abstract


Today Cloud computing is altering the way industries and enterprises do their businesses in that with passion scalable and virtualized assets are provided as a service over the Internet. This new model creates a brand new chance for enterprises. In this paper, some of the essential features of effective methodologies for cloud computing in the modern enterprise are briefly discussed with regard to the end-users, enterprises that use the cloud as a platform, and cloud providers themselves. Cloud Computing is capable as one of the main enablers for the all new manufacturing industry, it can transform the usual manufacturing business model, help it to align product innovation with business strategy, and create intelligent factory networks that support successful collaboration. Cloud computing has been in some of the major key areas of manufacturing industries such as IT, pay-as-you-go business models, productions calling up and down per require, and elasticity in deploying and customizing solutions. Clients can use cloud services according to their requirements. Cloud users can request services ranging from product design, manufacturing, testing, management, and all others tags of a product life cycle. Cloud Managed service provider (CMSP) is a company that distantly manages a customer's IT communications and/or end-user systems, typically on a proactive basis and under a subscription model.

Full Text:

PDF

References


K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” Internet Computing, IEEE, vol. 16, no. 1, jan.-feb. 2012, pp. 69 –73.

P. Silva, C. Westphall, C. Westphall, M. Mattos, and D. Santos, “An architecture for risk analysis in cloud,” in ICNS 2014, The Tenth International Conference on Networking and Services, 2014, pp. 29–33.

F. Shaikh and S. Haider, “Security threats in cloud computing,” in Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, 2011, pp. 214–219.

R. B. Uriarte and C. B. Westphall, “Panoptes: A monitoring architecture and framework for supporting autonomic clouds,” in Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, 2014, pp. 1–5.

D. Fernandes, L. Soares, J. Gomes, M. Freire, and P. Incio, “Security issues in cloud environments: a survey,” International Journal of Information Security, vol. 13, no. 2, 2014, pp. 113–170. [Online]. Available: http://dx.doi.org/10.1007/s10207-013-0208-7 [retrieved: Sept, 2014]

T. T. W. Group et al., “The notorious nine: cloud computing top threats in 2013,” Cloud Security Alliance, 2013.

M. Mukhtarov, N. Miloslavskaya, and A. Tolstoy, “Cloud network security monitoring and response system,” vol. 8, no. Special Issue on Cloud Computing and Services. sai: itssa.0008.2012.020 ITSSA, 2012, pp. 71–83.

B. Grobauer, T. Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” Security Privacy, IEEE, vol. 9, no. 2, marchapril 2011, pp. 50 –57.

X. Tan and B. Ai, “The issues of cloud computing security in high-speed railway,” in Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, vol. 8, 2011, pp. 4358–4363.

F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, pp. 245–249.

K. Vieira, A. Schulter, C. Westphall, and C. Westphall, “Intrusion detection for grid and cloud computing,” IT Professional, vol. 12, no. 4, 2010, pp. 38–43.

https://cloudacademy.com/blog/aws-best-practices.

https://www.slideshare.net/AmazonWebServices/best-practices-for-security-at-scale.

Aljawarneh, S., 2011. Cloud Security Engineering. International Journal of Cloud Applications and Computing, Volume 1(2), pp. 64–70.

L.Aruna and Dr.M.Aramudhan, text book for ”Fundamentals of Cloud Computing”, ISBN No: 978-93- 5137- 266-0.

L.Aruna & Dr.M.Aramudhan,”A Novel Survey on SLA based Load leveling in Cloud Computing “ International Journal of Research in Computer and Communication Technology, Vol 3, Issue 6, June- 2014-ISSN (Online) 2278- 5841and ISSN No 2320- 5156.

http://cloudcomputing.sys-con.com/node/2261725.

XuX,WangH, MaoJ, NewmanST, KramerTR, ProctorFM, MichaloskiJ L, STEP CompliantNC. Research:the search for intelligent CAD / CAPP / CAM / CNC integration.InternationalJournalofProductionResearch.2005;43(17): 3703–43.

XuX,NeeAYC, editors.Advanced design and manufacturing based on STEP. Springer Verlag; 2010. ISBN:978-1-84882-738-7.

TaoF, HuY, ZhouZ .Application and modelling ofres our service trust- QoS evaluation in manufacturing grid system. International Journal of Production Research 2009; 47(6): 1521 –50.




DOI: https://doi.org/10.23956/ijarcsse.v7i8.39

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.