Keywords Cloud Computing, Data Audit security, E Commerce, Public Key Infrastructure, Security Strategies

Size: px
Start display at page:

Download "Keywords Cloud Computing, Data Audit security, E Commerce, Public Key Infrastructure, Security Strategies"

Transcription

1 Volume 7, Issue 5, May 2017 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Survey of Security Issues in Cloud based E-Commerce Ruchi Oberoi, Sharmistha Dey MCA Department, IMS Ghaziabad, Uttar Pradesh, India DOI: /ijarcsse/SV7I5/0106 Abstract Electronic commerce, frequently known as e-commerce, has explored a new world before the vendors and customers, created a bigger virtual marketplace. With the widespread use of Internet, the online business and commercial transactions have reached to an extraordinary height, almost covering more than half of the world. Another rapidly emerging technology, cloud, is one of the most popular choices for the IT industry today. Due to its versatility, storage optimization capacity, performance, 24 x 7 service availability cloud has created its great impact in the ground of E Commerce. The present era is cloud era of E Commerce. But cloud, due to its distributive nature, incurs some extra baggage to the E Commerce security issues. This paper focuses on various security issues in Cloud based E Commerce. The main focus will be on cloud based E Commerce services especially for B2B and B2C E Commerce. Keywords Cloud Computing, Data Audit security, E Commerce, Public Key Infrastructure, Security Strategies I. INTRODUCTION Over the last decade, the rapid expansion of the internet technology on e-commerce applications increases the demand of storage, computing power and resource utilization cost of those applications. So, in such a scenario, new Cloud" era of e-commerce is a new business opportunity. There is a new trend for e-commerce companies to implement cloud computing for E Commerce. Most organizations are attracted by this newly evolved technology because cloud can save time and money for them in investing in IT infrastructure Being a robust technology, cloud has 24 x 7 service availability, high storage optimization capacity, virtualization potential, multi tenancy[3] ; which has made it acceptable for the E Commerce industries. Cloud Computing helps to improve the security performance in e-commerce by providing a safer way to store the information. Cloud computing, offering various services like IaaS(Infrastructure as a service),paas (Platform as a service ),SaaS (Software as a service ), is mainly divided into several deployment models like Public cloud, private cloud, hybrid cloud etc. Depending on several deployment models security level varies. IaaS(Infrastructure as a service) - IaaS providers offer the cloud servers and their associated resources via a dashboard and/or API. IaaS clients have direct access to their servers and storage, gaining access to a much higher scalability. Users of IaaS can outsource and build a virtual data center in the cloud and have access to many of the same technologies and resource capabilities of a traditional data center without having to invest in capacity planning or the physical maintenance and management of it [6]. PaaS(Platform as a service)- PaaS provides a platform on which software can be developed and deployed. PaaS providers give clients such an environment in which the operating system and server software, as well as the underlying server hardware and network infrastructure are taken care of, leaving users free to focus on the business side of scalability, and the application development of their product or service[6]. SaaS(Software as a service) In SaaS model, the providers provide the point of access to software running on servers. SaaS is the most familiar form of cloud service for consumers. It moves the task of managing software and its deployment to third-party services. Salesforce, Google Apps, Dropbox are some popular SaaS model. E Commerce has also various categories like B2B (Business to Business), B2C (Business to Customer), C2B(Customer to Business) and C2C(Customer to Customer) etc. Figure I: Type of E Commerce models 2017, IJARCSSE All Rights Reserved Page 823

2 B2B (Business-to-Business) - Companies doing business with each other such as manufacturers selling to distributors and wholesalers selling to retailers. Pricing is based on quantity of order and is often negotiable. Example: Ferguson. Figure II: B 2 B E Commerce Model B2C (Business-to-Consumer) - Businesses selling to the general customer online using web portal and softwares.example:flipcart,amazon C2B (Consumer-to-Business)- A consumer posts his project with a set budget online and within hours companies review the consumer's requirements and bid on the project. Example: Online job portal like naukri.com or shinejobs.com C2C (Consumer-to-Consumer)- There are many sites offering free classifieds, auctions, and forums where individuals can buy and sell thanks to online payment systems like PayPal where people can send and receive money online with ease. Example: ebay, olx, magicbricks.com etc. Cloud Is A Good Platform For E-Business due to the following reasons: (a) On-demand flexibility and scalability The flexibility and scalability of Cloud service is used for growing E- business [5]. (b) Increased business agility A vendor s agility in opening new shop, supply chain management, and increase competitiveness, and reducing cost of ownership that all becomes easy using cloud [5]. (c) Uptime and a smooth customer journey Customer can expediently access online apps using cloud. Moreover cloud is such a platform where customer can easily access online applications and compare the product s price of various vendors, explore several brands for same product. [4] II. RELATED BACKGROUND STUDY Xiao feng Wang, in his paper entitled as Cloud Computing Security of E-commerce Environment, focuses on the impact of cloud in a popular application like E Commerce[5]. The author has very clearly discussed the issues for E Commerce platform based on cloud computing. But the author is a little bit of silent about the accountability of the particular authorities for typical E Business problems in a distributive environment like cloud. In another paper, Privacy Preservation of Data in Amalgamation with Cloud Computing and E-commerce, author Kanchan Mahale has illustrated The idea of Cloud Computing and its privacy issues, especially in E Commerce application, but the main drawback of this paper is that it is based on secondary data only[4].according to the author, for an economic growth of E-businesses, use of Cloud Computing is a must. The main objective of this paper was to judge the influence of Cloud computing on E-commerce, after thorough testing of safety and consistency of the infrastructure, in the major functional areas of E Commerce in Cloud like CRM, HR, Accounting and much more. According to author, integration of E-Commerce and Cloud Computing is beneficial for the rapid growth of the world economy. Juncai, S., and Shao, Q., in Based on Cloud Computing Ecommerce Models and Its Security has analysed various cloud E Commerce model with their security aspects[7]. In this article the problem of environmental cost in case of cloud based E Commerce application has been discussed. This paper focuses on protection of both data privacy as well as the data dissemination from the network security point of view. In another paper entitled as Data security and 2017, IJARCSSE All Rights Reserved Page 824

3 influence of Cloud computing in Electronic Commerce Industry, Roy, Sanghita, and Indrajit Sinha have discussed the concepts of cloud computing and on the basis of this issue analyzes its impact on E-commerce industry and how traditional E-commerce businesses and industries are influenced by cloud computing[1]. Based on the survey we can conclude that the security and privacy issues related to cloud based E Commerce needs to be explored more and on the network point of view as well as from application point of view, it should be analysed as cloud combining with E Commerce is a good opportunity for the business industries. III. SECURITY ISSUES FACED BY E-COMMERCE IN CLOUD COMPUTING ENVIRONMENT Security of the data on a cloud is a big concern. Although CSPs always says that the information of the clients are stored securely on the cloud still e-commerce companies and cloud end-users worry about the security of the data since their sensitive information are in the hands of the cloud service providers. Since both Cloud Computing and e- commerce have security problems, this issue may be the most serious one that makes customers hesitate to implement Cloud E-commerce. Since most of the customers don t have prior experience of using cloud they fear that they can lose control of their data[9]. Due to the storage of large amount of data related to business on the cloud system, and further this data is transmitted and processed, and if there is any problem, the risk involved will be much higher in the cloud computing based E-commerce model than traditional E-commerce model. Although in a cloud computing model data can be unified managed, real time monitoring of the security so as to get maximum protection of the e-commerce business information. But with the complexity of the cloud computing and user s dynamic factors, many new security problems are faced by E- commerce companies to build e-commerce platforms. As the cloud computing model is based on E-commerce platforms where all data is stored in the cloud, the e-commerce companies are worried about the cloud computing security of the data as they are unable to supervise the sensitive information of the business Data Storage Risk: One of the major concern of Cloud computing based on E-commerce model is the data security. In Cloud computing, enterprise data centers save a large amount of corporate private data containing customer s information, financial information, key business processes etc. All this information is stored in the cloud side. This confidential information cannot be monitored by the e-commerce business. E-commerce companies are normally concerned about how cloud computing service providers to ensure that the confidential corporate data is not illegal to collect, process and use., their residual data will not reveal sensitive information, and also they are worried that whether there are appropriate measures to ensure normal operation of the e-commerce system in case of natural disasters, hardware failures etc[5]. As cloud computing uses virtual computer technology in which user s personal data is kept on various virtual data centers which may cross international boundaries. E-commerce companies who are using cloud computing services are not clear about where their data is stored and they don t even know in which country their data is located. And also the cloud computing environment and data are shared by multiple users so the e-commerce companies are concerned about whether their own data and other user s data are creating confusion? And also whether their data is encrypted? 3.2 Data Transmission security: In the cloud computing model, as the Business data is transmitted to the cloud side over the internet, the e- commerce companies are often concerned about the fact that data in the network transmission should be encrypted and should be strictly confidential without being misused. 3.3 Data Audit security: When the enterprise manages internal data, in order to ensure the accuracy of the data, it tends to introduce the third party certification bodies to audit or certification. But in the cloud computing environment, the cloud computing service providers ensures that there should be no risk of the business data. They also provide the necessary information support to help third party organizations for the generation of data security and accuracy of the design to achieve corporate compliance requirements. In the process of the sustainable development of companies certified cloud computing service providers, how to guarantee that the cloud computing service providers will provide useful data without compromising the safety of other existing customers, letting the business to choose a long term presence, technical strength of the cloud computing service providers to service delivery would be the security risk[5]. 3.4 Relevant Laws and Regulations are not perfect: As we know that cloud computing and e-commerce is a new concept, the associated laws of cloud computing and e-commerce is not perfect. In the service agreement, it is the responsibity of the cloud system service providers to avoid most of the risk but there is no assurance to any data violation and data destruction. It assumes a legal responsibility or obligation to act. According to the user s perception, cloud providers should bear all the responsibility for security. So in case of a security issue, it can lead to both sides of the dispute[5]. 3.5 Viruses and Hackers are more secretive: Hackers can take the benefit of the emerging technologies such as virtualization, to write to a virtual machine in the form of malicious software that allows user to be more difficult to detect and remove. At the same time, the use of 2017, IJARCSSE All Rights Reserved Page 825

4 leased virtual machines hides their actual identity, making it difficult to be tracked. These data security e-commerce businesses will bring great harm. Hence, more effective approaches should be adopted to prevent such attacks [5]. IV. E-COMMERCE SECURITY STRATEGY OF CLOUD COMPUTING: A STUDY E-COMMERCE E-commerce platform which is based on the Cloud Computing solves the four types of E-Commerce Security Risks. Since with the starting of the internet, we only used to consider the convenience, openness which makes the internet vulnerable to the hackers leading of destruction of network information system, information disclosure. Therefore, in general there are four types of e-commerce security risk. They are Information capture and steal, Information tampering, information fraud, transaction repudiation. Therefore, the security policy design is based on cloud- computing platform. Firstly, Public Key Infrastructure (PKI) technology is the core information security technology and it is the key to e-commerce and infrastructure technology. PKI technology can greatly reduce the e-business risk disclosure of confidential information. It makes that the person who are not authorized will not steal the data in the cloud storage and transmission, illegal tampering of information thus it guarantees the confidentiality, integrity and effectiveness of the safe operation of the e-commerce. Secondly, the Private cloud needs to be established. Private cloud is a cloud computing service provider for business in the construction of its internal proprietary cloud computing system. E-commerce businesses can put a noncritical business on the cloud platform, and put the core and the key part of the business on the private cloud. Thus, companies can bring in more of authentication, data isolation and other security technologies to ensure data security of the confidential information in the cloud. a. E-commerce Platform based on Cloud Computing solves the storage of Information and Data Security Issues: The cloud computing service providers should adopt a more safe and effective storage technology in case of natural disaster, hardware failures, and damage of other facilities. In case if the master is fails or damaged, it should instantaneously switch to another set of mirrored devices. In the mean time, e-commerce companies, also needs to regularly backup the important data. b. E-Commerce Platform Based on Cloud Computing Solves Scientific Service Provider Selection: Before building e-commerce platform based on cloud computing, e-commerce businesses should be based on their own needs to choose a larger and better cloud computing service providers, asked in detail about the data stored, recognition in the event of termination of the cloud computing services or service provider acquired by another company in such circumstances, their data will not be affected. c. E-Commerce Platform Based on Cloud Computing Solves the improvement of relevant laws and standards: As we know that cloud computing includes a wide range, so the legal agreement is required so as to protect the global e-commerce businesses and the interest of cloud computing providers. The agreement should contain the details about the level of monitoring and measurement services, duties and responsibilities of the cloud computing users and the suppliers, disaster recovery and compensation and other issues. This will lead to provision of better services by cloud computing service providers. V. CONCLUSION As we know that it is a new trend for e-commerce companies to adopt Cloud Computing. Most of the companies are fascinated by cloud computing because cloud can save time and money for them in investing in IT infrastructure. There is no doubt that, this is the biggest benefit brought by cloud computing, but cloud computing also brings in lot of other benefits, As we know that it is quite important for e-commerce companies to keep their customer s personal data secure. Although cloud computing helps to improve the security in e-commerce by providing a safer way to store the information but there are some issues that needs to pay attention. But at the same time, it has also brought new e-business challenges. In order to use cloud computing effectively, information and knowledge must flow easily and securely to and from the user, and these valuable assets must be saved securely and should be backed up and protected from disaster from time to time. E-business security policy which is based on cloud computing platform must take full account of the user, e-commerce companies, cloud computing service providers, network operators, third party certification bodies and other parties who are interested,in order to ensure security of e-commerce operations. It must also solve four e- commerce security risks storage of information and data security issue, cloud computing service providers and other scientific issues. Simultaneously, promoting e-commerce standard using the cloud computing platform, by improving the relevant laws and regulations, using the legal system leading to sustainable development. REFERENCES [1] Roy, Sanghita, and Indrajit Sinha, "Data security and influence of Cloud computing in Electronic Commerce Industry." International Journal of Computer Applications 88.6 (2014). [2] Sah, Pradeep. Enhance Cloud Computing Web Security With The E-commerce Architecture Framework International Journal of Trends in Computer Science (2013). [3] P. Mell and T. Grance, "Draft NIST working definition of cloud computing - v15," 21. Aug 2009 [4] Kanchan Mahale, Privacy Preservation of Data in Amalgamation with Cloud Computing and E-commerce, MIT- SOM PGRC KJIMRP National Research Conference (Special Issue),2016 [5] Xiao feng Wang, Cloud Computing Security of E-commerce Environment, Journal of Applied Mechanics and Materials,2013, pp: , IJARCSSE All Rights Reserved Page 826

5 [6] Retrieved from accessed on 28 th April, 2016: pm, India [7] Juncai, S., and Shao, Q. Based on Cloud Computing Ecommerce Models and Its Security, International Journal of e-education, e-business, e-management and e-learning,, 2011, pp. 2 [8] Venkateshwarlu, Uppunuthula, and Puppala Priyanka. "Survey on Secure Data Mining in Cloud Computing." International Journal of Advanced Research in Computer Science & Technology, [9] Das Indrajit Cloud-e commerce: Synthetic platform for ecommerce transactions and services International Journal of Latest Trends in Engineering and Technology (IJLTET), , IJARCSSE All Rights Reserved Page 827

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SEEM3450 Engineering Innovation and Entrepreneurship

SEEM3450 Engineering Innovation and Entrepreneurship SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Cloud First Policy General Directorate of Governance and Operations Version April 2017 General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Chapter 6 Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 1.3 Explain network design elements and components. Virtualization Cloud computing: Platform as

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Granted: The Cloud comes with security and continuity...

Granted: The Cloud comes with security and continuity... Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA Securing the cloud ISACA Korea Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA What is cloud computing? Source: Wikipedia 2 What is cloud computing A model for enabling:- convenient on-demand network

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers

More information

Data center interconnect for the enterprise hybrid cloud

Data center interconnect for the enterprise hybrid cloud WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

Article Summary of: Understanding Cloud Computing Vulnerabilities. Michael R. Eldridge

Article Summary of: Understanding Cloud Computing Vulnerabilities. Michael R. Eldridge Article Summary of: Understanding Cloud Computing Vulnerabilities Michael R. Eldridge April 14, 2016 2 Introduction News stories abound about the almost daily occurrence of break-ins and the stealing of

More information

M-Commerce and its features

M-Commerce and its features M-Commerce and its features Abstract: Purpose of this article is to elaborate the concept of electronic commerce and its red hot issue, mobile commerce. In this article I define E-commerce as: Electronic

More information

THE HYBRID CLOUD. Private and Public Clouds Better Together

THE HYBRID CLOUD. Private and Public Clouds Better Together THE HYBRID CLOUD Private and Public Clouds Better Together Bruno Terkaly Principal Software Engineer Cloud Architect Open Source/Linux Global ISV at Microsoft A MULTI-CLOUD WORLD A growing trend in the

More information

Why Converged Infrastructure?

Why Converged Infrastructure? Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. According to a recent survey

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD

WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD 2 A CONVERSATION WITH DAVID GOULDEN Hybrid clouds are rapidly coming of age as the platforms for managing the extended computing environments of innovative

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Securing Cloud Computing

Securing Cloud Computing Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and

More information

CLOUD COMPUTING PRIMER

CLOUD COMPUTING PRIMER CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

What is ISO ISMS? Business Beam

What is ISO ISMS? Business Beam 1 Business Beam Contents 2 Your Information is your Asset! The need for Information Security? About ISO 27001 ISMS Benefits of ISO 27001 ISMS 3 Your information is your asset! Information is an Asset 4

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Choosing the Right Cloud Computing Model for Data Center Management

Choosing the Right Cloud Computing Model for Data Center Management Choosing the Right Cloud Computing Model for Data Center Management www.nsi1.com NETWORK SOLUTIONS INCOPORATED NS1.COM UPDATING YOUR NETWORK SOLUTION WITH CISCO DNA CENTER 1 Section One Cloud Computing

More information

BRINGING CLARITY TO THE CLOUD

BRINGING CLARITY TO THE CLOUD BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that

More information

CLOUD COMPUTING. A New Era of Business Opportunity. Matthew Maderios, CA Enterprise. IT Roadmap Conference & Expo San Jose, CA.

CLOUD COMPUTING. A New Era of Business Opportunity. Matthew Maderios, CA Enterprise. IT Roadmap Conference & Expo San Jose, CA. CLOUD COMPUTING A New Era of Business Opportunity Matthew Maderios, CA Enterprise IT Roadmap Conference & Expo San Jose, CA Date MAKING A POSITIVE IMPACT Cloud Computing a new way of delivering resources,

More information

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most

More information

Why Converged Infrastructure?

Why Converged Infrastructure? Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. A recent survey 1 by IDG Research

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25 RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

AN ANALYSIS OF DEPLOYMENT MODELS IN CLOUD COMPUTING

AN ANALYSIS OF DEPLOYMENT MODELS IN CLOUD COMPUTING BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN (P): 2348-0513, ISSN (E): 2454-471X, Vol. 4, Issue 3, Mar 2016, 89-98 BEST Journals AN ANALYSIS OF

More information

CLOUD COMPUTING-ISSUES AND CHALLENGES

CLOUD COMPUTING-ISSUES AND CHALLENGES CLOUD COMPUTING-ISSUES AND CHALLENGES Asstt. Prof.Vandana S.D.S.P.Memorial College for Women, Rayya (India) ABSTRACT Cloud computing is a multifaceted technological paradigm that is outgrowth of decades

More information

Cloud Computing and Its Impact on Software Licensing

Cloud Computing and Its Impact on Software Licensing Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared

More information

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University

More information

efax Corporate for Independent Agent Offices

efax Corporate for Independent Agent Offices Overview Within the finance and insurance industries, independent agent offices have traditionally been an effective means for offering standardized services across diverse geographic regions. They provide

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Cloud Computing, SaaS and Outsourcing

Cloud Computing, SaaS and Outsourcing Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

How to avoid storms in the cloud. The Australian experience and global trends

How to avoid storms in the cloud. The Australian experience and global trends How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Analysis on computer network viruses and preventive measures

Analysis on computer network viruses and preventive measures International Symposium on Computers & Informatics (ISCI 2015) Analysis on computer network viruses and preventive measures Yongbin ZHU Engineering College, Honghe University, Mengzi 661100, Yunnan, China

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Supplement No. 146 to Y Series of Recommendations

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google

More information

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

The Value of Force.com as a GRC Platform

The Value of Force.com as a GRC Platform The Value of Force.com as a GRC Platform Andy Evans - Xactium Limited March 2009 Executive Summary The importance of governance, risk and compliance (GRC) activities to organizations has become increasingly

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

Benefits of Open Cross Border Data Flows

Benefits of Open Cross Border Data Flows /SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013

More information

Kusum Lata, Sugandha Sharma

Kusum Lata, Sugandha Sharma International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing

More information

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Business Technology Briefing: Fear of Flying, And How You Can Overcome It Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May

More information

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed Cloud Infrastructure and Operations Chapter 2B/8 Page 1 Chapter 2: Cloud Layer Setup and Maintenance Topics covered: 2.1 Basic Cloud Computing Concept 2.2 Benefits of Cloud Computing 2.3 Main concept from

More information