Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach

Authors

  • Ambikadevi Amma T. KARPAGAM UNIVERSITY COIMBATORE.
  • N. Radhika Computer Science & Engg Dept, Amrita University, Coimbatore, Tamil Nadu
  • V.R. Pramod Dept. of Mechanical Engineering, NSS College of Engg, Palakkad, Kerala, India

DOI:

https://doi.org/10.14738/tnc.25.390

Keywords:

Cloud ComputingA

Abstract

Cloud computing is the delivery of computer resources over a network through web browsers, while the actual physical location and organization of the equipment hosting these resources are hidden from the users. Some of the IT organizations are undergoing severe budgetary constraints depends on clouds for the infrastructure and services. The major attributes of cloud computing are multitenency, massive scalability, elasticity, pay as you use and self provisioning of resources of the cloud. Cloud computing strategy is subjected to many inhibitors.  For finding the interrelationship among inhibitors ISM (interpretive structural modeling) is used which a well is proved technology for finding the interrelationship among elements. An innovative version of interpretive structural model is known as Total Interpretive Structural Model (TISM). In Total Interpretive Structural Modeling (TISM), influence/enhancement of inhibitors and their interrelationship is considered. Total interpretive structural model consists of the following steps. They are identification of elements, pair-wise comparison, level partition, interaction formation, diagraph representation and diagrammatic representation of total interpretive structural model. The methodology of TISM is used to delineate the hierarchical relationship of inhibitors of cloud computing.

Keywords:  Cloud computing, Inhibitors, Partition levels, Interaction matrix, TISM.

Author Biography

Ambikadevi Amma T., KARPAGAM UNIVERSITY COIMBATORE.

COMPUTER SCIENCE AND ENGINEERING,

References

Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy- An Enterprise Perspective on Risks and Compliance” O Reilly

Wang.C and Wulf W. A., (1997,) “Towards a framework for security measurement”, 20th National Information Systems Security Conference, Baltimore, MD, pp. 522-533.

Savola.R and Abie.H, (2010).“Development of measurable security for a distributed messaging system,” International Journal on Advances in Security, Vol. 2.

Jaquith. A, (2007)“Security metrics: replacing fear, uncertainty and doubt,”Addison-Wesley.

Gadia.S, (2009) “Cloud computing: an auditor’s perspective,” ISACA Journal, Vol. 6,.

Gellman.R,( 2009) “Privacy in the clouds: risks to privacy and confidentiality from cloud computing,” World Privacy Forum (WPF) Report.

Cloud Security Alliance, (2010) “Top threats to cloud computing”, Version 1.0. Downloaded from: www.cloudsecurityalliance.org

Cloud Security Alliance. www.cloudsecurityalliance.org [July 4, 2010].

Mandal.A, Deshmukh.S,( 1994) Vendor selection using interpretive structural modeling (ism). International Journal of Operations and Production Management, , 14(6): 52–59.

Sage.A, (1977). Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York,

Warfield.J. (2005) Developing interconnection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 4(1): 81–67.

Wang.C( 2009)“Forrester: A close look at cloud computing security issues,” http://www.forrester.com/securityforum

IDC, “It cloud services user survey, pt.2: Top benefits & challenges,” http://blogs.idc.com/ie/?p=210, 2008.

Zetta, (2008.) “Zetta: Enterprise cloud storage on demand,” http://www.zetta.net/,

Chen.P, Lee.E, Gibson.G, Katz.R, and Patterson.D (1994.) “RAID: High performance,reliable secondary storage,” ACM Computing Surveys (CSUR), vol. 26, no. 2,pp. 145–185

Yahoo!,“Hadoop distribted file system architecture,” http://hadoop.apache.org/common/docs/current/hdfs design.html, 2008.

Dwork.Cet al., “Differential privacy,” LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.

Dwork.C, “Differential privacy: A survey of results,” Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.

Dean. J and Ghemawat.S,( 2004), “MapReduce: simplified data processing on large clusters,” in Proceedings of the 6th conference on Symposium onOpearting Systems Design & Implementation-Volume 6 table of contents, pp. 10–10.

Bardin, (2009.) J“Security Guidance for Critical Areas of Focus in Cloud Computing,” www. cloudsecurityalliance.org/ guidance/ csaguide.pdf,

Hwang, K G. Fox, and Dongarra.J,( 2010.) Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear,

Nick J,( 2010.) “ Journey to the Private Cloud: Security and Compliance,” tech. presentation, EMC, Tsinghua Univ.,

Rittinghouse J and Ransome.J, (2010 ),Cloud Computing: Implementation, Management and Security, CRC Publisher,

"Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner.com. Retrieved 2010-08-22.

Ravi.V. and Shankar. R. (2005), Analysis of interactions among the barriers of reverse logistics, Technological Forecasting and Social Change, 72(8): 1011-1029.

Thakkar. J.,Kanda.A. and Deshmukh, S.G.( 2008), Interpretive Structural Modeling (ISM) of IT-enablers for Indian manufacturing SMEs’, Information management & Computer Security, Vol. 16 No.2, pp. 113-136

Quan Liu, Lu Gao, Ping Lou, “Resource Management Based on Multi-Agent Technology for Cloud Manufacturing, IEEE 2011

FarzadSabahi, “ Cloud Computing Security Threats and Responses” IEEE, 2011.

Craig A Lee, “ A Perspective on Scientific Cloud Computing”, ACM 2010

P. Sasikala,( 2011), “ Cloud Computing: present status and the future implications”, Inderscience Enterprises Ltd.

Downloads

Published

2014-11-03

How to Cite

Amma T., A., Radhika, N., & Pramod, V. (2014). Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach. Transactions on Networks and Communications, 2(5), 60–74. https://doi.org/10.14738/tnc.25.390