Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach
DOI:
https://doi.org/10.14738/tnc.25.390Keywords:
Cloud ComputingAAbstract
Cloud computing is the delivery of computer resources over a network through web browsers, while the actual physical location and organization of the equipment hosting these resources are hidden from the users. Some of the IT organizations are undergoing severe budgetary constraints depends on clouds for the infrastructure and services. The major attributes of cloud computing are multitenency, massive scalability, elasticity, pay as you use and self provisioning of resources of the cloud. Cloud computing strategy is subjected to many inhibitors. For finding the interrelationship among inhibitors ISM (interpretive structural modeling) is used which a well is proved technology for finding the interrelationship among elements. An innovative version of interpretive structural model is known as Total Interpretive Structural Model (TISM). In Total Interpretive Structural Modeling (TISM), influence/enhancement of inhibitors and their interrelationship is considered. Total interpretive structural model consists of the following steps. They are identification of elements, pair-wise comparison, level partition, interaction formation, diagraph representation and diagrammatic representation of total interpretive structural model. The methodology of TISM is used to delineate the hierarchical relationship of inhibitors of cloud computing.
Keywords: Cloud computing, Inhibitors, Partition levels, Interaction matrix, TISM.
References
Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy- An Enterprise Perspective on Risks and Compliance” O Reilly
Wang.C and Wulf W. A., (1997,) “Towards a framework for security measurement”, 20th National Information Systems Security Conference, Baltimore, MD, pp. 522-533.
Savola.R and Abie.H, (2010).“Development of measurable security for a distributed messaging system,” International Journal on Advances in Security, Vol. 2.
Jaquith. A, (2007)“Security metrics: replacing fear, uncertainty and doubt,”Addison-Wesley.
Gadia.S, (2009) “Cloud computing: an auditor’s perspective,” ISACA Journal, Vol. 6,.
Gellman.R,( 2009) “Privacy in the clouds: risks to privacy and confidentiality from cloud computing,” World Privacy Forum (WPF) Report.
Cloud Security Alliance, (2010) “Top threats to cloud computing”, Version 1.0. Downloaded from: www.cloudsecurityalliance.org
Cloud Security Alliance. www.cloudsecurityalliance.org [July 4, 2010].
Mandal.A, Deshmukh.S,( 1994) Vendor selection using interpretive structural modeling (ism). International Journal of Operations and Production Management, , 14(6): 52–59.
Sage.A, (1977). Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York,
Warfield.J. (2005) Developing interconnection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 4(1): 81–67.
Wang.C( 2009)“Forrester: A close look at cloud computing security issues,” http://www.forrester.com/securityforum
IDC, “It cloud services user survey, pt.2: Top benefits & challenges,” http://blogs.idc.com/ie/?p=210, 2008.
Zetta, (2008.) “Zetta: Enterprise cloud storage on demand,” http://www.zetta.net/,
Chen.P, Lee.E, Gibson.G, Katz.R, and Patterson.D (1994.) “RAID: High performance,reliable secondary storage,” ACM Computing Surveys (CSUR), vol. 26, no. 2,pp. 145–185
Yahoo!,“Hadoop distribted file system architecture,” http://hadoop.apache.org/common/docs/current/hdfs design.html, 2008.
Dwork.Cet al., “Differential privacy,” LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.
Dwork.C, “Differential privacy: A survey of results,” Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.
Dean. J and Ghemawat.S,( 2004), “MapReduce: simplified data processing on large clusters,” in Proceedings of the 6th conference on Symposium onOpearting Systems Design & Implementation-Volume 6 table of contents, pp. 10–10.
Bardin, (2009.) J“Security Guidance for Critical Areas of Focus in Cloud Computing,” www. cloudsecurityalliance.org/ guidance/ csaguide.pdf,
Hwang, K G. Fox, and Dongarra.J,( 2010.) Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear,
Nick J,( 2010.) “ Journey to the Private Cloud: Security and Compliance,” tech. presentation, EMC, Tsinghua Univ.,
Rittinghouse J and Ransome.J, (2010 ),Cloud Computing: Implementation, Management and Security, CRC Publisher,
"Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner.com. Retrieved 2010-08-22.
Ravi.V. and Shankar. R. (2005), Analysis of interactions among the barriers of reverse logistics, Technological Forecasting and Social Change, 72(8): 1011-1029.
Thakkar. J.,Kanda.A. and Deshmukh, S.G.( 2008), Interpretive Structural Modeling (ISM) of IT-enablers for Indian manufacturing SMEs’, Information management & Computer Security, Vol. 16 No.2, pp. 113-136
Quan Liu, Lu Gao, Ping Lou, “Resource Management Based on Multi-Agent Technology for Cloud Manufacturing, IEEE 2011
FarzadSabahi, “ Cloud Computing Security Threats and Responses” IEEE, 2011.
Craig A Lee, “ A Perspective on Scientific Cloud Computing”, ACM 2010
P. Sasikala,( 2011), “ Cloud Computing: present status and the future implications”, Inderscience Enterprises Ltd.