You are on page 1of 157

OBJECTIVES OF THE STUDY

Following are the major objectives of my research report: Try to find out level of awareness about cloud computing in the market. Analyzing what are the most to least important reasons for using cloud computing. Try to find out preferences of various services of cloud computing. Analyzing various factors which can affect implementation of cloud computing. Analyzing overall mindset of respondents towards implementation of cloud computing.

CHAPTER: 1 INTRODUCTION

Imagine yourself in the world where the users of the computer of todays internet world Dont have to run, install or store their application or data on their own computers, imagine the world where every piece of your information or data would reside on the Cloud (Internet). As a metaphor for the Internet, "the cloud" is a familiar clich, but when combined with "computing", the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud", including conventional outsourcing. Cloud computing comes into focus only when you think about what we always need: away to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends ICT's existing capabilities. Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are Sass (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.

CHAPTER: 2 CLOUD COMPUTINGTHE CONCEPT

Cloud computing is Internet (cloud) based development and use of computer technology (computing). It is a style of computing in which dynamically scalable and often virtualized resource are provided as a service over the internet. User need not have knowledge, expertise in, or control over the technology infrastructure in the cloud that support them.

Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth.

Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2011, a study conducted by V1 found that 91% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by the concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study found that disciplined companies achieved on average a 68% increase in their IT expense because cloud computing and only a 10% reduction in data center power costs.

As per forest report (Dec 2008) more than 70% IT budget spent of maintains of current IT infrastructure instead off adding new one. In order to better utilize the IT budget companies are opting for cloud computing.

Cloud computing differs from the client-server model by providing services from a server that are executed and managed by a client's web browser, with no installed client version of an application required. Centralization gives cloud service providers full control on the versions of the browser-based applications

provided to clients, which removes the continuous need for version upgrades or manages individual licenses of client computing devices. The concept incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as Web 2.0 And other recent technology trends which have the common theme of reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include Salesforce.com and Google Apps which provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers.

2.1 Comparison
Cloud computing often confused with grid computing (a form of distrusting computing where by a super and vertical computer is composed of a cluster of networked, loosely-coupled computers, acting in concert to perform very large tasks), utility computing and automatic computing.

Indeed many cloud computing deployments as a 2009 depends on grids, have automatic charters tics and bill likes utilities------ but Cloud computing can be seen as a natural next step from the grid-utility model. Some successful cloud architected has little or no centralized infrastructure and billing system whatsoever, including peer-to-peer network like Bit torrent and Skype.

2.2 Implementation
The majority of cloud computing infrastructure as of 2009 consist reliable services delivered through data centers and built on servers with different level of virtualization technologies. The services are accessible anywhere that has access to networking infrastructures. The cloud appears as a single point assess for all computing needs of consumers. Open standers critical to the growth of cloud computing and open source software provided the foundation of many cloud computing implications.

2.3 Characteristics On demand self services: computer services such as email, applications,
network or Server service can be provided without requiring human interaction with each service Provider. Cloud service providers providing on demand self services include Amazon Web Services (AWS), Microsoft, Google, IBM and Salesforce.com. New York Times and NASDAQ are examples of companies using AWS (NIST). Gartner describes this Characteristic as service based

Broad network access: Cloud Capabilities are available over the network and
accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms such as mobile phones, laptops and PDAs.

Resource pooling: The providers computing resources are pooled together to


serve multiple consumers using multiple-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. The resources include among others storage, processing, memory, network bandwidth, virtual machines and email services. The pooling together of the resource builds economies of scale (Gartner).

Rapid elasticity: Cloud services can be rapidly and elastically provisioned, in


some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.

Measured service: Cloud computing resource usage can be measured,


controlled, and reported providing transparency for both the provider and consumer of the utilized service. Cloud computing services use a metering capability which enables to control and optimize resource use. This implies that just like air time, electricity or municipality water IT services are charged per usage metrics

pay per use. The more you utilize the higher the bill. Just as utility companies
sell power to subscribers, and telephone companies sell voice and data services, IT services such as network security management, data center hosting or even departmental billing can now be easily delivered as a contractual service.

Multi Tenacity: is the 6th characteristics of cloud computing advocated by the


Cloud Security Alliance. It refers to the need for policy-driven enforcement, segmentation, isolation, governance, service levels, and chargeback/billing models for different consumer constituencies. Consumers might utilize a public cloud providers service offerings or actually be from the same organization, such as different business units rather than distinct organizational entities, but would still share infrastructure.

CHAPTER: 3 COMPANY PROFILE OF UNIVERSAL SOFTWARE

3.1 Profile:
Universal software is an IT solutions and service delivery company offering software development services to clients since 1997. Our specialty in the field of product development and software service empowers our clients to formulate, implement and execute their strategy to increase effectiveness and efficiency of their businesses. We are committed to give return on investment to our clients by providing low cost, high quality and reliable offshore software services. While we derive our roots from India, our global approach with innovation, loyalty, fairness, quality and integrity put us ahead of our competitors. Sandeep Singhvi is the founder and director at Universal Software.

3.2 Industry
1) Public Safety Software: -Computer Aided Dispatch CAD Our unique CAD system consists of several modules that provide serves at multiple levels in dispatch centre in the field of public safety. These services include call input, call dispatching, call status maintenance, event notes, field unit status and tracking as well call resolution and disposition. It is more useful for real-time call updates, It is unit also responses, scalable and from automatic single alerts to to call multi-

taker/dispatcher.

agency

agency/multijurisdictional countrywide dispatch centre. -Record Management System - RMS Record Management System is the most effective way to organize, track and access the vast amount of information that flows through your departments. It enables officers and clerical personnel to prepare, save and search various types of important information for law enforcement agency. It is featured to record booking information, case data, tickets, traffic accidents, incidents, personnel

10

scheduling, gun permits, and history of citizen, vehicles, property, locations and many more. Integration of RMS with CAD system makes it more effective. -Mobile System Mobile System is designed to establish communication between officers at headquarters and at the field. It gives access of information to field officers so they can take better decision on remote locations. It also facilitates field users to receive dispatch information, status on computer screen with status of other units who are in service. -Jail Management System JMS Jail Management System is developed to boost the efficiency of facility which covers full suite of integrated modules compatible with latest law enforcement. Each module provides diverse functionality with extensive features and capabilities to reduce overall expense of facility. (Administrative Overheads, Staff Costs, Reduction in infrastructure etc). -Healthcare-EMR Web-based electronic medical record system covers all the aspects of medical practice management in order to make care unit more effective and efficient. Electronic medical records are helpful to manage the clinical operations of facility and provide digital storage of health charts with functionalities to track individual demographics, history, medications, test results and many more. Features

Full Suite of Integrated Modules Patient Registry, Appointment Scheduling, Electronic Charts Document, Image, Test Results Management Role-Based Features of EMR to Ease the Workflow Real-Time TAR & MAR Management

11

Real-Time Medicine Tracking Management Task, Treatment, Inventory, Privilege Automated Billing & Insurance Checking Integrated IVR System Excellent Reporting Features

Why Healthcare EMR


Deliver Better Care to Patient Enhances Documents And Reports More Revenue Generation Meet with Medical Regulations Boosts Productivity with Quality Affordable Pricing User Friendly 1) Process Industry M2M solutions

Universal Software is leading provider of remote monitoring solutions. We believe that communication of machines (Different Protocol) and management of these communications through software help to take betters decisions and is effective on long-run. (Especially in critical conditions) M2M solutions are primary developed for remote monitoring of Oil and Gas industry. System takes inputs from field devices connected to wells and show analysis of meaningful data on screen. User can take better decision with through this data and can set parameters for alerting. These solutions are useful for:

Delivery of data from the field to desktop Monitoring of data real-time through web-based applications Alerts to compressors and wells

12

2) Ecommerce/Portals Ecommerce is one of the biggest things that have taken the businesses by storm. It is playing an important role to create entire new economy to strengthen businesses as internet is becomes an everyday part of peoples life. Universal Software delivers wide range of ecommerce applications and website development services. We have our clients across the globe to have win-win situation both buyers and seller side. Our experience in ecommerce portal empowers you to start online business or taking your existing business online. Our work portfolio includes:

Ecommerce portal/website development Ecommerce application development Payment gateway integration with website or applications

Advantages of Ecommerce portals with us are:


Help in increase sales Improve the online shopping experience International reach Low set up cost Catalyst for business start-up

3) IVR (Interactive Voice Response) IVR - short for Interactive Voice Response - automates interaction with telephone callers. Universal Software provides IVR related solutions that almost integrate with any software product. Most people are familiar with IVR applications. These applications allow users to retrieve information from any telephone.

13

Universal Software has created a solution that replaces aging, proprietary Interactive Voice Response boxes and applications with a simple, voice-driven powered IVR telephony platform and a compelling suite of voice applications. With Universal Software IVR, you can:

Delight your callers Reduce your cost Easy integration with almost any software product Deliver improved ROI

3.3 Technologies
-Microsoft .net technologies Universal Software is Microsoft Silver Certified partner and our team of professional developers having expertise in latest technology, tools available from Microsoft. Our extensive experience in latest .net technologies in web applications as well as desktop applications empowers us to create world class IT driven system. Universal Software has expertise with Microsoft .net technologies like vb.net, asp.net, C#, XML, win forms, web services, AJAX, jQuery, Silver Light, LinQ, MVC, WCF, WPF, WWF, mobile applications with SQL Server for creating innovative applications as per clients requirement and budget. -JAVA Basic remains same. We firmly believe in this philosophy which helps us to satisfy our clients needs with cutting edge technologies. Our unique competence in JAVA enables us to deliver to deliver integrated, scalable, robust solutions. We do extensive working on java platforms, tools and libraries with expertise in J2SE, J2EE, J2ME, spring, JSP, JSF. Our experts have vast experience in developing and deploying JAVA based applications as well as software solutions on enterprise level.

14

-Mobile Technologies Universal Software has dynamic team of young and experience mobile application developers who have the technical finesse to deliver unparalleled mobile product development services. Skill Sets of Universal Software in Mobile Technologies:

Android Application Development iPhone Application Development iPad Application Development Window Phone Application Development

-Asterisk/Hardware interface If you wish to delight you customer with Hardware technologies then Universal Software offers integration of IVR, PBV, VOIP Gateway, GSM modems with your software.

3.4 Service
-Product Development Services Universal Software offers product development services for all stages of the software development lifecycle from product conceptualization to product extensions. Our core focus areas and capabilities in product development include followings: >Product Conceptualization, Development, Testing, Implementation >Product Customization, Enhancement, Extension >Product Maintenance, Support >Product Migration

-Custom Application Development

15

Universal Software provides custom application development services to clients according to their requirements when their business strategies and requirements are not adequately met by packaged software. Our team of business analysts, subject matter experts and software team leaders work closely with clients for developing application to achieve business objective. Universal Softwares technology team is known for expertise in creating robust, scalable application with extensible architecture for use in a wide range of industry. Platform and domain is not a constraint for us for custom application development. -BI Solutions We are specialized in designing and implementing comprehensive business intelligent solutions. Our BI solutions empower enterprises to extract knowledge and wisdom from unprocessed information to establish rich, reliable and effective information to take intelligent decisions using dashboards, reports, charts as per your need. -Mobile Application Development If you are looking for out of box and best industry standard in mobile application development, then our development team can surely impress you with their excellence and expertise. Platform: IPhone/IPad, Android, J2ME, window application -M2M software and hardware integration M2M Software: M2M software developed for remote monitoring in oil and gas industry. System takes inputs from devices/modems connected to wells and give analysis of data for making decisions.

16

Hardware Integration: If you wish to delight your customer by sending alerts, notification and making sure your availability for predefined query then IVR and GSM systems are developed to serve your need.

3.5 Engagement Models


-Development Centre This model is suited for large projects or products in which requirements is changed time-to time. It is also suited when custom software development and long term engagement is needed for updates. We appoint domain expert staff to satisfy the need of clients by delivering high quality solutions.

Dedicated Resource Timesheets Additional Quality Check Management oversight Different payment options (Weekly Payment, Biweekly payment) -Fixed Cost

If your project is with well-defined scope and clear requirement our fixed cost model is suitable to you. As per your requirement, our team is appointed to you to meet your expectation on time.

Fixed start date and end date Low level specifications documents duly signed by the clients Following to design iterations as agreed in the proposal amount Finalizing the UI design before starting a development Impact analysis in case of deviation / addition to the specifications documents

17

-Partnership Our expertise focused innovative solutions, competencies, reduced total cost and flexible delivery model helps your company undercut your bottom line and beat your deadline. Our innovative IT solutions have helped our valued clients to create more efficient business operations and increase productivity. To the point, our services and solutions effectively deal with the business challenges of companies and further, help in gain a competitive advantage in this ever expanding market.

3.6 Why Universal Software?


Global Exposure 15+ years of IT experience Domain Expertise High-End Programming Low Operating Cost Delivery with Best Quality Transparent Business Transactions IPR Protection Long Term Relationship

- Microsoft Certified Gold Partner

18

CHAPTER: 4 LITERATURE REVIEW

19

Bhrugu Sevak, (2012) Using side-channel attack, it can be very easy to


gain secret information from a device so it is good idea to provide security against side channel attack in cloud computing using combination of virtual firewall appliance and randomly encryption decryption (using concept of confusion diffusion) because it provides security against both front end and back end side of cloud computing architecture and also provide RAS (Reliability, Availability, and Security)

G. Vijay Baskar, N. Sathees Kumar & N. KarthickKumar, (2013) Cloud


computing is growing part of IT and many big organizations are going to implement cloud computing.Some of them provide IaaS, PaaS and some other provides SaaS. Amazon.com, Sun, IBM provides storage service while Google Apps provides software as a service. So by incorporating and collaboration of these organizations, a huge cloud can be formed which will provide all necessary computing resources to the users. Today, most cloud computing systems in operation are proprietary. While implementing cloud computing, it is required to provide open source services as much as possible, so that services can be provided at lower cost. EUCALYPTUS is an open source software framework for cloud

computing that implements what is commonly referred to as Infrastructure as a Service (IaaS). So PaaS and SaaS can also be implemented as open service to cut the cost of the computing resources. By implementing clouds, the trend of using Internet would change in drastic manner. This shows that the fifth generation of the computing in the form of cloud computing now begins.

Gurudatt Kulkarni, Jayant Gambhir & Rajnikant Palwe, (2012)


Enterprises would do well to consider the flexibility and risk-management

20

implications of adding SaaS to their portfolios of IT services. Integration and composition are critical components in your architecture strategies to incorporate SaaS successfully as a fully participating member of your service-centric IT infrastructure. Today, SaaS applications are expected to take advantage of the benefits of centralization through a single-instance, multi-tenant architecture, and to provide a feature-rich experience competitive with comparable on-premise applications. A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform.

21

CHAPTER: 5 GERNAL BACKGROUND


5.1 HISTORY

22

The idea of cloud computing started to emerge before the Internet was inv
ented. The concept of cloud computing is used from early 1960's. Utility computing, the ASP model, autonomic computing is one of the precursors of cloud computing. Cloud services can be effectively implemented in industries for revenue generation and business growth.

The idea of an "intergalactic computer network" was introduced in the


sixties, who were responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969.

Since the sixties, cloud computing has developed along a number of lines,
with Web 2.0 being the most recent evolution. However, since the internet only started to offer significant bandwidth in the nineties, cloud computing for the masses has been something of a late developer.

One of the first milestones for cloud computing was the arrival of
Salesforce.com in 1999, which pioneered the concept of delivering enterprise applications via a simple website. The services firm paved the way for both specialist and mainstream software firms to deliver applications over the internet.

The next development was Amazon Web Services in 2002, which


provided a suite of cloud-based services including storage, computation and even human intelligence through the Amazon Mechanical Turk.

2006: Amazon launched Amazon Web Service (AWS) on a utility


computing basis although the initial released dated back to July 2002. Amazon Web Services (AWS) is a collection of remote computing services

23

(also called web services) that together make up a cloud computing platform, offered over the Internet by Amazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3.

Another big milestone came in 2009, as Web 2.0 hit its stride, and Google
and others started to offer browser-based enterprise applications, though services such as Google Apps.

October 2011: Apple Inc launched iCloud, a cloud


based storage service for Apple productowners. The company claimed iCl oud has more than 150 million users as of July 2012.

In 2011:
Chinese ecommerce giant Alibaba Group Holding Ltd announced plans to develop acloudbased operating system for smartphones. The move was seen as Alibaba' s attempt totap into China's huge smartphone market.

Since 2011: The Chinese government has reiterated its support for the de
velopm---ent of the cloud computing industry in China.

24

5.2 POLITICAL ISSUES, LEGAL ISSUES, SECURITY ISSUES

25

Political Issues: The clouds span many borders and may be the ultimate from of globalization. As such it becomes subject to complex geopolitical issues: Providers must satisfy Myriad regulatory environments in to deliver service to global market. This dates back to the early days of the internet, where libration thinkers felt that cyberspace was a distance space calling for laws and legal intuition of its own; author Neal Stephenson envisaged this as a tiny island data haven called kinakutta in his classic science-fiction novel Cryptonomicon.

Legal Issues: TRADMARK 77,139,082) in the United States. The Notice of Allowance it received in July, 2008 was cancelled august 6 resulting in formals rejection of the trademark application less than a week later.

In March 2007, DELL applied to trademark term cloud computing (U.S

On 30 September 2008, USPTO issued a: Notice of Allowance to


CGacive LLC (U.S Trademark 77,355,285) for CloudOS. A cloud operating system is a generic operating system that manages the relationship between software inside the computer and on the Web, such as Microsoft Azure. Good OS LLC also announced their Cloud operating system on 1 December 2008.

Security Issues:

As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model. The effectiveness and efficiency of traditional protection

mechanisms are being reconsidered as the characteristics of this innovative deployment model can differ widely from those of traditional architectures. An alternative perspective on the topic of cloud security is

26

that this is but another, although quite broad, case of "applied security" and that similar security principles that apply in shared multi-user mainframe security models apply with cloud security. The relative security of cloud computing services is a contentious issue that may be delaying its adoption. Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else's control. Physical control and the ability to visually inspect data links and access ports is required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing are due in large part to the private and public sectors' unease surrounding the external management of security-based services. It is the very nature of cloud computing-based services, private or public, that promote external management of provided services. This delivers great incentive to cloud computing service providers to prioritize building and maintaining strong management of secure services. Security issues have been categorized into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console

security, account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers, standardization of APIs, and improving virtual machine support and legal support.

Cloud computing offers many benefits, but is vulnerable to threats. As cloud computing uses increase, it is likely that more criminals find new ways to exploit system vulnerabilities. Many underlying challenges and risks in cloud computing increase the threat of data compromise. To mitigate the threat, cloud computing stakeholders should invest heavily in risk assessment to ensure that the system encrypts to protect data, establishes trusted foundation to secure the platform and infrastructure, and builds higher assurance into auditing to strengthen compliance.

27

5.3 RESEARCH METHODOLOGY

28

There are main two main data sources for the research study- primary and secondary. To collect the data for this research study, both primary and secondary source used. One of the cardinal rules in data collection is to exhaust all secondary sources before conducting primary studies. The operational features of secondary data are that it already exists and its easily available. Secondary data can be quite versatile and used for many purposes. To collect secondary data, first, the reached reviewed article related to research objective the appeared in the literature. Key journals and proceeding were systematically scanned for any articles related to the research topic. To conduct an empirical investigation, a survey was conducted, using a questionnaire. At first, the items included in questionnaire decided. Next, the survey conducted collects the data and analyzed. The questionnaire was pre-tested in pilot study to fine the questionnaire. The pilot study was conducted among a convince sample. Based on pilot study and the feedback from the participants, some items were rewarded to improve clarity. OBJECTVES OF THE STUDY: 1) To study the cloud computing technology 2) To study the positive and negative factors of the cloud computing. SAMPLE DESIGN AND SAMPLE SIZE: As the survey is about understanding about the uses of the cloud computing, the research specially designed for the technical people. The sample size was small because of the sensitivity of the topic. Therefore few respondents share their views, suggestion, information and their experience. LIMITITIONS: - Sample size small because it was quiet difficult to reach highly professional technocrats for the survey on this sensitive topic cloud computing.

29

Various statically techniques as learned have been implemented and conclusion as best possible has been drawn making few assumption as and when required.

SCOPE OF THE STUDY: Findings this study indicates that the study is quite informative and useful for both general public and companies indulge cloud technology. They can understand the dimensions reflecting benefits and risk of cloud computing.

30

5.4 COMPONENTS

31

Application The application itself, which is the component that end users will spend most of their time using, is hosted on severs that are remote from the user and can be run in real time from a thin client that hosts the application through a web browser. The majority of applications that are hosted on clouds are run via browsers. This has major benefits in that there is no installation of the application, no maintenance required and support issues are streamlined because the software is hosted on a machine that is dedicated to that software so there is no worry of external influences of the thin client on the software itself. Cloud applications are also referred to as software as a service (Sass), software plus service or data as a service.

Client The client, or thin client, is generally a web browser such as Mozilla Firefox or Microsoft Internet Explorer. A newcomer has been Googles Chrome, which brings an interesting discussion into play as to how much the web browser that is known as today will become more powerful. It may soon be able to disseminate dynamic application interfaces so that it becomes more of a portal or perhaps an operating system in and of itself.

It should also be noted that there are other types of thin clients out there. For example, in the mobile telephone environment Apples iPhone or Googles Android platforms run a suite of applications that can be considered run from the cloud.

Also certain web sites can be termed clients, for example Facebook, where there are thousands of applications available for its users to utilize. This in effect may be a sort of virtual client itself that has yet to be defined.

32

Infrastructure The infrastructure of cloud computing is comprised of computer hardware and the buildings that contain that hardware. As discussed before, the hardware consists of cheap, mass produced server technology which has become prevalent in the computer industry today. The server environment itself is running virtualization technology which means that inside the server farm it is irrelevant how many specific machines there are. Rather, it make more sense to run software that can harness the machines inherent multiple processing power so that the cloud companies can reap more benefits out of each customers processing ability. Some companies use a process known as full virtualization which is a technique where the user is able to completely simulate the hardware that is run on the individual sever. Often this is use to emulate new hardware types. A few companies that are running full virtualization today include Go Grid and Sky tap. Another infrastructure process is called gird computing. Unlike full virtualization, which has a one to one ratio in software to computers, grid computing is the usage of sever machines network together for heavier processing power. Generally done for very heavy tasks like mathematics, grid computing can be implemented via several geographic locations. One company that is running grid style computing is Sun Microsystems Sun Grid. One newer infrastructure process is known as par virtualization. Para virtualization utilizes more than one machine, and often several machines, to emulate one process. Although IBM has done this in the past, the concept has changed somewhat and it was known as using a parallel workstation. The company most famously using this technology is Amazon with their Elastic Compute Cloud.

33

Platform The cloud platform is referring to the way that applications can be deployed, most likely the name derived for by Platform as a Service (PaaS). Also the name solution as stack service comes to mind as well. This would include the web application frameworks that are out there such as the language Ruby on Rails, which is an open source web application format. Some other examples of the cloud platform is Force.com, Salesforce.coms proprietary Pass service, the Google App Engine which runs off of Python and the web hosting service Moss. All of these are examples of how platforms can potentially be run in the cloud environment today.

Service Service is referring to what users can reap from their cloud experience. To date there are a ton of services out there on the Internet for users to take advantage of. Some of them are quite unique, while others enhance services that were already out there. One of the most popular services in recent years that uses cloud computing would be mapping services. A few examples include Yahoo Maps, Google Maps, and MapQuest. These services require a lot of database storage. They also need a lot of processing power to perform tasks such as giving people accurate directions. Another service requires a lot more back office tasks, and that is payment services. These payment processors require a lot of processing power to accurately do the accounting that is required in the background for deposits and withdrawals. Two of the most popular payment services include both PayPal and Google Checkout. Customized search functions require cloud technology to work. That is why search services are out there to help people find what they need. This technology also requires a lot of computing power. Services such as Google

34

Custom Search and Alexa, even Ask.com utilize massive server farms to properly keep their pages indexed.

Storage Physical storage can be expensive for companies looking to expand their storage needs. It is cheaper to go with the cloud to be able to expand and collapse as the business dictates. One of the biggest features of cloud computing is in fact storage. The main reason is that in hardware terms storage devices are the first ones to fail on a computer. By using cloud technology it is more redundant in the respect that companies can rest assured that their data is indeed safe. Cloud vendors will usually be able to provide service level agreements to let their customers know that their data is safe. Sever farms and thus cloud computing offer a great way to keep data safe in case there is an emergency situation. Because there are so many computers in the cloud environment, the chances of complete failure of all systems is very slim. In this way, cloud vendors are able to entice customers with incentives of protecting their data from harm. Some of the current companies that are offering database storage services in the cloud include Amazons SimpleDB and Google App Engines Bitable data storage service. Microsoft offers an online synchronization service called Live Mesh, which is part of the Live Desktop service that they are now offering. Regular storage services include Amazons Simple Storage Service.

35

5.5 STANDERS

36

Cloud standard, a number of exciting, typically, lightweight, open standard, have facilitate the growth of cloud computing, including: APPICATION Communication (HTTP,XMPP) Security ( OAuth, open ID, SSL/TLS) Syndication (Atom)

CILENT Browsers (AJAX) Offline (HTML 5)

IMPLEMENTATIONS - Virtualization (OVF)

PLATFORM Solution stacks (LAMP)

SERVICES Data ( XML, JSON) Web service (REST)

STORAGE Database ( Amazon simple DB, Google App Engine Big Data storage) Networked attached storage (Mobile ME iDisk, Nirvana cloudNAS) Synchronization (Live Mesh Live Desktop component) Web Services ( Amazon Simple Storage Service)

37

5.6 CLOUD COMPUTING SERVICES MODEL

38

Cloud computing can be classified by the model of services it offers into one of three different groups. There will be described using the XaaS taxonomy, first used by Maxwell in 2006, where X is software, platform or infrastructure, and the final S for services. 4.6.1 Infrastructure as a service (IaaS): In the most basic cloud-service model, providers of IaaS offer computers physical or (more often) virtual machines - and other resources. (A hypervisor, such as Xen or KVM, runs the virtual machines as guests. Pools of hypervisors within the cloud operational support-system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.) IaaS clouds often offer additional resources such as a virtual-machine disk

image library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundle. IaaS-cloud providers supply these resources on-demand from their large pools installed in data centers. For wide-

area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks).

To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS a service on a utility computing basis cost reflects the amount of resources allocated and consumed.

Examples of IaaS providers include: Google Compute Engine, HP Cloud, Joyent, Linode, NaviSite, and Ready Space Cloud Services.

39

The spending on cloud service is expected to show the largest increase in the IT marketplace, with North Africa and the Middle East having growth of over 20% through 2016, according to analysts at Gartner. The first cloud service in the United Arab Emirates for SMBs and enterprises was announced June 2013 when the leading telecom operator in the Middle East and Africa Etisalat launched its first cloud service in the UAE. IaaS cloud model was believed to reduce IT costs up to 60% and time to market faster by up to 90%.

Cloud communications and cloud telephony, rather than replacing local computing infrastructure, replace local telecommunications

infrastructure with Voice over IP and other off-site Internet services.

4.6.2 Platform as a service (PaaS) : In the PaaS model, cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. Examples of Pass include: AWS Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, OpenShift, Googl e App Engine, AppScale, Windows Azure Cloud Services,OrangeScape and Jelastic.

40

4.6.3 Software as a service (SaaS) In the business model using software as a service (SaaS), users are provided access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis. SaaS providers generally price applications using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications are different from other applications in their scalabilitywhich can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load distribute the work over the set of virtual machines. This process is transparent to the cloud user, who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention : desktop as a service, business process as a service, test environment as a service, communication as a service.

The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point.

41

Examples of SaaS include: Google Apps, Microsoft Office 365, Petrosoft, Onlive, GT Nexus, Marketo, Casengo, TradeCard, Salesforce and CallidusCloud.

Proponents claim SaaS allows a business the potential to reduce IT operational costs by outsourcing hardware and software maintenance and support to the cloud provider. This enables the business to reallocate IT operations costs away from hardware/software spending and personnel expenses, towards meeting other goals. In addition, with applications hosted centrally, updates can be released without the need for users to install new software. One drawback of SaaS is that the users' data are stored on the cloud provider's server. As a result, there could be unauthorized access to the data.

42

5.7 TYPE OF CLOUD

43

4.7.1 Private cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to virtualized the business environment, and requires the organization to reevaluate decisions about existing resources. When done right, it can improve business, but every step in the project raises security issues that must be addressed to prevent serious vulnerabilities. They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".

Comparison for SaaS Public cloud Initial cost Typically zero Private cloud Typically high Unpredictable Possible

Running cost Predictable Customization Impossible Privacy

No (Host has access to the data) Yes Possible Laborious but no limits

Single sign-on Impossible Scaling up Easy while within defined limits

44

4.7.2 Public cloud A cloud is called a 'Public cloud' when the services are rendered over a network that is open for public use. Technically there is no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered).

4.7.3 Community cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized.

4.7.4 Hybrid cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Such composition expands deployment options for cloud services, allowing IT organizations to use public cloud computing resources to meet temporary needs. This capability enables hybrid clouds to employ cloud bursting for scaling across clouds. Cloud bursting is an application deployment model in which an application runs in a private cloud or data center and "bursts" to a public cloud when the demand for computing capacity increases. A primary advantage of cloud bursting and a hybrid cloud model is that an organization only pays for extra compute resources when they are needed.

45

Cloud bursting enables data centers to create an in-house IT infrastructure that supports average workloads, and use cloud resources from public or private clouds, during spikes in processing demands. By utilizing "hybrid cloud" architecture, companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. Hybrid cloud architecture requires both on-premises resources and off-site (remote) server-based cloud

infrastructure. Hybrid clouds lack the flexibility, security and certainty of in-house

applications. Hybrid cloud provides the flexibility of in house applications with the fault tolerance and scalability of cloud based services.

46

5.8 ROLES IN CLOUD COMPUTING

47

4.8.1Provider A cloud computing provider or cloud computing service provider owns and operates live cloud computing systems to deliver service to third parties. The barrier to entry is also significantly higher with capital expenditure required and billing and management creates some overhead. Nonetheless, significant operational efficiency and agility advantages can be realized, even by small organizations, and server consolidation and virtualization rollouts are already well underway. Amazon.com was the first such provider, modernizing its data center switch, like most computer networks, were using as little as 10%of its capacity at any onetime just to leave room for occasional spikes. This allowed small, fastmoving groups to add new features faster and easier, and they went on to open it up to outsiders as Amazon Web Services in2002on a utility computing basis. 4.8.2User A user is a consumer of cloud computing. The privacy of users in cloud computing has become of increasing concern. The rights of users are also an issue, which is being addressed via a community effort to create a bill of rights. 4.8.3 Vendor A vendor sells products and services that facilitate the delivery, adoption and use of cloud computing. For example: Computer hardware (Dell, HP, IBM, Sun Microsystems) o Storage (Sun Microsystems, EMC, IBM) o Infrastructure (Cisco Systems) Computer software (3tera, Hadoop, IBM, RightScale) o Operating systems (Solaris, AIX, Linux including Red Hat) o Platform virtualization (Citrix, Microsoft, VMware, Sun xVM, IBM)

48

5.9 CHARACTERISTICS

49

Agility improves

with

users'

ability

to

re-provision

technological

infrastructure resources.

Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs.

Cost is claimed to be reduced, and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project's state of the art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available inhouse.

Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.

Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another.

50

Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for: Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 1020% utilized.

Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business

continuity and disaster recovery.

Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.

Performance is

monitored

and

consistent

and

loosely

coupled

architectures are constructed using web services as the system interface.

Security could improve due to centralization of data, increased securityfocused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud

51

installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.

The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics": On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by

heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. ... Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).

52

5.10 SECURITY FACTORS

53

The relative security of cloud computing services is a continuous issue which may be delaying it adoption. Issue barring adoption of cloud computing are due in large part to the private and public sectors unease surrounding the external management of security based service. It is the very nature cloud computing services, private or public, that promote external management of services. GOOGLE - The leader in cloud computing. Google offers serial service including e-mail and document application service Google claims its services are 99.99% reliable Bugs and glitches always occur with new technology.

AMAZON - Amazon offers data storage service Company has only pay storage they use More and more companies are starting trust cloud computing service and turn begin to store their data in clouds.

MICROSOFT - The cloud computing industry is predicted to hurt software business Therefore, Microsoft is taking a stand and developing cloud computing services of their own, Azure. They are offering Microsoft based document application for the web for small monthly fee. Even the government is waiting to get on this new technology. The US defense Department offering a new cloud computing

services to his military use.

54

IBM -

IBM is developing cloud computing application for everyday user called Cloudburst IBM also offers private cloud computing services using IBM blue services software.

KEY CHARACTERISTICS: RELIABLITY: It improves through the use of multiple redundant sites, which make its suitable for business continuity and disaster recovery. Nonetheless, most major cloud computing services suffered outages and IT and business mangers are able to do little when they are affected. SECURITY: It typically improve due to centralization of data increased security-focus, resource, etc.., but raises concern about loss of control over certain sensitive data. SUSTAINABILITY: It comes about through improved resource utilization, more efficient system, and carbon neutrality. Nonetheless, computer and associated infrastructure is major consumer of energy.

55

5.11 CLOUD COMPUTING PROS AND CONS

56

PROS:

Lower computer costs Improved performance Reduced software costs Instant software updates Unlimited storage capacity Increased data reliability Universal document access Latest version availability Improved document format compatibly

CONS:

Can be slow Feature might be limited Store data might not be secure Stored data can be lost Requires constants internet connection Does not work with low-speed connections HPC system General concerns

57

5.12 LIMITATIONS

58

Cloud computing is widely recognized as a revolutionary IT concept and with dierent oerings can t the needs of very diverse customers, rangin g from large enterprises, small start-ups, to end-users. Some cloud based applications, such as Gmail, have had great success; but as the diversity of the o erings grows so does the reluctance to trust some services or to trust more sensitive data to osite computers. This is easily observed at the enterprise level when decision makers in the information technology departments of companies and organizations keep rejecting a move to the cloud. At present most organizations are only willing to outsource applications that involve less sensitive information. According to a survey of more than 500 chief executives and IT managers of 17 countries they still trust existing internal systems over cloud -based systems due to the fear about security threats and loss of control of data and systems . The ones that do agree to move to the cloud still demand third party risk assessments or at least ask the cloud providers questions such as: Who will have access to the data and applications and how will that be monitored? What security measures are used for data transmission and storage? How are applications and data from dierent customers are kept separate? Where, in terms of geographical location, will be the data stored? Could the Choice of the location aect me? Can these measures and details be stipulated in a service level agreement? All these customer worries can be translated into what can be identied as the mainobstacles to the adoption and growth of cloud computing. Each of these obstacles are examined in the following subsections 1 Availability of service Outages of a service become a major worry when customers have deposited all their information in the cloud and might need it at anytime. Given that the customer management interfaces of public clouds are accessible via Internet, there is an increased risk of failure when compared to traditional services since

59

there are more weak points in the chain of elements needed to access the information or application. For instance, web browser vulnerabilities could lead to service delivery failures. A feasible means to obtain a high degree of availability would be using multiple cloud computing providers. Cloud providers are well aware of these risks and today provide more information about the current state of the system, as this is something that customers are demanding. Sales force for instance shows the real-time average response time for a server transactional Trust.salesforce.com. Amazon has implemented a service dashboard that displays basic availability and status history. 2 Data lock-in As some people, such as GNU creator Richard Stallman have advised, the use of proprietary cloud-based applications could end up in situations where migration o the cloud to another cloud or to an in-house IT environment would be nearly impossible. The reason for the current poor portability and limited interoperability between clouds is the lack of standardized APIs. As a consequence migration of applications between clouds is a hardtack. An evolution towards standardized APIs would not only overcome this risk by allowing SaaS to develop software services interoperable in all clouds, but would provide a rm basis to progress towards hybrid computing models. Google is the only cloud provider truly advancing to achieve a more standard environment and they even have an initiative, called Data Liberation Front , to support users moving data and applications in and out of their platform. 3 Data segregation A direct consequence of the multi-tenant usage mode, where di erent customers virtual machines are co-located in the same server or data is on the same hard disks, is the question of isolation. How should the cloud securely isolate users? This class of risks includes issues concerning the failure of mechanisms to separate storage or memory between di erent users(i.e., such a failure would enable information to leak from one customers VM to another customers VM). There are a number of documented vulnerabilities in di erent commercial hypervisors that have been exploited to gain access to one or more

60

customers virtual machines. Another type of attack whose feasibility has been reported is a side-channel attack. A case study carried out by MIT and University of California at San Diego on the AmazonEC2 service considered this style of attack an actual threat, and they demonstrated this attack by successfully overcoming the following: Determining where in the cloud infrastructure a septic virtual machine instance is located. Determining if two instances are co-resident in the same physical machine. Proving that it is possible for an adversary to launch on purpose instances that will be co-resident with another users instances. Proving that it is possible to take advantage of cross-virtual machine information leakage once co-resident. They were able to successfully perform all the previous steps given that patterns can be found in the mapping of virtual machine instances into physical resources (for example, by examining internal and external IP addresses of a large number of different types of instances). In their tests they could launch co-resident instances with a 40% probability of success. They state that the only certain way to avoid this threat is to require exclusive physical resources, something that ultimately customers with high privacy requirements will begin to ask for. 4 Privilege abuse The threat of a malicious insider with a privileged role (e.g. a system administrator) is inherent to any outsourced computation model. Abuse by insiders could impact and damage the customers brand, reputation, or directly damage the customer. Note that these same type of attacks can be carried out by internal employees in a traditional (i.e., non-cloud) computing infrastructure. Cloud customers should conduct a comprehensive assessment of any potential cloud provider, specifying human resource requirements (i.e. stating who will have access to their data and what level of access they will have) and requiring transparency measures. Additional trust systems that would not require the customer to blindly trust the provider would be useful.

61

5 Scaling resources As noted earlier in section 3, the ability of scaling up or down resources to meet workload is one of the most desired cloud computing advantages. However, this great advantage can lead to service failures if it is not well implemented or if a maximum response time is not agreed upon beforehand. A web application developer who hosts its service on a cloud may see how the response time steadily increases when the usage of the application also increases - because the cloud does not scale up resources quickly enough. On the other hand, scaling must be limited by some threshold. This threshold would stop the continuous increase in the allocation of resources to prevent the cloud provider from suffering a denial of service attack because the customers application was malfunctioning. In either case the customer could be billed for service that they did not want. Existing service level agreements determine quality of service requirements, but not inters of response time in response to workload variations. There are proposed solutions in service level agreements (SLA) for scalability implemented through statistical machine learning. 6 Data security and condentiality The distributed nature of the cloud model necessarily involves more transits of data over networks, thus creating new challenging security risks. The condentiality of the data must be assured whether it is at rest (i.e. data stored in the cloud) or in transit (i.e. to and from the cloud). It would be desirable to provide a closed box execution environment where the integrity and condentiality of the data could be veried by its owner. While encryption is an answer to securely storing data in the cloud, it does not t that well with cloud-based processing. This later problem occurs because generally the cloud both stores data and applications running on the cloud operate on this data. In most cases the data has to be unencrypted at some time when it is inside the cloud. Some operations would be simply impossible to do with encrypted data and, furthermore, doing computations with the encrypted data would consume more computing resources (and more money, inconsequence).There are recent steps towards dealing with this issue.

62

One is the Trusted Cloud Computing Platform , which aims to apply the Trusted Computing model (developed in 2003 by Intel, AMD, HP, and IBM) to the cloud. However the scope of this initiative is to protect against malicious insiders, inside the cloud provider organization. Another project of the Microsoft Cryptography Group is a searchable encryption mechanism introduced by Kamara and Lauter in. The underlying process in this system is based on a local application, installed on the users machine, composed of three modules: a data processor, a data verier, and a token generator. The user encrypts the data before uploading it to the cloud. When some data is required, the user uses the token generator to generate a token and a decryption key. The token is sent to the cloud, the selected encrypted le(s) are downloaded, and then these les are veried locally and decrypted using the key. Sharing is enabled by sending the token and decryption key to another user that you want to collaborate with. The enterprise version of the solution consists of adding a credential generator to simplify the collaboration process. Other relevant projects are also being conducted. One example is a recently published PhD dissertation from Stanford University done by Craig Gentry in collaboration with IBM. This research proposes A fully homomorphism encryption scheme. Using their proposed encryption method data can be searched, sorted, and processed without decrypting it. The innovation here is there freshing mechanism necessary to maintain low levels of noise .Although successful, both initiatives have turned out to be still too slow and result it very low efficiency. As a result, they are not commercially utilized yet. 7 Data location In addition to the topology of the cloud network, the geographic location of the data also matters in some cases. Knowing datas location is fundamental to securing it, as there might be important differences between regulatory policies in different countries. A customer could be involved in illegal practices without even noticing, as some government prosecute companies that allow certain types of data to cross geographical boundaries. Cloud computing customers must tackle this issue by understanding the regulatory requirements for every country they

63

will be operating in. Not only the datas location, but the p ath the data follows may also matter. According to Forresters Cloud Privacy Heat map, a possible conclusion is that it can be hard for an application operator to deploy application sat a minimum distance from the users (i.e., there may be locations where the data must travel to that require following a non-optimal path because the ideal path crosses countries with restrictive laws).Currently there are cloud providers that leave the choice of the datacenter location to the user. For instance, Amazon overs two locations in the US and one in Europe. Very likely, other providers will add to Amazons region choice over as the location of data is an increasing important requirement of potential customers. 8 Deletion of data Closely related with the isolation issues that the multi-tenant architecture can entail isthe fact that the user can erase data upon request. A user of a public cloud may require his data to be deleted, i.e., completely removed from the cloud. As this can only be entirely done by erasing, repeatedly re-writing the disk sectors with random data, and possibly formatting the servers hard disk, this could turn out to be impossible to do at the service provider environment. As noted earlier in the discussion of a side-channel attack, a malicious user could later take advantage of remaining data. Even with multiple cycles of re-writing the sectors which previously held the le it may be possible to access the "erased" data, but the probability can be reduced - however, this is at a quite high cost in time and disk I/O and may not be completely successful. In the latest report about cloud computing by the European Network and Information Security Agency (ENISA) it has been suggested that if encryption were applied to data at rest, the level of this risk would be considerably lower. 9 Recovery and back-up Cloud providers should have an established plan of data back-up in the event of disaster situations. This may be accomplished by data replication across different locations and the plan must be addressed in the service level agreement.

64

10 The Online cloud Being completely dependent upon an Internet connection might turn out to be impossible or highly risky for some users who need an application (or data) to be available at all times. This creates a bigger problem if the user is moving and the quality of the connection can change, hence in some situations relying on a Internet service provider is simply not an option The so-called pure Cloud computing model causes this impediment. This model is based on the fact that the most used software application nowadays is the web browser and that today complete applications can be delivered as a service through the Internet and all of the end-users interaction can occur through a web browser. An obvious conclusion is to build a web based OS. In this approach the web browser acts as the interface to the rest of the system and hardware, such as hard disks or powerful processors, would not be needed locally anymore. Instead, a net book or other thin-client with a low energy consuming processor (e.g. Intel Atom, Via Technologies C7, etc.) would source provided that most of the computation would take place in the cloud and that all the data would be stored there as well. This is the model that Google is pursuing with their Chrome OS. In addition, other independent software vendors are developing web desktop overeggs, such as the eye OS . In this pure Cloud model, loosing connectivity to the cloud is a major problem because it means that the local computer becomes almost useless. In 2007, Google introduced Gears: a free add-on for the browser that enables data to be stored locally in a fully searchable database while surng the Internet. Gears pretty much solved the online problem enabling web applications to continue their operations

65

5.13 Benefits

66

1. Flexibility

The second a company needs more bandwidth than usual, a cloud-based service can instantly meet the demand because of the vast capacity of the services remote servers. In fact, this flexibility is so crucial that 65% of respondents to an InformationWeek demands survey said the ability to quickly meet business

WAS AN IMPORTANT REASON TO MOVE TO CLOUD COMPUTING .

2. Disaster recovery When companies start relying on cloud-based services, they no longer need complex disaster recovery plans. Cloud computing providers take care of most issues, and they do it faster. ABERDEEN G ROUP
FOUND

that businesses which

used the cloud were able to resolve issues in an average of 2.1 hours, nearly four times faster than businesses that didnt use the cloud (8 hours). The same study found that mid-sized businesses had the best recovery times of all, taking almost HALF THE TIME OF LARGER COMPANIES TO RECOVER.

3. Automatic software update In 2010, UK companies spent 18


SECURITY ALONE . WORKING DAYS PER MONTH MANAGING ON -SITE

But cloud computing suppliers do the server maintenance

including security updates themselves, freeing up their customers time and resources for other tasks.

4. Cap-ex free Cloud computing services are typically pay as you go, so theres no need for capital expenditure at all. And because cloud computing is much faster to deploy, businesses have minimal project start-up costs and predictable ongoing operating expenses.

67

5. Increased Calibration Cloud computing increases collaboration by allowing all employees wherever they are to sync up and work on documents and shared apps simultaneously, and follow colleagues and records to receive critical updates in real time. A survey by Frost & Sullivan found that companies which invested in collaboration technology had A 400% RETURN ON INVESTMENT . 6. Worked from anywhere As long as employees have internet access, they can work from anywhere. This flexibility positively affects knowledge workers' work-life balance and productivity. One study found that 42% of working adults would give up some of their salary if they could telecommute, and on average they would take a 6% pay cut.

7 Document control According to one study, "73%


OF KNOWLEDGE WORKERS COLLABORATE WITH

PEOPLE IN DIFFERENT TIME ZONES AND REGIONS AT LEAST MONTHLY ".

If a company doesnt use the cloud, workers have to send files back and forth over email, meaning only one person can work on a file at a time and the same document has tones of names and formats. Cloud computing keeps all the files in one central location, and everyone works off of one central copy. Employees can even chat to each other whilst making changes together. This whole process makes collaboration stronger, which increases efficiency and improves a companys bottom line.

8. Security Some 800,000 LAPTOPS ARE LOST EACH YEAR IN AIRPORTS ALONE. This can have some serious monetary implications, but when everything is stored in the cloud, data can still be accessed no matter what happens to a machine.

68

9. Competitiveness The cloud grants SMEs access to enterprise-class technology. It also allows smaller businesses to act faster than big, established competitors . A
DISASTER RECOVERY STUDY ON

eventually concluded that companies that didnt use the

cloud had to rely on tape backup methods and complicated procedures to recover slow, laborious things which cloud users simply dont use, allowing David to once again out-man oeuvre Goliath. 10. Environment friendly Businesses using cloud computing only use the server space they need, which decreases their carbon footprint. Using the cloud results in at least 30% less energy consumption and carbon emissions than using on-site servers. And again, SMEs get the most benefit: for small companies, the cut in energy use and carbon emissions is LIKELY TO BE 90%

69

5.14 DISCUSSIONS

Thoughts on cloud computing 70

Cloud computing is a rather simple concept; using an application without having to install it Cloud computing vulnerabilities have closed down companies like Magnolia, and Media ax. Other serious events (inconvenience of Salesforce.coms customers to access crucial business application, Nokia Ovis server crash and result in loss of data) are pointers that cloud computing await dark days. There are many reasons to justify why cloud is risky. Recently Black Hat conference in Los Angeles addressed the key-factors that bully cloud computing. Microsoft, Amazon, Apples Mobile Me services were some prominent names in Clobbering the cloud list. One server is responsible for potential data-storage. This is a major drawback in cloud internet. In case the server dies down, data retrieval will be impossible. This makes cloud incompetent. However, many cloud service providers store data across many servers and in few cases they may even store it at multiple data centers. Before deciding on your cloud project, make sure to ask how and where data is stored. Second concern is password security. User-accounts are safeguarded only by a password. Rest is left to good humor! Cloud-providers concentrate more on user-friendliness of the server than on security measures or firewall protection. This therefore puts cloud in the risk of getting hacked. Makes cloud vulnerable. Cloud ignores data-encryption. This makes it easier for a hacker to guess at numbers stored on the main server resulting into unprotected interwar intrusion and data theft. Wouldnt it be awful if you top-secret business plan is leaked over the internet

71

CHAPTER 6 ANALYIS OF DATA

Q.1 Do you know about cloud computing?

72

(Respondent n=200) Sr. No. 1 2 Yes No Statements f 152 48 % 76 24

24% Yes No 76%

From the data depicted graph conclude that cloud computing concept are known by 76% and not known by 24%. So we say that, this concept is the important for the public and IT department.

73

Q.2 In which industry you work? (Respondent n=200) Sr. No. 1 2 3 4 5 Finance Government Technology Communications Other Statements f 21 33 52 42 52 % 10.50 16.50 26 21 26

10.50% 26% 16.50% Finance Government Techonology Communication 21% 26% other

The above given graph shows about the people are works in the different industry the 52% people are work in other industry The 52% people of technology and 42% people of communication are comes in the IT department The 33% people who works in the government are also needed the cloud computing.

Q.3 Which are the main reasons for using cloud computing for you?

74

(Respondent n=200) Sr. No. 1 2 3 4 5 Statements Investments Improved reliability Scalability Pricing model Other f 44 33 40 28 55 % 22 16.50 20 14 27.50

30% 25% 20% 15% 10% 5% 0% Investment Improved Reliability Scalability Pricing Model 22% 20% 16.50% 14%

27.50%

Other

The above chart shows that, the 27.50% people are main reason using the cloud computing for other use like; security, personal data, privacy etc. The 22% people are reason for using investments. In the cloud computing people are invest their company or personal data.

75

The 20% people main reasons using is scalability. Cloud computing reduce the scalability. The 16.50% are use for improved reliability and 14% people are using for pricing model

Q.4 which model you prefers for cloud computing? (Respondent n=200) Sr. No. 1 Statements IAAS( Infrastructures as a services) 2 3 PASS (Platform as a service) SAAS (Software as a service) 48 76 24 38 f 76 % 38

38%

38%

IAAS PAAS SAAS

24%

The above give graph shows that, the 38% people are using the IAAS (Infrastructures as a services) and SAAS (Software as a service) this types of model

76

The 24% people prefers the PASS (Platform as a service) model.

The

technology

and

communications

people

prefers

the

IAAS(

Infrastructures as a services) and SAAS (Software as a service) this types of model.

PASS (Platform as a service) model are using by the people for the software and pricing model.

Q.5 Which cloud model would you like to establish? (Respondent n=200) Sr. No. 1 2 3 Private Hybrid Public Statements F 63 51 86 % 31.50 25.50 43

43%

31.50%

Private Hybrid Public

25.50%

In the chart shows that the 43% people like to establish the public
cloud model.

77

The 31.50% people like to establish the private cloud model. The 25.50% people like to establish the hybrid cloud model.
Q.6 Which cloud computing services you like?

(Respondent n=200) Sr. No. 1 2 3 4 5 Statements Data storage Software Business specific E-mail and messaging Other F 37 37 61 38 27 % 18.50 18.50 30.50 19 13.5

Other

13.50%

E-mail & Messaging

19%

Business Specific

30.50%

Software

18.50%

Data Storage 0.00% 5.00% 10.00% 15.00%

18.50% 20.00% 25.00% 30.00% 35.00%

In above chart shows that, 30.50% people are like to business specific cloud computing services. In business cloud computing reduce the works.

78

The 19% people are using that services for the E-mail and messaging for personal uses.

The 18.50% of are using the services in software uses and data storage for the security and privacy. The 13.50% are using the services for other works.

Q. 7 What are the main concerns you prefer in, (A) IAAS ( Infrastructures as a services)

Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration

Strongly Disagree 28% 8%

Disagree 30% 29%

Neutral 24% 39.50%

(Respondent n=200) Agree Strongly Agree 9.50% 9% 17.50% 6.50%

11% 11.50% 8%

25.50% 23.50% 20.50%

30% 30% 27.50%

24.50% 23% 21.50%

9% 12% 22.50%

79

40% 35% 30% 25% 20% 15% 10% 5% 0% Privacy 9.50% 9% 30% 28% 24%

39.50%

29%

30% 25.50% 24.50%

30% 27.50% 23.50% 23% 22.50% 21.50% 20.50% Strongly Disagree Disagree Neutral

17.50% 11% 8% 9% 6.50% 11.50% 12% 8% Agree Strongly Agree Avaibility of service & data control Loss of control service Lack of liability Inter class migration

The above chart shows that the 39.50% are neutral for Availability of service & data control. The privacy factors, the 30% people disagree with it.

The loss of control services, the 25.50% people disagree and 24.50% are agreed.

The lack of liability, the 30% people are neutral and 23% are agree.

The inter class migration, the 27.50% are neutral and 22.50% are strongly agree.

So the IAAS services not prefer more.

80

(B) PASS (Platform as a services) (Respondent n=200) Agree Strongly Agree 18.50% 9% 11% 4.50%

Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration

Strongly Disagree 16.5% 8%

Disagree 18.50% 38%

Neutral 37.50% 31%

13% 8% 8.50%

18% 25.50% 10.50%

30.50% 32% 34.50%

30% 23% 29.50%

8.50% 12.50% 17%

40.00% 35.00% 30.00%

37.50%

38.00% 34.50% 31.00% 30.50% 30.00% 32.00% 29.50% 25.50% Strongly Disagree Disagree 17.00% 12.50% 8.50%8.00% 4.50% Strongly Agree Neutral Agree 10.50% 8.50%

25.00% 20.00% 15.00% 10.00% 5.00% 0.00% Privacy 9.00%8.00% 18.50% 18.50% 16.50% 18.50% 18.00% 13.00%

22.00%

Avaibility of Loss of control Lack of liability service & data service control

Inter class migration

81

The above chart shows that the 38.00% are disagree for Availability of service & data control. And 31% are neutral. The privacy factors, the 38% people disagree with it.

The loss of control services, the 25.50% people disagree and 24.50% are agree.

The lack of liability, the 30.50% people are neutral and 18% are disagree.

The inter class migration, the 34.50% are neutral and 17% are strongly agree.

These services are use by the public sector.

(C) SASS (Software as a service) (Respondent n=200) Agree Strongly Agree 14.50% 8.5% 17.5% 11%

Privacy Availability of services& data Control Loss of control services Lack of liability Intra-class migration

Strongly Disagree 14% 11.5%

Disagree 25% 25%

Neutral 38% 25%

11% 10% 7%

16.50% 22% 13%

34% 26% 35%

28.5% 24% 28%

10% 13% 17%

82

40.00% 35.00% 30.00%

38.00% 35.00% 34.00% 28.50% 25.00% 25.00% 17.50% 16.50% 26.00% 24.00% 22.00% 35.00% 28.00% Strongly Disagree Disagree 17.00% 13.00% 13.00% 7.00% Neutral Agree Strongly Agree

25.00% 20.00% 15.00% 10.00% 5.00% 0.00% Privacy Avaibility of service & data control Loss of control service 14.50% 14.00%

11.50% 11.00% 11.00% 10.00% 10.00% 8.50%

Lack of liability

Inter class migration

The above chart shows that the 25% are disagree and neutral for Availability of service & data control. And 14.50% are agreed. The privacy factors, the 38% people neutral with it.

The loss of control services, the 34% people neutral and 28.50% are agree.

The lack of liability, the 26% people are neutral and 24% are agree.

The inter class migration, the 35% are neutral and 28% are strongly agree and 17% strongly agree.

The people are like the SAAS services. This services are helpful for the private and hybrid sector more.

83

Q.8 In your views, cloud computing is the future model of information technology? (Respondent n=200) Sr. No. 1 2 3 4 5 Statements Strongly agree Agree Undecided Disagree Strongly disagree F 25 61 56 32 26 % 12.50 30 38 16 13

35.00% 30.00% 25.00% 20.00% 15.00% 12.50% 10.00% 5.00% 0.00% Strongly Agree Agree Undecided Disagree strongly Disagree 16.00% 13.00% 30.50% 28.00%

Above this graph shows that the, 30.50% people are agree that the cloud computing is the future model of the information technology.

33% people not decided that it is the useful future model for IT.

16% people are disagree with the cloud computing model.

84

Q.9 Do you think, government will impose cloud computing specific privacy legislation?

(Respondent n=200) Sr. No. 1 2 Yes No Statements f 106 94 % 53 47

No

47%

Yes

53%

44%

46%

48%

50%

52%

54%

This graph shows that the, 53% people are agreed with that government will impose the cloud computing legislation. And 47% people not agreed with that. So this is the mixed views of people.

85

Q. 10 In your views, cloud computing is bigger than internet? (Respondent n=200) Sr. No. 1 2 Yes No Statements f 95 105 % 47.50 52.50

100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Yes No 47.50% 52.50%

This graph shows that the, 47.50% people are agree with that cloud computing is bigger than internet. When 52.50% people are not agree with that cloud computing is bigger than internet.

So the cloud computing is not popular in information technology. Q. 11 Do you think, cloud computing is benefit for you?

86

(Respondent n=200) Sr. No. 1 2 Yes No Statements f 124 76 % 62 38

38.00% 62.00% Yes No

Above graph shows that, 62% people think that cloud computing are benefited. When 38% people think that it is not benefited.

So the, cloud computing are the benefit for the information technology.

87

CHAPTER 7 SPSS ANALYSIS

(A)IAAS PRIVACY:IN WHICH INDSTREY U WORK?

88

Crosstab

IN WHICH INDSTREY U WORK? 1 (A)IAAS PRIVACY 1 2 3 4 5 Total 4 9 3 3 1 20 2 12 16 4 1 1 34 3 8 16 20 10 2 56 4 15 11 7 4 1 38 5 15 22 7 3 5 52 Total 54 74 41 21 10 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .025 .026 .844

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 28.860a 28.660 .039

df

200

89

(A)IAAS PRIVACY: WORK EXPRIANCE

WORK EXPRI4NCE 1 (A)IAAS PRIVACY 1 2 3 4 5 Total 10 10 6 6 3 35 2 20 29 13 10 1 73 3 14 22 10 2 4 52 4 10 13 12 3 2 40 Total 54 74 41 21 10 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .440 .377 .724

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.070a 12.886 .125

df

200

90

(A)IAAS PRIVACY:QUALIFICATION

Crosstab Count QUALIFIC4TION 1 (A)IAAS PRIVACY 1 2 3 4 5 19 24 6 10 3 Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .016 .001 .333 2 8 7 12 6 3 3 10 24 10 5 0 4 10 6 8 0 2 5 7 13 5 0 2 Total 54 74 41 21 10

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 30.403a 38.471 .938

df

200

Total

62

36

49

26

27

200

91

AVALIBILITY OF SERVICES&DATA:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 AVALIBILITY OF 1 SERVICES&DA 2 TA 3 4 5 Total 0 6 11 3 0 20 2 1 7 15 8 3 34 3 6 18 19 10 3 56 4 3 9 14 8 4 38 5 5 18 19 7 3 52 Total 15 58 78 36 13 200

92

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .765 .567 .301

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 11.687a 14.426 1.070

Df

200

AVALIBILITY OF SERVICES&DATA:WORK EXPRIANCE

Crosstab

WORK EXPRI4NCE 1 AVALIBILITY OF 1 SERVICES&DAT 2 A 3 4 5 3 11 12 8 1 2 5 14 39 11 4 3 3 18 17 10 4 4 4 15 10 7 4 Total 15 58 78 36 13

93

Crosstab

WORK EXPRI4NCE 1 AVALIBILITY OF 1 SERVICES&DAT 2 A 3 4 5 Total 3 11 12 8 1 35 2 5 14 39 11 4 73 3 3 18 17 10 4 52 4 4 15 10 7 4 40 Total 15 58 78 36 13 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .308 .296 .867

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 13.888a 14.081 .028

df

200

AVALIBILITY OF SERVICES&DATA:QUALIFICATION

94

Crosstab

QUALIFIC4TION 1 AVALIBILITY OF 1 SERVICES&DA 2 TA 3 4 5 Total 4 16 22 16 4 62 2 3 14 12 5 2 36 3 4 18 17 7 3 49 4 2 6 12 4 2 26 5 2 4 15 4 2 27 Total 15 58 78 36 13 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .812 .820 .944

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.965a 10.824 .005

df

200

95

LOSS OF CONTROL SERVICES: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 1 4 7 7 1 20 2 1 11 8 8 6 34 3 4 13 17 16 6 56 4 9 9 13 6 1 38 5 6 17 15 11 3 52 Total 21 54 60 48 17 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .188 .224 .013

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.758a 19.926 6.130

df

200

96

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .188 .224 .013

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.758a 19.926 6.130

df

200

LOSS OF CONTROL SERVICES: WORK EXPRI4NCE Crosstab

WORK EXPRI4NCE 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 4 4 10 16 1 35 2 7 19 15 22 10 73 3 4 18 21 6 3 52 4 6 13 14 4 3 40 Total 21 54 60 48 17 200

97

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .004 .003 .007

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 29.171a 30.297 7.344

Df

200

LOSS OF CONTROL SERVICES: QUALIFICATION Crosstab

QUALIFICATION 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 6 18 14 18 6 62 2 4 6 11 10 5 36 3 6 12 19 11 1 49 4 2 7 9 5 3 26 5 3 11 7 4 2 27 Total 21 54 60 48 17 200

98

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .686 .616 .182

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.823a 13.766 1.785

Df

200

LACK OF LIABLITY: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 LACK OF LIABLITY 1 2 3 4 5 Total 3 4 5 3 5 20 2 6 6 12 6 4 34 3 4 17 19 11 5 56 4 5 5 11 11 6 38 5 5 16 14 12 5 52 Total 23 48 61 43 25 200

99

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .640 .660 .940

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 13.446a 13.169 .006

df

200

LACK OF LIABLITY * WORK EXPRI4NCE Crosstab

WORK EXPRI4NCE 1 LACK OF LIABLITY 1 2 3 4 5 Total 6 6 12 7 4 35 2 14 14 25 11 9 73 3 2 13 14 16 7 52 4 1 15 10 9 5 40 Total 23 48 61 43 25 200

100

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .080 .059 .224

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.355a 20.470 1.476

df

200

LACK OF LIABLITY: QUALIFICATION Crosstab Count QUALIFIC4TION 1 LACK OF LIABLITY 1 2 3 4 5 Total 14 14 13 13 8 62 2 1 12 10 10 3 36 3 4 11 20 9 5 49 4 3 6 8 5 4 26 5 1 5 10 6 5 27 Total 23 48 61 43 25 200

101

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .253 .252 .069

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.312a 19.329 3.306

Df

200

MIGRATION: IN WHICH INDSTREY U WORK? Crosstab Count IN WHICH INDSTREY U WORK? 1 MIGRATIO 1 N 2 3 4 5 Total 3 4 5 6 2 20 2 3 6 8 9 8 34 3 2 8 17 17 12 56 4 4 9 12 7 6 38 5 3 12 13 7 17 52 Total 15 39 55 46 45 200

Chi-Square Tests

102

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 14.604a 14.926 .292

df 16 16 1

Asymp. Sig. (2-sided) .554 .530 .589

200

MIGRATION: WORK EXPRI4NCE Crosstab

WORK EXPRI4NCE 1 MIGRATIO 1 N 2 3 4 5 Total 4 3 12 9 7 35 2 5 14 20 17 17 73 3 6 11 12 12 11 52 4 0 11 11 8 10 40 Total 15 39 55 46 45 200

Chi-Square Tests

103

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.924a 13.068 .001

df 12 12 1

Asymp. Sig. (2-sided) .623 .364 .977

200

MIGRATION: QUALIFICATION Crosstab

QUALIFIC4TION 1 MIGRATIO 1 N 2 3 4 5 Total 7 10 15 16 14 62 2 1 5 10 12 8 36 3 4 12 15 11 7 49 4 1 6 5 3 11 26 5 2 6 10 4 5 27 Total 15 39 55 46 45 200

Chi-Square Tests

104

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 16.907a 16.738 .144

df 16 16 1

Asymp. Sig. (2-sided) .392 .403 .704

200

INDUSTRY

105

Privacy

0.25

h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other. WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about <<IAAS> and its loss of control services> are dependent to each other.

Availability of services & data control

0.765

Loss of control services

0.188

Lack of liability

0.64

Intra-class migration

0.554

Privacy

0.44

Availability of services & data control

0.308

Loss of control services

0.04

106

Lack of liability

0.8

h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other. QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Loss of control services> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <<IAAS> and its Intra-class migration> are independent to each other.

Intra-class migration

0.623

Privacy

0.16

Availability of services & data control

0.812

Loss of control services

0.686

Lack of liability

0.253

Intra-class migration

0.392

107

(B) PAAS PRIVACY: WORK EXPRIANCE Crosstab

WORK EXPRI4NCE 1 (B) PAAS PRIVACY 1 2 3 4 5 Total 7 7 11 4 6 35 2 13 16 28 12 4 73 3 6 9 23 8 6 52 4 7 7 12 12 2 40 Total 33 39 74 36 18 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .432 .481 .546

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.167a 11.574 .364

Df

200

108

(B) PAAS PRIVACY:QUALIFICATION Crosstab

QUALIFIC4TION 1 (B) PAAS PRIVACY 1 2 3 4 5 Total 11 21 14 10 6 62 2 6 3 14 12 1 36 3 6 7 25 8 3 49 4 3 4 9 5 5 26 5 7 4 12 1 3 27 Total 33 39 74 36 18 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .009 .009 .578

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 32.261a 32.387 .309

Df

200

109

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .009 .009 .578

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 32.261a 32.387 .309

Df

200

(B) PAAS PRIVACY:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 (B) PAAS PRIVACY 1 2 3 4 5 Total 4 6 7 2 1 20 2 8 6 12 1 7 34 3 5 10 21 18 2 56 4 7 9 10 7 5 38 5 9 8 24 8 3 52 Total 33 39 74 36 18 200

110

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .034 .028 .702

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 27.695a 28.398 .146

Df

200

AVALIBILITY OF SERVICES&DATA:WORK EXPRI4NCE Crosstab

WORK EXPRI4NCE 1 AVALIBILITY OF 1 SERVICES&amp;DAT 2 A 3 4 5 Total 4 11 11 8 1 35 2 4 27 26 13 3 73 3 6 22 12 9 3 52 4 2 19 12 5 2 40 Total 16 79 61 35 9 200

111

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .859 .854 .483

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 6.976a 7.047 .492

Df

200

AVALIBILITY OF SERVICES&DATA:QUALIFICATION Crosstab

QUALIFIC4TION 1 AVALIBILITY OF 1 SERVICES&amp;DA 2 TA 3 4 5 Total 5 26 16 13 2 62 2 3 11 12 8 2 36 3 4 25 13 5 2 49 4 2 4 11 6 3 26 5 2 13 9 3 0 27 Total 16 79 61 35 9 200

112

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .401 .305 .830

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 16.761a 18.336 .046

df

200

AVALIBILITY OF SERVICES&DATA:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 AVALIBILITY OF 1 SERVICES&amp;DA 2 TA 3 4 5 Total 2 6 7 5 0 20 2 1 13 8 9 3 34 3 3 21 24 7 1 56 4 4 13 11 6 4 38 5 6 26 11 8 1 52 Total 16 79 61 35 9 200

113

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .207 .200 .069

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 20.305a 20.468 3.318

df

200

LOSS OF CONTROL SERVICES:WORK EXPRIANCE Crosstab

WORK EXPRI4NCE 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 4 9 11 6 5 35 2 15 14 15 22 7 73 3 4 9 21 17 1 52 4 2 6 12 18 2 40 Total 25 38 59 63 15 200

114

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .041 .034 .129

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.677a 22.371 2.304

df

200

LOSS OF CONTROL SERVICES: QUALIFICATION Crosstab

QUALIFIC4TION 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 10 15 12 18 7 62 2 5 4 11 16 0 36 3 5 7 14 19 4 49 4 1 6 10 6 3 26 5 4 6 12 4 1 27 Total 25 38 59 63 15 200

115

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .165 .070 .790

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.370a 24.991 .071

df

200

LOSS OF CONTROL SERVICES:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 3 2 4 7 4 20 2 5 5 9 10 5 34 3 8 9 13 25 1 56 4 3 10 12 11 2 38 5 6 12 21 10 3 52 Total 25 38 59 63 15 200

116

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .119 .136 .073

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 22.810a 22.239 3.218

df

200

LACK OF LIABLITY:WORK EXPRIANCE Crosstab

WORK EXPRI4NCE 1 LACK OF LIABLITY 1 2 3 4 5 Total 4 10 7 7 7 35 2 6 16 28 16 7 73 3 4 12 17 10 9 52 4 3 11 12 12 2 40 Total 17 49 64 45 25 200

117

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .632 .606 .862

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.813a 10.114 .030

Df

200

LACK OF LIABLITY: QUALIFICATION Crosstab

QUALIFIC4TION 1 LACK OF LIABLITY 1 2 3 4 5 Total 6 17 20 10 9 62 2 3 10 9 11 3 36 3 2 9 23 8 7 49 4 4 9 6 4 3 26 5 2 4 6 12 3 27 Total 17 49 64 45 25 200

118

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .156 .201 .404

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.622a 20.433 .697

Df

200

LACK OF LIABLITY:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 LACK OF LIABLITY 1 2 3 4 5 Total 4 3 7 3 3 20 2 1 10 8 8 7 34 3 6 13 21 11 5 56 4 5 10 12 8 3 38 5 1 13 16 15 7 52 Total 17 49 64 45 25 200

119

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .478 .435 .571

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 15.647a 16.267 .321

df

200

MIGRATION: WORK EXPRIANCE Crosstab

WORK EXPRI4NCE 1 MIGR4TIO 1 N 2 3 4 5 Total 5 4 12 10 4 35 2 9 6 24 21 13 73 3 4 7 20 14 7 52 4 1 5 11 13 10 40 Total 19 22 67 58 34 200

120

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .768 .713 .079

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.221a 8.887 3.095

df

200

MIGRATION: QUALIFICATION Crosstab

QUALIFIC4TION 1 MIGR4TIO 1 N 2 3 4 5 Total 12 9 17 16 8 62 2 2 1 12 14 7 36 3 1 4 19 14 11 49 4 4 3 9 8 2 26 5 0 5 10 6 6 27 Total 19 22 67 58 34 200

121

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .081 .034 .157

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 24.418a 27.735 2.003

df

200

MIGRATION: IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 MIGR4TIO 1 N 2 3 4 5 Total 2 1 9 5 3 20 2 6 7 9 8 4 34 3 5 4 10 25 12 56 4 2 3 15 10 8 38 5 4 7 24 10 7 52 Total 19 22 67 58 34 200

122

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .063 .071 .795

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 25.425a 24.937 .068

df

200

(B) PAAS INDUSTRY h0 is accepted hence Industry of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Lack of liability> are independent to each other.

Privacy

0.34

Availability of services & data control

0.207

Loss of control services

0.119

Lack of liability

0.478

123

Intra-class migration

0.63

h0 is accepted hence Industry of employment of individual and their perception about < and its Intra-class migration> are independent to each other. WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about < its loss of control services> are dependent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Intra-class migration> are independent to each other.

Privacy

0.432

Availability of services & data control

0.859

Loss of control services

0.41

Lack of liability

0.632

Intra-class migration

0.768

124

QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <and its Intra-class migration> are independent to each other.

Privacy

0.09

Availability of services & data control

0.401

Loss of control services

0.165

Lack of liability

0.156

Intra-class migration

0.81

125

(C) SAAS PRIVACY:WORK EXPRIANCE Crosstab

WORK EXPRI4NCE 1 (C) SAAS PRIVACY 1 2 3 4 5 Total 5 11 11 2 6 35 2 10 17 31 11 4 73 3 7 15 22 5 3 52 4 7 10 13 6 4 40 Total 29 53 77 24 17 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .696 .721 .737

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 9.083a 8.788 .113

Df

200

126

(C) SAAS PRIVACY:QUALIFICATION Crosstab

QUALIFIC4TION 1 (C) SAAS PRIVACY 1 2 3 4 5 Total 6 22 21 8 5 62 2 9 6 13 6 2 36 3 7 7 25 7 3 49 4 5 8 9 2 2 26 5 2 10 9 1 5 27 Total 29 53 77 24 17 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .150 .152 .756

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.799a 21.727 .097

Df

200

127

(C) SAAS PRIVACY:IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 (C) SAAS PRIVACY 1 2 3 4 5 Total 6 3 9 2 0 20 2 5 13 9 4 3 34 3 8 13 21 12 2 56 4 4 9 16 3 6 38 5 6 15 22 3 6 52 Total 29 53 77 24 17 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .151 .129 .129

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 21.774a 22.472 2.302

df

200

AVALIBILITY OF SERVICES&DATA:WORK EXPRIANCE

128

Crosstab

WORK EXPRI4NCE 1 AVALIBILITY OF 1 SERVICES&amp;DAT 2 A 3 4 5 Total 3 13 10 7 2 35 2 10 24 21 13 5 73 3 8 18 9 8 9 52 4 3 14 10 7 6 40 Total 24 69 50 35 22 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .753 .733 .328

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.400a 8.645 .957

df

200

129

AVALIBILITY OF SERVICES&DATA: QUALIFICATION Crosstab

QUALIFIC4TION 1 AVALIBILITY OF 1 SERVICES&amp;DA 2 TA 3 4 5 Total 4 20 18 17 3 62 2 5 13 10 4 4 36 3 10 19 8 5 7 49 4 3 9 5 4 5 26 5 2 8 9 5 3 27 Total 24 69 50 35 22 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .277 .270 .904

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 18.832a 18.977 .014

Df

200

AVALIBILITY OF SERVICES&DATA:IN WHICH INDSTREY U WORK

130

Crosstab

IN WHICH INDSTREY U WORK? 1 AVALIBILITY OF 1 SERVICES&amp;DA 2 TA 3 4 5 Total 2 7 3 5 3 20 2 3 10 10 8 3 34 3 7 23 11 12 3 56 4 5 13 9 4 7 38 5 7 16 17 6 6 52 Total 24 69 50 35 22 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .704 .686 .518

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 12.562a 12.817 .417

df

200

LOSS OF CONTROL SERVICES:WORK EXPRIANCE

131

Crosstab

WORK EXPRI4NCE 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 5 4 13 9 4 35 2 8 8 21 27 9 73 3 6 11 22 10 3 52 4 5 7 15 8 5 40 Total 24 30 71 54 21 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .562 .554 .303

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.619a 10.706 1.062

df

200

LOSS OF CONTROL SERVICES: QUALIFICATION

132

Crosstab

QUALIFIC4TION 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 9 8 16 18 11 62 2 7 5 14 8 2 36 3 4 10 16 17 2 49 4 1 3 12 6 4 26 5 3 4 13 5 2 27 Total 24 30 71 54 21 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .302 .279 .763

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 18.377a 18.806 .091

df

200

LOSS OF CONTROL SERVICES: IN WHICH INDSTREY U WORK?

133

Crosstab

IN WHICH INDSTREY U WORK? 1 LOSS OF CONTROL 1 SERVICES 2 3 4 5 Total 2 4 7 4 3 20 2 3 6 12 7 6 34 3 8 6 18 19 5 56 4 3 7 13 13 2 38 5 8 7 21 11 5 52 Total 24 30 71 54 21 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .856 .858 .417

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.199a 10.168 .660

Df

200

LACK OF LIABLITY:WORK EXPRIANCE

134

Crosstab

WORK EXPRI4NCE 1 LACK OF LIABLITY 1 2 3 4 5 Total 3 7 15 7 3 35 2 6 21 18 19 9 73 3 5 18 12 10 7 52 4 5 12 9 7 7 40 Total 19 58 54 43 26 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .750 .783 .743

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.440a 8.032 .108

Df

200

LACK OF LIABLITY: QUALIFICATION

135

Crosstab

QUALIFIC4TION 1 LACK OF LIABLITY 1 2 3 4 5 Total 7 17 18 12 8 62 2 3 10 7 10 6 36 3 3 15 16 9 6 49 4 5 7 6 6 2 26 5 1 9 7 6 4 27 Total 19 58 54 43 26 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .936 .942 .952

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 8.400a 8.236 .004

Df

200

LACK OF LIABLITY:IN WHICH INDSTREY U WORK

136

Crosstab

IN WHICH INDSTREY U WORK? 1 LACK OF LIABLITY 1 2 3 4 5 Total 2 4 3 9 2 20 2 4 14 7 8 1 34 3 3 16 11 14 12 56 4 4 9 16 5 4 38 5 6 15 17 7 7 52 Total 19 58 54 43 26 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .069 .072 .531

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 25.030a 24.865 .392

df

200

MIGRATION:WORK EXPRIANCE

137

Crosstab

WORK EXPRI4NCE 1 MIGRATIO 1 N 2 3 4 5 Total 1 5 14 9 6 35 2 4 13 22 23 11 73 3 5 4 23 13 7 52 4 3 6 13 7 11 40 Total 13 28 72 52 35 200

Chi-Square Tests Asymp. Sig. (2-sided) 12 12 1 .537 .528 .999

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.905a 11.007 .000

df

200

MIGRATION: QUALIFICATION

138

Crosstab

QUALIFIC4TION 1 MIGRATIO 1 N 2 3 4 5 Total 5 9 22 17 9 62 2 1 5 17 6 7 36 3 2 7 16 13 11 49 4 3 3 10 5 5 26 5 2 4 7 11 3 27 Total 13 28 72 52 35 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .835 .835 .778

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 10.580a 10.571 .080

df

200

139

MIGRATION: IN WHICH INDSTREY U WORK? Crosstab

IN WHICH INDSTREY U WORK? 1 MIGRATIO 1 N 2 3 4 5 Total 2 4 8 3 3 20 2 3 4 10 11 6 34 3 2 7 24 16 7 56 4 1 3 20 6 8 38 5 5 10 10 16 11 52 Total 13 28 72 52 35 200

Chi-Square Tests Asymp. Sig. (2-sided) 16 16 1 .262 .209 .468

Value Pearson Chi-Square Likelihood Ratio Linear-by-Linear Association N of Valid Cases 19.137a 20.245 .526

df

200

140

(C) SAAS INDUSTRY h0 is accepted hence Industry of employment of individual and their perception about < its privacy> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Loss of control services> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Industry of employment of individual and their perception about < and its Intra-class migration> are independent to each other.

Privacy

0.151

Availability of services & data control

0.704

Loss of control services

0.856

Lack of liability

0.69

Intra-class migration

0.262

WORK EXPERIENCE h0 is accepted hence Work Experience of employment of individual and their perception about < and its privacy> are independent to each other.

Privacy

0.696

141

Availability of services & data control

0.753

h0 is accepted hence Work Experience of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is rejected hence Industry of employment of individual and their perception about < its loss of control services> are dependent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Lack of liability> are independent to each other. h0 is accepted hence Work Experience of employment of individual and their perception about < its Intra-class migration> are independent to each other. QUALIFICATION h0 is accepted hence Qualification of employment of individual and their perception about < and its privacy> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Availability of services & data control> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about < and its Loss of control services> are independent to each other.

Loss of control services

0.562

Lack of liability

0.75

Intra-class migration

0.537

Privacy

0.15

Availability of services & data control

0.277

Loss of control services

0.302

142

Lack of liability

0.936

h0 is accepted hence Qualification of employment of individual and their perception about < and its Lack of liability> are independent to each other. h0 is accepted hence Qualification of employment of individual and their perception about <and its Intra-class migration> are independent to each other.

Intra-class migration

0.835

143

CHAPTER 8 CONCLUSION

144

Companies have to pick and choose and be careful with what data they allow to be out there in a cloud. Cloud computing can be a useful resource to help companies save money but can also have downfalls. The average citizen doesn't want their personal information unprotected and available. As companies perfect their cloud computing services, I think that more companies will be open to using these services. This service will provide new inventive ways to use computers and provide services. By eliminating the problems of traditional application development, cloud computing technology frees you to focus on developing business applications that deliver true value to your business (or your customers). The platform lets IT innovate while avoiding the costs and headaches associated with servers, individual software solutions, middleware or point-to- point connections,

upgradesand the staff needed to manage it all.

Cloud Computing Brings Possibilities: Increases business responsiveness Accelerates creation of new services via rapid prototyping capabilities Reduces acquisition complexity via service oriented approach Uses IT resources efficiently via sharing and higher system utilization Reduces energy consumption Handles new and emerging workloads Scales to extreme workloads quickly and easily Simplifies IT management Platform for collaboration and innovation Cultivates skills for next generation workforce

145

The results states that the utility of the Cloud matches the need of the todays Business. Because of the dynamic changing environments, the workload can shrink or grow very fast which causes a problem for the enterprise to scale up or down immediately. Moreover the features that were used by the Technical giants and not affordable by small enterprises due to heavy pricing can now be made available to them. Cloud does not suit well to the financial enterprise that has sensitive data and is not willing to disclose it to the third part vendors. Cloud computing is picking up and there are few early winners who adopted the technology. Companies that used to take20years to build up an infrastructure can now be done in merely weeks or months. The most dependable solutions from number of vendors are still in the early stage but will definitely pick up in very short time. May be the coming years will let us know whether Cloud computing is the one of the best emerging technologies of all times or just an over hyped phenomenon.

146

CHAPTER 9 BIBLOGRAPHY

147

Websites:
www.infoworld.com www.wiki.cloudcomunity.org www.davidchappell.com www.amazon.com www.thinkgos.com www.isaca.org www.chinadaily.com. www.kth.diva-portal.org www.salesforce.com/uk/ www.fixtro.com/ www.iitweb.bloomu.com www.devcentral.f5.com www.universal-software.com/

Books:
Chief. computer Magazine, December 2008-Febuaray2009 edition Larry eilison,wall street journals, September 26,2008 Andy Isherwood, ZDnet news, December-11,2008 Richard Stallman, the Gardian, September 24,2008 Brad Jefferson CEO-animto, 2009 Vivek kundra, Federal CIO, United States Government Sys-con cloud computing Journal Bhrugu Sevak, B. (2012). Security against side channel attack in cloud computing. International Journal of

Engineering and Advanced Technology (IJEAT), 2(2), 183186. G. Vijay Baskar, V., N. Sathees Kumar, S., & N. KarthickKumar, K. (2013). Research analysis of cloud computing. International Journal of Computer Science and Mobile Computing

148

Gurudatt Kulkarni, G., Jayant Gambhir, J., & Rajnikant Palwe, R. (2012). Cloud computing-software as service. International Journal of Cloud Computing and Services Science (IJ-CLOSER)), 1(1), 11-16

149

CHAPTER 10 ANNEXURE

150

Dear Sir/Madam, Myself Rushang Patel, I am a management student from Gandhinagar Institute of Technology; currently I am working on the project CLOUD COMPUTING. I will be thankful to the employees of the selected companies if they give their precious time to fill in this questionnaire, the information given by the employees will be kept confidential and will be used only for the academic purpose.

Part-A: Name: _______________________________________________ Occupation: ___________________________________________ Gender: Male Female

Work Experience:

0-1 years 3-5 years

1-3 years > 5 years

Qualification:

Graduate Post Graduate Professional Qualification

Masters Doctorate

151

Part- B: Q.1 Do you know about cloud computing? Yes No

Q.2 In which industry you work? Finance Communications Government Other Technology

Q.3Which are the main reasons for using cloud computing for you? Investments Pricing model Improved reliability other Scalability

Q.4 which model you prefers for cloud computing? IAAS (Infrastructures as a service) PAAS (Platform as a service) SAAS (software as a service)

152

Q.5 which cloud model would you like to establish? Private Hybrid Public

Q.6 Which cloud computing services you like? Data storage Software Business specific Other

E-mail and messaging

Q.7 What are the main concerns you prefer in,

(A) IAAS (Infrastructures as a services) Strongly disagree Privacy Availability of service& data Control Loss of control services Lack of Liability Intra-class Migration Disagree Neutral Agree Strongly agree

153

(B) PAAS (Platform as a services ) Strongly disagree Privacy Availability of services& data Control Loss of control services Lack of Liability Intra-class Migration Disagree Neutral Agree Strongly agree

(C) SAAS (software as a services) Strongly disagree Privacy Availability of services & data Control Loss of control services Lack of Liability Intra-class migration Disagree Neutral Agree Strongly agree

154

Q.8 In your views, cloud computing is the future model of information technology? Strongly agree Disagree Agree Strongly disagree Undecided

Q.9 Do you think, government will impose cloud computing specific privacy legislation? Yes No

Q.10 In your views, cloud computing is bigger than internet? Yes No

Q.11 Do you think, cloud computing is benefit for you? Yes No

If yes, please specify,........................................................................................

155

REMARKS

156

157

You might also like