CFP last date
20 May 2024
Reseach Article

Modeling the Interrelationship between the Enablers of Cloud Computing

by Ambika Devi Amma. T, Pramod. V. R, Radhika. N
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 20
Year of Publication: 2013
Authors: Ambika Devi Amma. T, Pramod. V. R, Radhika. N
10.5120/11514-7238

Ambika Devi Amma. T, Pramod. V. R, Radhika. N . Modeling the Interrelationship between the Enablers of Cloud Computing. International Journal of Computer Applications. 67, 20 ( April 2013), 38-43. DOI=10.5120/11514-7238

@article{ 10.5120/11514-7238,
author = { Ambika Devi Amma. T, Pramod. V. R, Radhika. N },
title = { Modeling the Interrelationship between the Enablers of Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 20 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number20/11514-7238/ },
doi = { 10.5120/11514-7238 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:59.675264+05:30
%A Ambika Devi Amma. T
%A Pramod. V. R
%A Radhika. N
%T Modeling the Interrelationship between the Enablers of Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 20
%P 38-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Interpretive structural modeling (ISM) is a well established methodology for identifying the interrelationship between the variables influencing the system. ISM approach starts with the identification of variables affecting the system. The strategy of cloud computing is subjected to many enablers. This paper deals with the representation of ISM to explicit the interrelationship between the enablers of cloud computing. After listing the enablers a structural self interaction matrix (SSIM) is developed based on pairwise comparison of variables. Transitivity is checked on the reachability matrix obtained from converting SSIM. The enablers are classified into four clusters based on their driver power and dependence. A diagraph is constructed, then ISM model is derived. In this paper key concepts mitigating the most sensitive enablers are discussed in detail.

References
  1. Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy- An Enterprise Perspective on Risks and Compliance" O Reilly
  2. Wang. C and Wulf W. A. , "Towards a framework for security measurement", 20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
  3. Savola. R and Abie. H, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
  4. Jaquith. A, "Security metrics: replacing fear, uncertainty and doubt,"Addison-Wesley, 2007.
  5. AmbikadeviAmma. T, Dr,Radhika. N Dr. Pramod V. R,"ISM for Analysing the interrelationship between the inhibiters of cloud computing"' International Journal of Computer Applications in Engineering Sciences'VOL II ISSUE III. September 2012.
  6. AmbikadeviAmma. T, Dr,Radhika. N Dr. Pramod V. R,"MCDM Approach for the Adoption of Best Cloud", Inter National Journal of Computer Applications Volume 63-No15,February 2013.
  7. Dr. Kumar Saurabh,"Cloud Computing" Wiley India, second edition. ].
  8. Cloud Security Alliance. www. cloudsecurityalliance. org [July 4, 2010].
  9. Mandal. A, Deshmukh. S, Vendor selection using interpretive structural modeling (ism). International Journal of Operations and Production Management, 1994, 14(6): 52–59.
  10. Sage. A, Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York, 1977.
  11. Warfield. J. Developing interconnection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 2005, 4(1): 81–67.
  12. Wang. C, "Forrester: A close look at cloud computing security issues," http://www. forrester. com/ securityforum 2009, 2009.
  13. IDC, "It cloud services user survey, pt. 2: Top benefits & challenges," http://blogs. idc. com/ie/?p=210, 2008.
  14. Raj T. , Attri R. and Jain V. , Modelling the factor affectingflexibility in FMS, International Journal of Industrial and System Engineering, 11(4), 350-374 (2012)
  15. Attri R. , Grover S. , Dev N. and Kumar D. , An ISM approachfor modelling the enablers in the implementation of Tota Productive Maintenance (TPM), International Journal SystemAssurance Engineering and Management, DOI: 10. 1007/s13198-012-0088-7 (2012
  16. Attri R. , Grover S. , Dev N. and Kumar D. , Analysis ofbarriers of Total Productive Maintenance (TPM) International Journal System Assurance Engineering andManagement, DOI: 10. 1007/s13198-010129(2012)
  17. Dwork. C et al. , "Differential privacy," LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.
  18. Dwork. C, "Differential privacy: A survey of results," Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.
  19. Dean. J and Ghemawat. S, "MapReduce: simplified data processing on large clusters," in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents, 2004, pp. 10–10.
  20. Bardin, J"Security Guidance for Critical Areas of Focus in Cloud Computing," www. cloudsecurityalliance. org/ guidance/csaguide. pdf, 2009.
  21. Hwang, K G. Fox, and Dongarra. J, Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear, 2010.
  22. Nick J, " Journey to the Private Cloud: Security and Compliance," tech. presentation, EMC, Tsinghua Univ. , 25 May 2010.
  23. Rittinghouse J and Ransome. J, Cloud Computing: Implementation, Management and Security, CRC Publisher, 2010
  24. "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner. com. Retrieved 2010-08-22.
  25. Ravi. V. and Shankar. R. (2005), Analysis of interactions among the barriers of reverse logistics, Technological Forecasting and Social Change, 72(8): 1011-1029.
  26. Thakkar. J. ,Kanda. A. and Deshmukh, S. G. (2008), Interpretive Structural Modeling (ISM) of IT-enablers for Indian manufacturing SMEs', Information management & Computer Security, Vol. 16 No. 2, pp. 113-136
  27. Quan Liu, Lu Gao, Ping Lou, "Resource Management Based on Multi-Agent Technology for Cloud Manufacturing, IEEE 2011
  28. Farzad Sabahi, " Cloud Computing Security Threats and Responses" IEEE, 2011.
  29. Craig A Lee, " A Perspective on Scientific Cloud Computing", ACM 2010
  30. P. Sasikala, " Cloud Computing: present status and the future implications", Inderscience Enterprises Ltd. 2011
Index Terms

Computer Science
Information Sciences

Keywords

ISM SSIM driving power dependence diagraph cloud computing