![]() |
10.5120/15253-3909 |
Ambika Devi Amma. T, Radhika. N and Pramod.v. R. Article: Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach. International Journal of Computer Applications 87(11):24-29, February 2014. Full text available. BibTeX
@article{key:article, author = {Ambika Devi Amma. T and Radhika. N and Pramod.v. R}, title = {Article: Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {87}, number = {11}, pages = {24-29}, month = {February}, note = {Full text available} }
Abstract
Cloud services enable continent on demand network access to a shared pool of configurable computing resources. Data migration within cloud is complicated. Cloud computing strategy is subjected to many inhibitors. This paper deals with the deployment of Fuzzy Interpretive Structural Modeling (FISM) to model the interrelationships among the inhibitors of cloud computing. The model is made based on SSIM, Fuzzy initial reachability matrix, fuzzy final reachability matrix and stagnation matrix. From MICMAC analysis the most sensitive inhibitors are identified.
References
- Wang. C and Wulf W. A. , "Towards a framework for security measurement", 20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
- Savola. R and Abie. H, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
- Jaquith. A, "Security metrics: replacing fear, uncertainty and doubt,"Addison-Wesley, 2007.
- Gadia. S, "Cloud computing: an auditor's perspective," ISACA Journal, Vol. 6, 2009.
- Gellman. R, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23,2009.
- Cloud Security Alliance, "Top threats to cloudcomputing", Version 1. 0. Downloaded from: www. cloudsecurityalliance. org [July 4, 2010].
- Sage. A, Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York, 1977.
- Warfield. J. Developing inter-connection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 2005, 4(1): 81–67.
- Wang. C, "Forrester: A close look at cloud computingsecurityissues," http://www. forrester. com/securityforum2009, 2009.
- IDC, "It cloud services user survey, pt. 2: Top benefits & challenges," http://blogs. idc. com/ie/?p=210, 2008.
- Zetta, "Zetta: Enterprise cloud storage on demand," http://www. zetta. net/, 2008.
- Chen. P, Lee. E, Gibson. G, Katz. R, and Patterson. D, "RAID: High performance,reliable secondary storage," ACM Computing Surveys (CSUR), vol. 26, no. 2, pp. 145–185, 1994.
- Yahoo!, "Hadoop distribted file system architecture," http://hadoop. apache. org/common/docs/current/hdfs design. html, 2008.
- Dwork. C et al. , "Differential privacy," LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.
- Dwork. C, "Differential privacy: A survey of results," Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.
- Dean. J and Ghemawat. S, "MapReduce: simplified data processing on large clusters," in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents, 2004, pp. 10–10.
- Bardin, J"Security Guidance for Critical Areasof Focus in Cloud Computing," www. cloudsecurityalliance. org/guidance/csaguide. pdf, 2009.
- Hwang, K G. Fox, and Dongarra. J, Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear, 2010.