CFP last date
20 May 2024
Reseach Article

FISM and FMICMAC Analysis on Enablers of Cloud Computing

by Ambika Devi Amma. T, Radhika. N, Pramod. V. R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 6
Year of Publication: 2014
Authors: Ambika Devi Amma. T, Radhika. N, Pramod. V. R
10.5120/15884-4538

Ambika Devi Amma. T, Radhika. N, Pramod. V. R . FISM and FMICMAC Analysis on Enablers of Cloud Computing. International Journal of Computer Applications. 91, 6 ( April 2014), 9-16. DOI=10.5120/15884-4538

@article{ 10.5120/15884-4538,
author = { Ambika Devi Amma. T, Radhika. N, Pramod. V. R },
title = { FISM and FMICMAC Analysis on Enablers of Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 6 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number6/15884-4538/ },
doi = { 10.5120/15884-4538 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:02.793883+05:30
%A Ambika Devi Amma. T
%A Radhika. N
%A Pramod. V. R
%T FISM and FMICMAC Analysis on Enablers of Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 6
%P 9-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an automatic multitenant pay-as-you go service accessed through web browsers. . The main services of cloud computing are software as a service, infrastructure as a service and platform as a service. These services are very much helpful and beneficial to IT organizations undergoing severe budgetary constraints. In this paper the major enablers of cloud computing services are taken by discussing with experts and through literature survey. An interrelation ship among the enablers are done with FISM(Fuzzy Interpretive Structural Modeling and FMICMAC(Fuzzy MICMAC) analysis. An initial reachability set is constructed from structural self interaction matrix (SSIM) and final reachability set by considering a scale 0-1 instead of binary condition. Enablers chosen are classified into four clusters based on their driving power and dependence power. From MATLAB FISM model is derived. This paper highlights the most sensitive enablers of cloud computing services.

References
  1. Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy- AnEnterprise Perspective on Risks and Compliance" O Reilly
  2. Wang. C and Wulf W. A. , "Towards a framework for security measurement", 20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
  3. Savola. R and Abie. H, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
  4. Jaquith. A, "Security metrics: replacing fear, uncertainty and doubt,"Addison-Wesley, 2007.
  5. Gadia. S, "Cloud computing: an auditor's perspective," ISACA Journal, Vol. 6, 2009.
  6. Gellman. R, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23, 2009.
  7. Cloud Security Alliance, "Top threats to cloud computing", Version 1. 0. Downloaded from: www. cloudsecurityalliance. org [July 4, 2010].
  8. Cloud Security Alliance. www. cloudsecurityalliance. org [July 4, 2010].
  9. Mandal. A, Deshmukh. S, Vendor selection using interpretive structural modeling (ism). International Journal of Operations and Production Management, 1994, 14(6): 52–59.
  10. Sage. A, Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York, 1977.
  11. Warfield. J. Developing interconnection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 2005, 4(1): 81–67.
  12. Wang. C, "Forrester: A close look at cloud computing security issues," http://www. forrester. com/ securityforum 2009, 2009.
  13. IDC, "It cloud services user survey, pt. 2: Top benefits & challenges," http://blogs. idc. com/ie/?p=210, 2008.
  14. Zetta, "Zetta: Enterprise cloud storage on demand," http://www. zetta. net/, 2008.
  15. Chen. P, Lee. E, Gibson. G, Katz. R, and Patterson. D, "RAID: High performance,reliable secondary storage," ACM Computing Surveys (CSUR), vol. 26, no. 2,pp. 145–185, 1994.
  16. Yahoo!, "Hadoop distribted file system architecture," http://hadoop. apache. org/common/docs/current/hdfs design. html, 2008.
  17. Dwork. C et al. , "Differential privacy," LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.
  18. Dwork. C, "Differential privacy: A survey of results," Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.
  19. Dean. J and Ghemawat. S, "MapReduce: simplified data processing on large clusters," in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents, 2004, pp. 10–10.
  20. Bardin, J"Security Guidance for Critical Areas of Focus in Cloud Computing," www. cloudsecurityalliance. org/ guidance/csaguide. pdf, 2009.
  21. Hwang, K G. Fox, and Dongarra. J, Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear, 2010.
  22. Nick J, "Journey to the Private Cloud: Security and Compliance," tech. presentation, EMC, Tsinghua Univ. , 25 May 2010.
  23. Rittinghouse J and Ransome. J, Cloud Computing: Implementation, Management and Security, CRC Publisher, 2010
  24. "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner. com. Retrieved 2010-08-22.
  25. Ravi. V. and Shankar. R. (2005), Analysis of interactions among the barriers of reverse logistics, Technological Forecasting and Social Change, 72(8): 1011-1029.
  26. Thakkar. J. ,Kanda. A. and Deshmukh, S. G. (2008), Interpretive Structural Modeling (ISM) of IT-enablers for Indian
  27. SushantaTripathy, SadanandaSahu, Pradip Kumar Ray, (2013) "Interpretive Structural Modelling for Critical Success Factors of R&D Performance in Indian Manufacturing Firms", 'Journal of Modelling in Management', Vol. 8 ,No: 2
  28. Pramod and. Banwet D. K (2010), Interpretive structural modeling for understanding the inhibitors of a telecom service supply chain. (IEOM) (Dhaka, Bangladesh), Jan -9-10, 2010.
  29. Rajesh Attri, Nikhil Devand and Vivek Sharma (2013), Interpretive Structural Modelling (ISM) approach: An Overview, Research Journal of Management Sciences, Vol. 2, No. 2, pp 3-8.
  30. B. P. Sharma ,M. D. Singh , Neha 2012,"Knowledge Sharing Barriers: An Approach of Interpretive Structural Modeling", 'The IUP Journal of Knowledge Management', Vol. X, No. 3, , pp. 35-52
  31. T . Ambika Devi Amma, V. R Pramod. And N Radhika. ;. MCDM Approach for the Adoption of Best Cloud, International Journal of Computer Applications. Vol 63; issue15,pp:20-26,January 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud fuzzy ISM fuzzy MICMAC SSIM driving power dependence power.