Impact of security risks on cloud computing adoption
09/2011; DOI: 10.1109/Allerton.2011.6120232
Cloud computing has been a paradigm shift in the information technology domain. It offers potential benefits to users in terms of instant availability, scalability and resource sharing, while potentially posing security issues. Especially, recent events like Amazons system failure increased the concerns related to cloud computing1. Given these security and reliability concerns, we explore the optimal decision rule for moving certain IT function to public clouds. We formulate the problem as an entrepreneurial decision for an optimal stopping time at which the entrepreneur shall migrate to the cloud computing paradigm. Two different models are presented. Recognizing that an important and specific issue related to different computing paradigm is the potential “security” risk posed by each technology, we consider security risks in both models. The first model approaches the optimal adoption problem from assessing the cloud computing adoption under project value uncertainty. The entrepreneur has the timing flexibility and solves his optimal adoption decision under uncertainty. The optimal adoption rule obtained is a threshold strategy. A firm should adopt the cloud computing only if the value from the adoption exceeds the threshold level. The second model builds on a comprehensive assessment of two different computing paradigms. The entrepreneur can either keep the traditional on-site computing paradigm or migrate to the cloud computing paradigm. His problem is to make the paradigm shift optimally. We model such a problem as optimally swapping two “risky” assets, which refer to benefits of the traditional on-site computing paradigm and those of the cloud computing paradigm. The term “risky” captures the fact that actual benefits can only be resolved through time, and thus estimates of benefits are embedded with uncertainty. We obtain the optimal swapping rule as a threshold strategy, defined in terms of the two benefit ratio. A firm should only shift the part of its business to the cloud computing service if the ratio, the benefit from the cloud computing paradigm over that from the traditional on-site computing paradigm, exceeds the threshold. In both models, both the extent of riskiness (i.e. uncertainty) and the significance of security risks (both in terms of potential occurrence probability and the severity of damage) affect the threshold level, thus the entrepreneurial adoption decision.
[Show abstract] [Hide abstract]
- "During the design of the system, a particular care has been paid to the security and the management of customer private information, by adopting technologies, both at level of communication between sensors and gateway  as well as at level of storage and elaboration , well aware of security. Nevertheless, a detailed analysis of the security issues is out of the scope of the paper. "
ABSTRACT: Smart Grid are aimed to integrate communication infrastructure into the electrical power grid for optimizing the distribution of the energy and reducing the waste of energy. Nevertheless, real energy savings can be obtained only through active participation of customers. In this paper, an innovative approach has been proposed to actively involve the customer in the energy management. The solution is based on a domestic energy gateway, realized using cloud-computing approach, used to collect and visualize the measurements of domestic energy consumption. Compared to already available solutions, the system collects also gas and heating consumptions, because there are strong dependencies between different energies and resources available in a home. The energy gateway is then able to directly interact with Distribution System Operator (DSO) for proposing and suggesting energy optimization strategies, and with other similar devices installed in the neighborhood for encouraging environmental-friendly social behaviors.Conference Record - IEEE Instrumentation and Measurement Technology Conference 07/2015; 2015:1819-1824. DOI:10.1109/I2MTC.2015.7151557
- "Providing certainty of service provider, e.g. Zimki started 2006 – goes out 2007, to avoid data loss (Alzain and Padrede, 2011; Kantarcioglu, Bensoussan and SingRu, 2011; Vouk, 2008). "
Conference Paper: Enhancement of User Level Controls in Cloud Databases[Show abstract] [Hide abstract]
ABSTRACT: Industries in developed countries are moving quickly to ensure the rapid adoption of cloud computing. At this stage, several outstanding issues exist, particularly related to Service Level Agreements (SLAs), security and privacy. Consumers and businesses are willing to use cloud computing only if they can trust that their data will remain private and secure. Our review of research literature indicates the level of control that a user has on their data is directly correlated to the level of data privacy provided by the cloud service. We considered several privacy factors from the industry perspective, namely data loss, data storage location being unknown to the client, vendor lock-in, unauthorized secondary use of user’s data for advertising, targeting secured backup and easy restoration. The level of user control in database models were identified according to the level of existence in these privacy factors. Finally, we focused on a novel logical model that might help to bring the level of user control of privacy in cloud databases into a higher level.30th National IT Conference; 07/2012
Conference Paper: Confidentiality-preserving optimal power flow for cloud computing[Show abstract] [Hide abstract]
ABSTRACT: In the field of power system engineering, the optimal power flow problem is essential in planning and operations. With increasing system size and complexity, the computational requirements needed to solve practical optimal power flow problems continues to grow. Increasing computational requirements make the possibility of performing these computations remotely with cloud computing appealing. However, power system structure and component values are often confidential; therefore, the problem cannot be shared. To address this issue of confidential information in cloud computing, some techniques for masking optimization problems have been developed. The work of this paper builds upon these techniques for optimization problems but is specifically developed for addressing the DC and AC optimal power flow problems. We study the application of masking a sample OPF using the IEEE 14-bus network.Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on; 01/2012
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.