Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

International Journal of Advanced Science and Technology

Vol. 28, No. 1, (2019), pp. 318-326

Adoption of Cloud Computing model for Managing e-Banking


System in Banking Organizations

Abdelrafe Elzamly1, Nabil Messabia2, Mohamed Doheir3, Ahmed Mahmoud4,


Abd Samad Bin Hasan Basari 5, Nizar Abu Selmiya6, Sayed Samer Ali Al-
Shami7
1
Faculty of computer and information technology, Al-Aqsa University, Gaza,
Palestine
2
Département des Sciences Comptables, Université du Québec en Outaouais,
Quebec(UQO), Canada
3,5
Faculty of Information and Communication Technology, Universiti Teknikal
Malaysia Melaka (UTeM), Malaysia
4
Faculty of engineering and information technology, Al-Ashar University-Gaza,
Palestine
6
Faculty of administration and Finance , Al-Aqsa University, Gaza, Palestine
7
Institute of Technology Management and Technopreneurship, Universiti
Teknikal Malaysia Melaka
1
E-mail: Abd_elzamly@alaqsa.edu.ps

Abstract
Cloud computing offers a lot of benefits, but today, cloud computing is suffering from
safety hazards. Security is the client's most significant problem these days. This aim of
this study is to propose adoption of cloud computing model for managing e-banking
system. There are 4 stages for success adoption of cloud computing model for managing
e-banking system. The cloud service models include Cloud Banking as a Service, cloud
software as a service, cloud platform as a service, cloud infrastructure as a service. The
cloud deployment models include four items as public cloud, community cloud, private
cloud and hybrid cloud. Cloud computing issues and risks models are classified to
technological factors, organizational factors, environmental factors, and operational
factors. Finally, security control methods are classified to network security controls,
data and storage security controls, application security control and physical security
controls. Furthermore, successful adoption of cloud computing model for managing e-
banking system will greatly improve the probability of cloud e-banking success in
banking organizations.

Keywords: cloud computing, cloud issues, cloud security control, cloud services, cloud
deployment, cloud e-banking

1 Introduction
Cloud computing offers a lot of benefits, but today, cloud computing is suffering
from safety hazards. Security is the client's most significant problem these days. If a
client wants to take complete advantage of cloud computing, then information, facilities
and application safety must be assured for this client (Al-anzi, Yadav and Soni, 2014).
While there is plenty of research and progress in cloud computing, many cloud

ISSN: 2005-4238 IJAST


Copyright ⓒ 2019 SERSC
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

computation projects have a very high error frequency, mainly when it goes to the
banking sector (Elzamly, Hussin, S. Naser, et al., 2015; Elzamly et al., 2017).
Nevertheless, cloud technology has become a primary focus for the commercial industries
to depend on cloud-based apps, storage capacities, data centers, etc. The effect of cloud
technology on banks is also vast and useful, as it can provide banks with flexibility and
provide a way to assess and handle services more efficiently (Sattiraju, Mohan and
Mishra, 2013). Cloud risk management has become a prevalent exercise among the
achievement of significant banking organizations today. In the growing attempt to
enhance design procedures and safety; latest surveys have noted a cloud computing threat
region. Risk management enables company managers, and teams to create stronger
choices to mitigate cloud computing hazards. Cloud computing is a lately quickly
advanced large-scale cloud computing technology that possesses big computing and
storage capacity through the inclusion of a significant amount of shared different assets
(Yang, Wu and Yang, 2012). The word cloud computing defines the organization of a
model of a computer network that can satisfy real-time user needs for storage, computing
power, and applications. In their work, they consider cloud computing as a system
consisting of hardware, software, and procedures that a user (in their case an accounting
department) can rent for use in real-time. At any moment, any department employee will
link to the scheme from anywhere using a range of devices (i.e. PCs, laptops, mobile
devices, etc.) (Nikolopoulos and Tzouramanis, 2016). Finally, our paper's objective is to
control methods and solutions for mitigating critical cloud issues in banking
organizations.

2 Literature Review
Cloud computing is usually associated with failures. Risk of failure defined as the
possibility of suffering loss, or exposure in the cloud-computing life cycle. Commonly,
cloud computing risk management consists of the processes, methods and techniques that
are useful to mitigate cloud computing risk failure. Cloud security is a broad topic and
any combination of policies, technologies, and control methods to protect data and cloud
system, infrastructure and services from possible attacks. Furthermore, existing
researches focused on providing security technologies, rather than business features such
as services stability, continuity and availability (Gao et al., 2013). Additionally, the cloud
bank model is a resource management modelling based on economic principles. Its
function is very similar to commercial banks in deposit and loan business (Li, Pu and Lu,
2012). Organizations using cloud infrastructure to provide SaaS have multiple options.
By weighing factors of workload, cost, security, and data interoperability, IT can choose
to utilize their private cloud to mitigate risk and maintain control; use public cloud
infrastructure, platform, or analytics services to further enhance scalability; or implement
a hybrid model that combines private and public cloud resources and services (Sakharkar,
Dande and Mate, 2017). Cloud computing is the process of storing a vast amount of data
to have efficient retrieval for future use. Cloud computing doesn't provide storage
capabilities only; instead, it is capable of having many security features(Sen and Saluja,
2017). Cloud storage got importance because of various benefits: Relief of the burden for
storage management, open access with location independence, and avoidance of capital
expenditure on hardware, software, and personal maintenance, etc. (Navya and
Ramanjaiah, 2017). Cloud system is gaining the importance in public environment. But

319
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

security is always a critical challenge while sharing valuable information(Singh and


Singh, 2016). This study will is to propose adoption of cloud computing model for
managing e-banking system.

3 Cloud Service Models


All four types of cloud computing can provide "on-demand" computation at one
or more of four stages. The cloud service model is split into four classifications accessible
from a cloud supplier: cloud banking as a service (CBaaS), cloud software as a service
(CSaaS), cloud business platform as a service (CPaaS) and cloud infrastructure as a
service (CIaaS) at distinct rates as follows:
3.1 Cloud Banking as a Service (CBaaS)
Business element reflects organizations (e.g. banks) that can give their clients
commercial or banking facilities through mobile banking (e.g. mobile payments). Mobile
banking applications can be supported with portable computing or technology (Gill,
Bunker and Seltsikas, 2011).
3.2 Cloud Software as a Service (SaaS)
Software as a Service (SaaS) (application level) is a model where software is
introduced using one of the four implementation systems. Users do not have
connections to information or configurations and can only use the software stored in
cloud computing (Arunkumar and Venkataraman., 2015). SaaS facilitates promotes
user entry to applications and databases. The user does not have to install and run
the app on their local computer. Maintenance is simple in SaaS, so it is quite cost -
effective (Irfan et al., 2015). SaaS is the most common model and needs cloud
suppliers to install and operate the complete application stack on their platform, and
users view these applications directly through particular client software (Singh,
2017).
3.3 Platform as a Service (PaaS)
On the Platform as a Service (PaaS) layer, clients use an API t o implement
their applications using the provider-supported programming languages and
instruments (Beckers et al., 2011). In the PaaS model, the client is permitted to
write applications running on the environment of the service provider. PaaS system
provides you with infrastructure as well as full operating and developing
ecosystems to deploy your applications (Goyal, 2014). Platform as a Service (PaaS),
is a category of cloud computing that concerns the ability of clients to employ
virtual servers. Moreover, this service is to ensure that the clients can efficiently
plan, structure, examine and install applications(Alajmi et al., 2018).
3.4 Infrastructure as a Service (IaaS)
The service provider offers digital and physical hardware as a service in
Infrastructure as a service model, and the full infrastructure is supplied over the
internet. In this model, the client has more safety monitoring (Al-anzi, Yadav and
Soni, 2014). IaaS offers consumers with connections to all equipment, including
processing, storage, networking and other primary computing resources, and clients
can deploy and operate any software, including working devices and applications.
Customers do not handle or regulate any cloud computing infrastructure, but they
can adjust the option of the operating system, storage space, and also restrict
network elements within certain boundaries (Wang, 2016).

320
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

4 Cloud Deployment Models


Cloud Computing Deployment Models provide with designs such as public,
private, community, and hybrid as follows:
4.1 Public Cloud
Public cloud services are defined by being accessible through the internet to
customers from a third-party service provider (Irfan et al., 2015). As the word
"Public" does not explicitly mean "Free" while using public cloud services is
equally cheap when deploying solutions. Moreover, "Public cloud" does not imply
that there will be no safety engaged in it, and the information will be accessible to
the public. Public cloud is available to government use, and it is a cost-effective
solution for applications hosting. There are few instances: Google, Amazon and
Microsoft.
4.2 Community Cloud
A community cloud comes between public and private clouds about the consumer
target set. The Community Cloud aims to integrate shared resources from grid computing,
centralized control of digital ecosystems and green computing development with the use
of cloud computing instances while allowing higher use of self-management
developments from autonomous computing (Goyal, 2014). This cloud system is
controlled by a community of organizations that hold the same concerns. It may also be
regulated by a third party (Irfan et al., 2015).
4.3 Private Cloud
A private cloud offers an organization with facilities through an intranet. Private
clouds can be linked to one another to create a companion cloud. Private clouds are only
run for an organization (Beckers et al., 2011). The implementation of fine-grained access
control systems to safeguard the privacy of banking information is more flexible and
reliable. A hybrid hosts sensitive information and workflows on its private cloud and can
ensure the same safety and privacy as a private cloud (Hu, Peng and Bai, 2015). A private
cloud is hosted in a company's data center and offers its facilities only to users within that
firm or its associates (Goyal, 2014).
4.4 Hybrid Cloud
Hybrid cloud utilizes both government and private cloud methods where it relates
the strategy views of public cloud services with the private cloud foundation. In reality,
the private cloud must be connected to the rest of the company's IT resources and cannot
be separated from the public cloud (Alzahrani, Alalwan and Sarrab, 2014).

5 Critical Cloud Computing Issues and Challenges for Banking


Organizations
Cloud security is a broad subject and any mixture of measures, techniques and
checks to safeguard information, infrastructure and facilities from feasible attacks or the
achievement of company goals should operate effectively in all security domains (Al-
anzi, Yadav and Soni, 2014). However, we need to incorporate between risk
management methods and quantitative, intelligent techniques in a software development
project to mitigate software project failure(Elzamly and Hussin, 2014b; Elzamly, Hussin
and Salleh, 2015). The security issue is regarded as one of the most significant difficulties
in offering a cloud computing service. It is crucial for the achievement of the cloud
services company (Gao et al., 2013). Cloud computing is a recent evolving technology
that every organization nowadays wishes to adjust to its company for higher profitability

321
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

and scalability. This communication described cloud computing outlined all cloud
computing business designs and discussed the characteristics of public, private, hybrid
and community cloud computation. (Goyal, 2014). The company will be prepared to
define its vulnerability and power for each variable and then develop and come up with a
plan that can assist them in creating the right choice towards the effective implementation
of cloud computing (Al-shargabi and Sabri, 2016). Risk is not always avoidable, but it is
controllable on software development projects(Elzamly and Hussin, 2014e; Elzamly,
Hussin, S. S. A. Naser, et al., 2015). Cloud risk management includes many phases:
Cloud risk planning phase, cloud risk identification phase, cloud risk prioritization phase,
cloud risk analysis phase, cloud risk evaluation phase, cloud risk treatment (RT) phase
involves four approaches for responding cloud risks: Cloud risk mitigation, cloud risk
avoidance, cloud risk transfer, cloud risk elimination, cloud risk acceptance, cloud risk
controlling (RC) phase and cloud risk communication & documentation phase (Elzamly
and Hussin, 2014a, 2014d, 2014c; Elzamly, Hussin and Salleh, 2016). Critical security
issues and challenges in cloud banking are required to address in this section:

Critical Cloud Computing Issues and Challenges

Technological Organizational Environmental Operational Issues


Issues Issues Issues 1-Safeguard the
1-Protection of 1-Authorization confidentiality of
cloud data and and 1-Trusted cloud cloud information.
privacy authentication for services and 2-The threats in
2-Shared cloud system. strategy. cloud distributed
virtualization 2-Compliance 2-Policy denial of service
technology in and regulatory. perspectives in (DDoS) attack.
cloud requirements in cloud computing. 3-Data integrity
computing. cloud computing. 3-Dynamic and dynamic
3-Adaptability 3-Cloud scalability and storage in the
and flexibility computing capability. cloud computing
infrastructure. service level 4-Multi-tenancy system.
4-Viability of agreement in the cloud 4-Access controls
cloud virtual (SLAs). environments. service for cloud
service provider. 4-Dependency 5-Accessibility data storage
5-Quality of and reliability of effectiveness or systems.
services (QoS) cloud computing availability of 5-Cloud
for cloud components. cloud data. interoperability
services. 5-The Cloud Computing Services Model
hijacking and portability.
of cloud account
or cloud legally
service.
CSaaS CPaaS CIaaS CBaaS

Figure 1 Critical Cloud Computing Issues and Challenges model

322
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

6 Security Control methods and solutions for mitigating cloud issues


Cloud computing is also a new technology that every company wants to adapt
for more profitability and scalability for their businesses these days. This
communication defined cloud computing, highlighted all cloud computing services
and discussed public, private, hybrid and community cloud computing features (Al-
shargabi and Sabri, 2016). The cloud computing environment used to form part of
an information system of an organization must, in the meantime, be controlled in
order to reduce any negative impact on the mission or business processes (Kai et al.,
2012). However, in this section we must highlight the cloud control methods and
solutions to mitigate cloud issues in banking organizations:

1 Security Control methods and solutions for mitigating cloud issues and
risks
Network Security Data and storage Application Security
1- Using of Security Physical Security
cryptography for cloud 1- Shared and
1-Enhancing integrity 1-Application portability
computing. or interoperability. architecting multi-
& privacy data in cloud
2- Build powerful 2- Developing effective tenant and physical
computing.
hypervisor security to authentication security for cloud
2- Cyber security and
control and monitor the mechanism and environments
data encryption.
cloud activities. approaches for cloud 2- Security &
3- Data confidentiality
3- Prevent cloud banking system availability architecture
and audit-ability of
distributed denial-of- 3-Automated software in cloud environments.
administrative access.
service (DDoS) tools. 3- Cost of cloud
4- Predicting the impact
attacks. 4- Analytics and management.
of emerging regulations
4- Cloud virtualization technology solutions to 4-Cloud elasticity and
on strategic direction
technology and virtual optimize compliance rapid scalability.
and business model.
machine. monitoring 5-Develop integrated
5-Best practices for 5-Flexible access
5- Ccompliance and risk risk strategies and
measure cloud service control for cloud data
management processes frameworks across
level agreements. storage.
for cloud systems. compliance, regulatory.

Cloud Computing Environments

Figure 2 Control methods and solutions for mitigating cloud issues

7 Cloud e-banking system model


In reality, in service management processes, It was provided with a cloud security
service model and distinctive modelling of information resources related to virtualization
security, multi-tenant security and data security(Gao et al., 2013). Although some
security controls and strategies designed for each component of cloud computing, we
need a structure with a general model of quantitative risk management. It suggested risk
assessment methods to determine cloud computing hazards in the platform model. The
linear, iterative and incremental strategy helps cloud users and cloud providers to handle
and describe cloud hazards (Sendi and Cheriet, 2014). According to previous research, we

323
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

split the framework for cloud computing into four five stages, such as cloud services
model, cloud deployment model, cloud issues model, and cloud control security model as
follows in Figure1.

Cloud e-Banking System


Model
Public
Private Cloud
Cloud

Cloud issues and risks Cloud control security


Communit methods
y Cloud
security
Hybrid
Cloud Network security
Technological
factors

Data and storage


Security
Cloud banking as Organizational
factors
a Service (SaaS)

Software as a Application
security
Service (SaaS) Environmental
factors
Platform as a
Service (PaaS) Physical
Operational security
Infrastructure as
Management factors
a Service (IaaS)

Figure 3 Adoption of Cloud Computing Model for e-Bank System

8 Conclusions
Cloud risk management has become a prevalent exercise among the achievement
of significant banking organizations today. In the growing attempt to enhance design
procedures and safety; latest surveys have noted a cloud computing threat region. The
concern of the study is to propose adoption of cloud computing model for managing e-
banking system. There are 4 stages for success adoption of cloud computing model for
managing e-banking system. The cloud service models include cloud Banking as a
Service, cloud software as a service, cloud platform as a service, cloud infrastructure as
a service. The cloud deployment models include four items as public cloud, community
cloud, private cloud and hybrid cloud. Cloud computing issues and risks models are
classified to technological factors, organizational factors, environmental factors, and
operational factors. Finally, security control methods are classified to network security
controls, data and storage security controls, application security control and physical
security controls. Furthermore, successful adoption of cloud computing model for
managing e-banking system will greatly improve the probability of cloud e-banking
success in banking organizations.

324
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

9 Acknowledgements
This project is performed as part of the Palestine-Quebec Science Bridge initiative.
The authors also would like to thank Al-Aqsa University, Gaza, Palestine, University of
Quebec Outaouais (UQO), Canada and Palestine Academy for Science and Technology.

10 References
[1] Al-anzi, F., Yadav, S. and Soni, J. (2014) ‘Cloud Computing: Security Model Comprising Governance,
Risk Management and Compliance’, in 2014 International Conference on Data Mining and Intelligent
Computing (ICDMIC), pp. 1–6.
[2] Al-shargabi, B. and Sabri, O. (2016) ‘A study of Adopting Cloud Computing from Enterprise
Perspective using Delone and Mclean IS Success Model’, International Journal of Computer Science
and Information Security (IJCSIS), 14 S1(February), p. 5500.
[3] Alajmi, Q. et al. (2018) ‘A conceptual model of e-learning based on cloud computing adoption in
higher education institutions’, in 2017 International Conference on Electrical and Computing
Technologies and Applications, ICECTA 2017, pp. 1–6. doi: 10.1109/ICECTA.2017.8252013.
[4] Alzahrani, A., Alalwan, N. and Sarrab, M. (2014) ‘Mobile Cloud Computing: Advantage,
Disadvantage and Open Challenge’, in Proceedings of the 7th Euro American Conference on
Telematics and Information Systems, pp. 4–7.
[5] Arunkumar, G. and Venkataraman., N. (2015) ‘A Novel Approach to Address Interoperability Concern
in Cloud Computing’, in Procedia Computer Science. Elsevier Masson SAS, pp. 554–559. doi:
10.1016/j.procs.2015.04.083.
[6] Beckers, K. et al. (2011) ‘Pattern-Based Support for Context Establishment and Asset Identification of
the ISO 27000 in the Field of Cloud Computing’, in 2011 Sixth International Conference on
Availability, Reliability and Security Pattern-Based, pp. 327–333. doi: 10.1109/ARES.2011.55.
[7] Elzamly, A., Hussin, B., Naser, S., et al. (2015) ‘Classification of Software Risks with Discriminant
Analysis Techniques in Software planning Development Process’, International Journal of Advanced
Science and Technology, 81(2015), pp. 35–48.
[8] Elzamly, A., Hussin, B., Naser, S. S. A., et al. (2015) ‘Predicting Software Analysis Process Risks
Using Linear Stepwise Discriminant Analysis: Statistical Methods’, International Journal of Advanced
Information Science and Technology (IJAIST), 38(38), pp. 108–115.
[9] Elzamly, A. et al. (2017) ‘Predicting Critical Cloud Computing Security Issues using Artificial Neural
Network (ANNs) Algorithms in Banking Organizations’, International Journal of Information
Technology and Electrical Engineering, 6(2), pp. 40–45.
[10] Elzamly, A. and Hussin, B. (2014a) ‘A Comparison of Fuzzy and Stepwise Multiple Regression
Analysis Techniques for Managing Software Project Risks: Implementation Phase’, International
Management Review, 10(1), pp. 43–54.
[11] Elzamly, A. and Hussin, B. (2014b) ‘An Enhancement of Framework Software Risk Management
Methodology for Successful Software Development’, Journal of Theoretical and Applied Information
Technology, 62(2), pp. 410–423.
[12] Elzamly, A. and Hussin, B. (2014c) ‘Evaluation of Quantitative and Mining Techniques for Reducing
Software Maintenance Risks’, Applied Mathematical Sciences, 8(111), pp. 5533–5542.
[13] Elzamly, A. and Hussin, B. (2014d) ‘Identifying and Managing Software Project Risks with Proposed
Fuzzy Regression Analysis Techniques : Maintenance Phase’, in 2014 Conference on Management and
Engineering (CME2014), pp. 1868–1881.
[14] Elzamly, A. and Hussin, B. (2014e) ‘Managing Software Project Risks (Planning Phase) with Proposed
Fuzzy Regression Analysis Techniques with Fuzzy Concepts’, International Journal of Information
and Computer Science (IJICS), 3(2), pp. 31–40. doi: 10.14355/ijics.2014.0302.02.
[15] Elzamly, A., Hussin, B. and Salleh, N. (2015) ‘Methodologies and Techniques in Software Risk
Management Approach for Mitigating Risks: A Review’, Asian Journal of Mathematics and Computer
Research, 2(4), pp. 184–198.
[16] Elzamly, A., Hussin, B. and Salleh, N. (2016) ‘Top Fifty Software Risk Factors and the Best Thirty
Risk Management Techniques in Software Development Lifecycle for Successful Software Projects’,
International Journal of Hybrid Information Technology, 9(6), pp. 11–32.
[17] Gao, Z. et al. (2013) ‘Management Process Based Cloud Service’, in International Conference on
Cyberspace Technology (CCT 2013), pp. 278–281.

325
International Journal of Advanced Science and Technology
Vol. 28, No. 1, (2019)

[18] Gill, A., Bunker, D. and Seltsikas, P. (2011) ‘An Empirical Analysis of Cloud, Mobile, Social and
Green Computing’, in An Empirical Analysis of Cloud, Mobile, Social and Green Computing, pp. 698–
705. doi: 10.1109/DASC.2011.122.
[19] Goyal, S. (2014) ‘Public vs Private vs Hybrid vs Community-Cloud Computing: A Critical Review’,
International Journal of Computer Network and Information Security, pp. 20–29. doi:
10.5815/ijcnis.2014.03.03.
[20] Hadi, M. (2015) ‘Overview of Cloud Computing Towards to Future Networks’, International Journal
of Computer Science and Innovation, 2015(2), pp. 68–78.
[21] Hu, Y., Peng, C. and Bai, G. (2015) ‘Sharing health data through hybrid cloud for self-management’, in
2015 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2015, p. 6. doi:
10.1109/ICMEW.2015.7169752.
[22] Irfan, M. et al. (2015) ‘A Critical Review of Security Threats in Cloud Computing’, in 2015 3rd
International Symposium on Computational and Business Intelligence (ISCBI), pp. 105–111. doi:
10.1109/ISCBI.2015.26.
[23] Jansen, W. and Grance, T. (2011) Guidelines on Security and Privacy in Public Cloud Computing,
NIST special publication. doi: 10.3233/GOV-2011-0271.
[24] Kai, S. et al. (2012) ‘Development of Qualification of Security Status Suitable for Cloud Computing
System’, in Proceedings of the 4th international workshop on Security measurements and metrics -
MetriSec ’12, p. 17. doi: 10.1145/2372225.2372232.
[25] Li, H., Pu, Y. and Lu, J. (2012) ‘A Cloud Computing Resource Pricing Strategy Research-based on
Resource Swarm Algorithm’, in 2012 International Conference on Computer Science and Service
System, pp. 2217–2222. doi: 10.1109/CSSS.2012.551.
[26] Navya, T. and Ramanjaiah, G. (2017) ‘Protecting and Verifying Integrity of Cloud Data Regenerating
Codes’, International Journal of Advanced Technology and Innovative Research, 09(02), pp. 222–226.
[27] Nikolopoulos, S. D. and Tzouramanis, N. (2016) ‘Data Mining Association Rules of ICT ’ s Adoption
Factors by Greek Accountants’, 11th MIBES Conference – Heraklion, Crete, Greece, 10(June), pp.
348–362.
[28] Sakharkar, V. S., Dande, M. and Mate, S. (2017) ‘Cloud and Big Data : A Compelling Combination’,
IJESC, 7(3), pp. 4867–4870.
[29] Sattiraju, G., Mohan, L. and Mishra, S. (2013) ‘IDRBT Community Cloud for Indian Banks’, in 2013
International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.
1634–1639.
[30] Sen, N. K. and Saluja, N. K. (2017) ‘Cloud Security Using Homomorphic Encryption.Pdf’,
International Journal of Engineering, Management & Medical Research (IJEMMR), 3(4).
[31] Sendi, A. S. and Cheriet, M. (2014) ‘Cloud Computing: A Risk Assessment Model’, in 2014 IEEE
International Conference on Cloud Engineering, pp. 147–152. doi: 10.1109/IC2E.2014.17.
[32] Singh, A. and Singh, P. (2016) ‘A Hybrid Security Model for Distributed Cloud Management’,
International Journal of Computer Science and Mobile Computing, 5(2), pp. 39–45.
[33] Singh, N. K. (2017) ‘Advanced Security Model for Ensuring Complete Security in Cloud Architecture’,
International Journal of Computational Intelligence Research, 13(5), pp. 663–672.
[34] Wang, F. (2016) ‘Analysis on Safety-related Technology of Cloud Security in University Cloud
Servicing’, in 2016 International Conference on Wireless Communication and Network Engineering
(WCNE 2016).
[35] Xie, F. et al. (2012) ‘A Risk Management Framework for Cloud Computing’, in 2012 IEEE 2nd
International Conference on Cloud Computing and Intelligence Systems, pp. 476–480. doi:
10.1109/CCIS.2012.6664451.
[36] Yang, Y., Wu, L. and Yang, S. (2012) ‘The structure of intelligent grid based on cloud computing and
risk analysis’, 2012 4th International Conference on Intelligent Human-Machine Systems and
Cybernetics, IHMSC 2012, 2, pp. 123–126. doi: 10.1109/IHMSC.2012.126.

326

You might also like