Paper - Data Security Issues In Cloud Computing
Added on - 22 Sep 2019
Article 1Data security issues in cloud-based Software-as-a-Service ERPThis paper discusses the data security issues and concerns that are prevalent whenorganizations are moving their Enterprise Resource Planning (ERP) systems to thecloud. Cloud computing has reinvented how organizations conduct business and hasenabled them to innovate and compete in a dynamic environment through new andinnovative business models. The growing popularity and success of the cloud has led tothe emergence of cloud-based Software-as-a-Service (SaaS) ERP systems, a newalternative approach to traditional on-premise ERP systems. Cloud-based ERP has amyriad of benefits for organizations. However, infrastructure engineers need to addressdata security issues before moving their enterprise applications to the cloud. Cloud-based ERP raises specific concerns about the confidentiality and integrity of the datastored in the cloud. Such concerns that affect the adoption of cloud-based ERP arebased on the size of the organization. Small to medium enterprises (SMEs) gain themaximum benefits from cloud-based ERP as many of the concerns around data securityare not relevant to them. On the contrary, larger organizations are more cautious inmoving their mission critical enterprise applications to the cloud. A hybrid solution whereorganizations can choose to keep their sensitive applications on-premise whileleveraging the benefits of the cloud is proposed in this paper as an effective solution thatis gaining momentum and popularity for large organizations.Article 2Security, privacy and trust in cloud computing: Acomparative study"Use the computer without a computer," this is the dream of all managers who believe in"Cloud Computing". The Cloud has become a dream and an obsession for all fans of thecomputer because of the many benefits this service offers: availability of services anddata is ensured, cost is relative to consumption, ease of deployment, technicalinfrastructure is adaptable to the volume of business activity, its convenience to thecommon business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this serviceprovides a business function and not the technical components requiring computerskills..., Besides these advantages, there are serious risks related to the use of Cloudcomputing, such as: temporary or permanent loss of data, security of data, lack oftraceability and accountability... These risks are the main challenges faced whileadopting a Cloud computing architecture., In this paper, we studied the literaturefocusing on three major notions on collaborative systems in Cloud computing: Security,privacy and trust. That's why we will try to bring out the main requirements regardingthese three concepts from both points of view (user's and provider's), before presentingsome related approaches which treat these three concepts.
Article 3Security Perspective in RAMI 4.0Abstract:Cloud Computing, Internet of Things (IoT) are the main technologies contributing to theadoption of the fourth revolution in manufacturing, Industry 4.0 also known as smartmanufacturing or digital manufacturing. Smart manufacturing facilitates and acceleratesthe process of manufacturing with the connection of all the systems related to themanufacturing process starting with the Enterprise Resource Planning (ERP) systems,the Industrial Control Systems (ICSs) which control the production line and the CyberPhysical Systems (CPSs). Before the emerging of web applications, cloud applicationsand thin clients, ICSs and CPSs were already present but the protocols used for thosesystems were not designed for the Internet. In this paper, we tackle the securitychallenges that are accompanied by the emerging of this new technology, the mitigationtechniques and the governance and compliance issues associated with it.SECTION II.RAMI 4.0In 2015, the "Platform 4.0" developed the so-called Reference ArchitectureModel for Industry 4.0 (RAMI 4.0).RAMI 4.0 is a three-dimensionallayered model, the first axis is the architecture axis, which consists of sixunique levels: Assets, integration, communication, information, functional,and business layers. Detailing the above levels with a bottom up approach,the bottom layer is the "Asset" layer, which actually represents the physicaland non-physical layers. Each component or function of the upcoming layersmust be affiliated to an object of the asset layer. The "Integration" layerconsists of computerized interaction between the physical layer and theusers or software. It mainly falls underneath the umbrella of InformationTechnology (IT).Article 4Ensuring the security of warehouse usingautomatic identification by RFIDAbstract:Every company and institution faces the necessity to manage its inventory. For highaccuracy, security and easy operation of inventory management system it is necessaryto have an easily recognizable identifier on all managed objects. The aim of our presentproject is to modernize the methods of automatic inventory management and assetprotection with the help of the application of radio frequency identification technology