100% found this document useful (1 vote)
175 views4 pages

Cloud Computing and Security

Cloud computing is one of the latest technologies that has been employed by many organizations. The technology presents the cheaper means of data management through a secure cloud system. The majority of organizations have opted for cloud computing technology since it is a reliable means of managing organizational information. However, many critics have complained about the security feature of the cloud systems since third-party companies handle them. Research shows that the sophisticated techno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
175 views4 pages

Cloud Computing and Security

Cloud computing is one of the latest technologies that has been employed by many organizations. The technology presents the cheaper means of data management through a secure cloud system. The majority of organizations have opted for cloud computing technology since it is a reliable means of managing organizational information. However, many critics have complained about the security feature of the cloud systems since third-party companies handle them. Research shows that the sophisticated techno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 5, Issue 4, April – 2020 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Cloud Computing and Security: The Security


Mechanism and Pillars of ERPs on Cloud Technology
Musoni Wilson,PhD 1 MBANZABUGABO Muhire Leonce3
National Research Tomsk State Jean Baptiste, PhD 2 School of Computing and
University(TSU). University of Tourism,Technology Technology
Siberia,Russia. and Business University of Kigali
Studies(UTB).Kigali,Rwanda Kigali,Rwanda.

Abstract:- Cloud computing is one of the latest Companies are moving to the implementation of cloud
technologies that has been employed by many technologies to perform critical functions at least cost. At
organizations. The technology presents the cheaper the same time, these companies are faced with a challenge
means of data management through a secure cloud on how to protect the data and all users’ information stored
system. The majority of organizations have opted for on the cloud systems. Security, confidentiality, and privacy
cloud computing technology since it is a reliable means are the first concerns when it comes to cloud servers, as
of managing organizational information. However, compared to the cost of operation (Al-Mashari & Zairi,
many critics have complained about the security feature 2000). For companies, lack of technologies and resources
of the cloud systems since third-party companies handle to manage third-party security in the cloud servers can
them. Research shows that the sophisticated technology result in low cots safety. Cloud computing users
provided by cloud has shown some vulnerabilities hence consequently are facing various security related risks.
not trustworthy. Research indicates that many
organizations fail to report the cybercrimes associated The cloud systems have both technical and
with cloud system due to reputation damage and institutional challenges. The legal regimes relating to cloud
embarrassments associated. This paper will address the safety management are developing slowly as compared to
cloud computing security, taking the case study of ERP the rate of technology expansion. The safety issues like
systems on the use of secure cloud systems. privacy, information ownership, and privacy currently are
not covered adequately in the current legal systems. Some
I. INTRODUCTION researchers are arguing that the organization is supposed to
be legally responsible for customer's data rather than the
Cloud computing is a technology that involves hosting third-party company (Al-Mashari & Zairi, 2000). Another
applications, information, and other organization services issue raised is the lack of respect on how some third-party
on the servers and accessing the software via the internet companies handle client's information. Criticisms also are
connection. Under this technology, the organizations can facing cloud providers because they do not investigate their
pay for the services they require to a company hosting for clients, who are the organizations whether they have secure
them. To access the resource and computing power from systems before processing their data.
cloud space, services must be paid for depending on the
usage pattern (Al-Mashari & Zairi, 2000). The institutions Businesses and many other clients have expressed
are the rule of the game that is; they include primary their concern on the issue of data security. They have
constraints like laws, and practice, relaxed restrictions like become more cautious about the use of cloud services to
conventions and behaviors are controlled. store their highly valued and sensitive data. Due to weak
security strategies implemented, cloud systems remains the
This research will seek to discuss the issues related to riskiest approach to manage information (Al-Mashari &
the application of ERP's security and privacy at the cloud Zairi, 2000). According to the report done by the
systems. Secondly, it will consider if there are any security International Data Corporation in 2008, safety was the most
mechanisms and pillars that can be established to facilitate significant obstacle to the embracing of cloud computing
trustworthiness and confidentiality of data stored on the technology. Additionally, the organizations are worried
cloud servers. about any hidden charges associated with the lawsuits and
security breaches of data privacy.
A. Background Information
Cloud computing is one of the latest technologies that B. General Analysis and Problem of Statement
are likely to drive many organizations to greater heights. Security issue with cloud computing technology is the
The concept of cloud computing has been widely accepted new puzzle for many organizations today. The whole idea
by regular internet users. However, some severe of implementing cloud services is to reduce the cost
organizations have a great concern over the security involved in managing all resources and software at the
features of these systems. organization level. With the virtualized environment, the
user can access information from any location and at any
time of the day (Al-Mashari & Zairi, 2000). These services
are known as Software as a Service (SaaS). Enterprise

IJISRT20APR072 www.ijisrt.com 469


Volume 5, Issue 4, April – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
resource planning is a type of software that unites all the II. LITERATURE REVIEW
operations of the organization through a single interface. It
changes all the organizational processes while managing all ERP systems are the current software used in many
data effectively. businesses for storage of information and computing
purposes. An ERP system manages and integrates all
Probabilities of a fruitful execution of an ERP in an business processes into one entity to facilitate activities of
association are less. Likewise, it takes a generous measure the company through a simple software. Most organizations
of labor, cost, and exertion to convey and keep up the ERP. view the ERP-integrated system as a means of
A whole ERP application being re-appropriated is a standardizing the organizational operations and provides
moderately new thought and has been under dialog much of seamless access to information in the business. ERPs stores
the time for its points of interest and some inert disservices and manages information at an appropriate format while
(ECONOMIST, 2009). In today’s world with such stretching past business boundaries (ECONOMIST, 2009).
monetary circumstances, it suits authoritative for an Since this system touches all parts of the organization, it is
association to lessen its working expenses while expanding a critical tool to facilitate organizational performance.
mostly productivity with a similar measure of assets and to
satisfy client's requests (Al-Mashari & Zairi, 2000). This is One key challenge with the adoption of ERP is the
the dwelling a cloud and anchored based ERP can indeed flexibility of the business to welcome the new integrations
encourage a company, nevertheless some remarkably into data processing systems. The flexibility involved
relevant inconveniences that must be defeated to make this denotes to the degree to which the ERP software can be
a more feasible choice to a "best of breed" or an off-the- configured to meet the requirements of the business. In
shelf ERP arrangement, complete. other words, some managers find the ERP system difficult
to use when integrating projects (ECONOMIST, 2009).
The barriers to the implementation of cloud The online delivery has been a long-term dream for
computing technology depends on the data of the software salespersons and suppliers. There are several areas
organization. If the organization is handling substantial data for future research about ERP systems and the cloud
sets, it will be useful to manage it through the cloud computing technologies. Instead of licensing software like
service. However, many other situation can call for the use the ERP system, it is cheap and convenient to adopt the
of cloud technology. These factors can be the saving of system form the cloud service provider who created the
operation cots, fault tolerance, on-demand service, data software.
flexibility, and compliance data formats, on-demand
service and information reliance (ECONOMIST. (2009). A cloud is a type of disseminated computer system
There are four diverse types of cloud services that an with a gathering of interconnected virtual computers. These
organization can opt to use dependent on the company computers are unified through a single server to allocate
requirements. The four categories include public cloud, resources upon request. Most of the applications developed
accessed by any subscriber, secondly is the private cloud, on cloud systems are determined by the services demanded
obtained by a specific controlled group, the third one is the by the physical location provider. The benefits of cloud-
community cloud, which is shared among the organizations based systems are that they offer flexibility, reliability,
members and the last one, is the hybrid cloud, which is any agility, and interoperability. Cloud computing presents easy
combination of the above types (Al-Mashari & Zairi, scalability and flexibility of resources and dismantling of
2000). funds and clients require during the peak workloads
(ISACA, 2009). The use of cloud system offers a pay-per-
C. Objectives of the Study use basis with a fixed cost and reduced risk.
The general objectives and specific objectives are
addressed in this study. The general aim is to illustrate and Cloud-based ERP systems have a slighter time
identify various cons and pros that will result in an measure for configuring and deploying the software. The
organization that utilized cloud computing or a cloud-based effects the agility of the system and the business and
ERP system and the possible security risks associated. The reduces the costs involved with time delays
following are specific objectives of this study: (ECONOMIST, 2009). This system allows the organization
 To investigate the current cloud systems framework to benefit from a competitive edge. Through this system,
 To analyze if the cloud systems are associated with any organizational data is accessed globally form any location;
security vulnerability. this also facilitates virtual working.
 To evaluate any possible disadvantages of adopting
cloud computing technologies in an organization. Besides the aspect of data security, the adoption of
cloud systems has some regulations and legal procedures.
When moving submissions to the cloud, the organization
can opt to trace the resources anywhere on the planet
concerning the laws applicable (Kim, 2009). For instance,
some cryptographic strategies may not be applied in some
other countries due to restrictions present (ISACA, 2009).
Cloud services have decreased the expense of substance
stockpiling and conveyance. However, they can be hard to

IJISRT20APR072 www.ijisrt.com 470


Volume 5, Issue 4, April – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
use for non-designers, as each administration is best used The comprehension of this importance is characterized and
using remarkable web benefits, and have their very own reclassified through cooperation, with affectability to
one of kind idiosyncrasies (Kim, 2009). A client could situations and the connection between health, activity and
likewise get frightful amazement on the off chance that the result (Bryman & Bell, 2003). Subjective examination
they have not comprehended what they will be charged for considers better contrasts to be uncovered which will
(Kim, 2009). Merchant secure is another issue that an enable the analyst to explore his case thoroughly. As
association may need to confront if they need to relocate indicated by research, the attributes of this methodology as
towards another specialist organization. empowering the scientist to examine marvels in their
standard settings, while endeavoring to decipher these
III. RESEARCH METHODOLOGIES AND wonders as far as the implications individuals convey to
THEORETICAL FRAMEWORKS them.

This research was focused on finding a solution to the  Cloud’s Newness and Unique Vulnerabilities
problem of cloud-based ERP systems. Formulating a The cloud's new uniqueness and newness in the
research topic is very significant in any study. To evaluate organizations come with particular problems. With more
the pros and cons of ERP systems, which are cloud-based, popularity on this technology, new bugs, security issues
and its security impact, the background of the topic was and vulnerability with virtual technologies are experienced.
first assessed. Cloud systems, however, are not familiar with many IT
security companies. Lack of strategies to offer security at
Qualitative research contributed to the investigation of the cloud (ISACA, 2009). Experts are arguing that such
how cloud-based systems are vulnerable to security issues. vulnerabilities can provide a dangerous effect to the
Qualitative approaches are based on the non-numerical data company implementing the technology (Boykin, 2001).
by providing means of behavior assessment in quantitative The cloud can be challenging forensically in case there is
data (Bryman & Bell, 2003). It seeks to evaluate a concept the data breach. For instance, some public cloud systems
and the meaning of a phenomenon. Personal methods can store information differently depending on the
depends on the conviction that the people are on-screen regulations regarding data privacy, data loss and privacy
characters who play a functioning job in reacting to issues. Some companies may opt to encrypt data before
circumstances and the acknowledgment that the reaction storing it on the cloud.
depends on the specific importance (ECONOMIST, 2009).

Fig 1:- Cloud computing Layers according to Gartner, 2009.

IJISRT20APR072 www.ijisrt.com 471


Volume 5, Issue 4, April – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IV. RESULTS OF THE STUDY these points of interest, putting away a lot of information
including fundamental data on the cloud propels
Cloud computing is the latest technology that has profoundly gifted programmers, hence making a major
proved to be the best for many organizations. Some of the imperative to business information proprietors (Boykin,
popular cloud service providers include Google, Amazon, 2001). Consequently, there is a requirement for the
Microsoft, IBM, and VMware in conjunction with other security columns and secretly instrument to be considered
third-party companies (Boykin, 2001). The interpretation of and actualized as one of the best arrangement of the urgent
the results from this research was based on third-party issues. Additionally, it should be recognizing Cloud
auditors, technology awareness, virtual network providers, Computing innovation with the goal that Legitimate and
cloud-based systems and access controls to the cloud also ill-conceived associations and substances can be
information (Boykin, 2001). To secure the data stored on guaranteed to do not accessing information on the cloud
the cloud-based ERPs, the organization should look for through illicit, unprecedented, and semi lawful means
means of encrypting information when retrieving it from (Boykin, 2001). The fears to implement cloud-based ERP
the cloud systems. Secondly, there should be legal systems can be eradicated with the implementation of an
strategies governing third-party organizations that offer authentication pillar to provide secure online services.
cloud services.
REFERENCES
The model introduced in this paper likewise has
suggestions for administration practice and open [1]. Al-Mashari, M., & Zairi, M. (2000). Supply-chain re-
arrangement. Most cloud providers‟ administrations engineering using enterprise-resource planning (ERP)
accompany no affirmation or guarantee of a given level of systems: an analysis of a SAP R/3 implementation
security and protection (Dubey & Wagle, 2007). Cloud case”,. International Journal of Physical Distribution
suppliers need strategies and practices identified with & Logistics Management , 30 (3/4), 296-313.
protection and security. Nor is that their separate issue. [2]. Bryman, A., & Bell, E. (2003). Business Research
Cloud suppliers have likewise exhibited a propensity to Methods. Oxford: Oxford University Press.
lessen their obligation by proposing contracts with the [3]. Boykin, R. F. (2001). Enterprise resource-planning
administration gave "as seems to be" with no guarantee software: a solution to the return material. Computers
(Boykin, 2001). View of inadequacy or resistance of cloud in Industry , 45, 99-109.
suppliers may consequently go about as a detour to [4]. Dubey, A., & Wagle, D. (2007). Delivering software
organizations‟ cloud reception choices. In such manner, the as a service. The McKinsey Quarterly Web Exclusive .
above examination demonstrates that security and [5]. ECONOMIST. (2009). Cloud Computing : Economist
protection estimates intended to decrease apparent hazard Debate. Retrieved December 13, 2009,
and straightforwardness and clear correspondence fromhttp://www.economist.com:/debate/files/view/CS
procedures would make an upper hand for cloud suppliers C_Cloud_Computing_Debate0.pdf
(Boykin, 2001). [6]. ISACA. (2009). Cloud Computing: Business Benefits
With Security, Governance and Assurance
The novelty and uniqueness of the cloud frequently Perspectives. Rolling Meadows, USA: ISACA
imply that customers would not comprehend what to Emerging Technology.
request in speculation choices. A comprehension of model [7]. Kim, W. (2009). Cloud Computing: Today and
would likewise enable associations to take mechanical, Tomorrow. Journal of object technology , 8.
conduct and perceptual/attitudinal measures (Al-Mashari &
Zairi, 2000). The clients of the cloud are working on the
supposition that cloud suppliers consider protection and
security issues important. Nevertheless, against the
background of the institutional settings, this likely could be
an advantage however perhaps false suspicion.

V. CONCLUSION

Cloud computing is one of the modern technology


that is useful in many organizations. Cloud computing
works on the basis that it provides information in a quick
and accessible means within the shortest time possible and
form any geographical location. However, the issue of
security and data privacy at the cloud-based ERP systems
have paused a challenge to many organizations when it
comes to adopting this technology. Distributed computing
is a multi-occupant advantage partaking stage, which
allows varied specialist governments to convey software
design as administrations and convey equipment as
administrations in a practical way. Anyway, alongside

IJISRT20APR072 www.ijisrt.com 472

You might also like