Security Utilization of Cloud Computing in The World of Business For Small Medium Enterprises (SMEs)
Abstract
At this time the business world began to compete globally with the aim of satisfying customers, so companies need access and information that is fast and accurate. To access information quickly, companies need to build information and communication technology infrastructure which is certainly not easy with the need for a large enough capital, besides that there is cloud computing which can be an alternative. The progress of information and communication technology that we have achieved now has really been recognized and felt to provide a lot of convenience and comfort for human life. Information Technology (IT) solutions, cloud computing, are now starting to be discussed a lot by business people, including in Indonesia. Even though it's popular, it doesn't mean cloud computing is easily accepted. Cloud computing will actually save business operations much more, compared to using traditional methods among Small and Medium Enterprises (SMEs). There are various kinds of services provided by cloud computing, including hardware, infrastructure, platforms, and applications. Cloud computing has considerable benefits, this is because the services of cloud computing can reduce computing costs, increase reliability and provide considerable opportunities for the infrastructure world. The purpose of this research is to increase business competitiveness in the business sector by using the Salesfoorce App Cloud application. The results of this application can make business models more flexible and know market needs and consumer needs.
Downloads
References
S. Srivastava, S. Agarwal, R. Dubey, A. Murarka, and ..., “Scope of Cloud Computing in Business: A Compendious and Methodical Analysis of Trends in Publications and Patents,” Vision, 2021.
A. Kaur et al., “Security Recommendations for Cloud Computing Providers,” Cloud Secur. Alliance, 2013.
D. Lammie, “Cloud Computing in the Business World,” Available SSRN 3830144, 2021.
M. H. Mohamed Basel Almourad, “The Impact of Cloud Computing on the Channel,” vol. 19, no. September, p. 10, Sep. 2011.
M. Y. Sokiyna, M. J. Aqel, and O. A. Naqshbandi, “Cloud computing technology algorithms capabilities in managing and processing big data in business organizations: Mapreduce, hadoop, parallel programming,” J. Inf. …, 2020.
C. I. Fan and S. Y. Huang, “Controllable privacy preserving search based on symmetric predicate encryption in cloud storage,” Futur. Gener. Comput. Syst., 2013.
Z. H. U. Liehuang, D. Hui, and S. Meng, “Privacy protection mechanism for blockchain transaction data,” Big Data Res., 2018.
T. Acar, M. Belenkiy, and A. Küpçü, “Single password authentication,” Comput. Networks, 2013.
D. W. Chadwick and K. Fatema, “A privacy preserving authorisation system for the cloud,” J. Comput. Syst. Sci., 2012.
A. Kaur and A. Verma, “An Abstract Model for Adaptive Access Control in Cloud Computing,” Proc. Int. Conf. Recent …, 2018.
M. Ula, “Analisis Metode Pengamanan Data pada Layanan Cloud Computing,” TECHSI-Jurnal Tek. Inform., 2019.
E. Mohabbattalab, T. von der Heidt, and ..., “The perceived advantages of cloud computing for SMEs,” GSTF Journal on …. Citeseer, 2014.
D. N. Chorafas, Cloud computing strategies. books.google.com, 2010.
B. J. S. Chee and C. F. Jr, Cloud computing: technologies and strategies of the ubiquitous data center. books.google.com, 2010.
W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing (No. NIST SP 800-144). NIST-national Institute of Standards and Technology.” 2011.
W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing. NIST: National Institute of Standards and Technology.” … Rep. 800-144, 2011. Accessible: http …, 2013.
W. Long, S. Li, and X. Song, “Environmental regulation and the environmental performance of small and medium-sized enterprises (SMEs): Evidence from the SME board and growth enterprise …,” J. Public Adm, 2015.
A. M. Mustapha, O. T. Arogundade, and ..., “A model-based business process compliance management architecture for SMSE towards effective adoption of cloud computing,” … Comput. …, 2017.
K. Riad and Z. Yan, “EAR-ABAC: An extended AR-ABAC access control model for SDN-Integrated cloud computing,” International Journal of Computer Applications. researchgate.net, 2015.
Y. A. Younis, K. Kifayat, and M. Merabti, “An access control model for cloud computing,” J. Inf. Secur. …, 2014.