Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2014, 2(1), 5-9
DOI: 10.12691/iscf-2-1-2
Open AccessArticle

Benefit of Cloud Computing for Educational Institutions and Online Marketing

A.M. Mansuri1, , Manish Verma1 and Pradeep Laxkar2

1Department of Computer Science and Engineering, MIT Mandsaur, Mandsaur, India

2Department of Computer Science and Engineering, ITM Universe, Vadodra, India

Pub. Date: February 25, 2014

Cite this paper:
A.M. Mansuri, Manish Verma and Pradeep Laxkar. Benefit of Cloud Computing for Educational Institutions and Online Marketing. Information Security and Computer Fraud. 2014; 2(1):5-9. doi: 10.12691/iscf-2-1-2

Abstract

Cloud computing as an exciting development in a educational Institute and online marketing perspective. Students and administrative personnel have the opportunity to quickly and economically access various application platforms and resources through the web pages on-demand. Application of storage technology can significantly reduce the amount of cloud storage servers, thereby reducing system development costs; reduce the system caused by the server a single point of failure. Cloud storage services meet this demand by providing transparent and reliable storage solutions In this paper shows that the cloud computing plays an important role in the fields of Educational and online Marketing and it is helpful to provide the data to the Students and online customer respectively. The results show the beneficial of the cloud computing in Educational and online marketing for customers.

Keywords:
virtualization security cloud computing web based storage distributed data base

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 5

References:

[1]  Aymerich, F. M., Fenu, G., Surcis, S., & IEEE. (2008). An Approach to a Cloud Computing Network. 1st International Conference on theApplications of Digital Information and Web Technologies, Ostrava, CZECH REPUBLIC, 120-125.
 
[2]  Banerjee, P. (2009). An intelligent IT infrastructure for the future. 15th International Symposium on High-Performance Computer Architecture, Proceedings, Feb 14-18, 3.
 
[3]  Delic, K. A., & Riley, J. A. (2009). Enterprise Knowledge Clouds: Next Generation KM Systems? International Conference on Information, Process, and Knowledge Management, Cancun, MEXICO. 49-53.
 
[4]  Dodda, R. T., Smith, C., & van Moorsel, A. (2009). Architecture for Cross-Cloud System Management. 2nd International Conference on Contemporary Computing, Nioda, INDIA. 40, 556-567.
 
[5]  Erickson, J. S., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., et al. (2009). Content-Centered Collaboration Spaces in the Cloud. IEEE Internet Computing, 13(5), 34-42.
 
[6]  Klein, C., & Kaefer, G. (2008). From smart homes to smart cities: Opportunities and challenges from an industrial perspective, Next Generation Teletraff c and Wired/Wireless Advanced Networking, Proceedings, Lecture Notes in Computer Science, 5174, 260.
 
[7]  Lijun, M., Chan, W.K., & Tse, T.H. (2008). A tale of clouds: Paradigm comparisons and some thoughts on research issues. IEEE Asia-Pasific Services Computing Conference, APSCC’ 08, 464-469.
 
[8]  Mitchell, P. (2008). Learning architecture: issues in indexing Australian education in a Web 2.0 world. Indexer, 26(4), 163-169.
 
[9]  Dawei Sun, Guiran Chang, Qiang Guo, Chuan Wang, Xingwei Wang., “A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques”, First International Conference on Pervasive Computing, Signal Processing and Applications pcspa; 2010, pp. 305-310.
 
[10]  Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo, “An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds”, IEEE Security and Privacy, vol. 8, no. 6, pp. 56-62, Nov./Dec. 2010.
 
[11]  M. Sharif et al, “Secure In-VM Monitoring Using Hardware Virtualization”, Proc. 16th ACM Conf. Computer andCommunications Security; ACM Press, 2009, pp. 477-487.
 
[12]  Jia Xu, Jia Yan, Liang He, Purui Su, Dengguo Feng. “CloudSEC: A Cloud Architecture for Composing Collaborative Security Services”, 2nd IEEE International Conference on Cloud Computing Technology and Science cloudcom; 2010, pp. 703-711.
 
[13]  Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1; 2009, https://cloudsecurityalliance.org/csaguide.pdf.
 
[14]  Catteddu and G. Hogben. Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA; 2009, http://www.enisa.europa.eu/.
 
[15]  G. Balabanis, N. Reynolds, A. Simintiras: Bases of e-store loalty: Perceived switching barriers and satisfaction.2005.
 
[16]  Z. Yang and R.T. Peterson: Customer Perceived Value, Satisfaction, and Loyalty: The Role of Switching Costs.
 
[17]  In: Psychology & Marketing, Vol. 21(10): 799-822 (October 2004). Wiley Periodicals. 2004.
 
[18]  S. Goldschmidt, S. Junghagen, U. Harris: Strategic affiliate marketing. Edward Elgar Publishing. 2004.
 
[19]  http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm