Anda di halaman 1dari 5

9/23

Proceedings of IEEE CCIS2011

BUSINESS INTELLIGENCE IN THE CLOUD: A CASE


OF PAKISTAN
Surat khan, Bin Zhang, Faizullah Khan, Siqi Chen
School of Economics & Management Sciences
Beijing University of Posts and Telecommunications Beijing, China
suratkhan@yahoo.com, binzhang@bupt.edu.cn, khan_kakar@yahoo.com , chensiqi@bupt.edu.cn

available". Stated simply, the main tasks of a BI


Abstract system include "intelligent exploration, integration,
aggregation and a multidimensional analysis of
To predict the market trends, to improve enterprise data originating from various information
performance, and for the smarter business resources"
outcomes, Business intelligence (BI) "an
integrated set of tools, technologies and The role of BI is becoming more pervasive and is
programmed products that are used to collect, affecting the way information is used, analyzed
integrate, analyze and make data available", and applied. As a result, organizations can lead,
become the basic need for the businesses. Due decide, measure, manage and optimize
Economic, technological and human resource performance to achieve greater efficiency and
constraints, the SMEs are not able to achieve the financial benefits. BI is now becoming key to the
benefits of BI. In this paper we proposes, firstly better management of performance associated with
Bl-in-Cloud computing Model for SMEs , to meet multiple dimensions of an organization and its
their goals for profitability, revenue, cost reduction, business processes. [2]
and risk management, Secondly the regional
telecom operator as Bl-in-Cloud platform and The BI system software scale is huge and complex,
Service provider, under the supervision of the development and maintenance is expensive and
regulatory authorities, with the support of required skill human capital, SMEs are not been
government and concerned bodies. able to afford the high cost and complexity of BI .
However, with the emergence of cloud computing
Keywords: Business Intelligence, Cloud and Software as a Service (SaaS), BI solutions no
Computing, Small and Medium sized Enterprises, longer have to be unmanageable, risky and
Pakistan prohibitively expensive affairs. [3] [4]

1 Introduction Cloud computing is the delivery of computing


power over the internet. It turns software into a
With the increasing competition, market pressure service where customers don't pay for a license but
and rapidly changing customer needs, most for how much they use; it makes computing power
companies face the challenges of processing and and storage space a commodity, bought when
analyzing enormous amounts of data and to turning needed and scaled up when necessary. [5]
it into profits. In order to transform these existing According to a new global study by IBM, more
data into knowledge, and help the enterprise than 60% of organizations plan to "embrace cloud
decision maker to make the wise decisions of computing over the next five years" to boost their
operation management, Gartner group introduce "competitive advantage." Marc Benioff, chief
the business Intelligence (BI) ,It is defined as the executive of Salesforce.com and one of the
application of a set of methodologies and pioneers of cloud computing, speaks of a
technologies, such as J2EE, DOTNET, Web "fundamental shift, the move of computing
Services, XML, storage technologies (data resources into the cloud that gives small and large
warehouse), analysis technologies (OLAP, Data companies access to the same resources. [6]
Mining), representation technologies, etc, to
improve enterprise operation effectiveness, and In this paper we propose the provision of Business
support management decision to achieve intelligence in cloud to SMEs, in Developing
competitive advantages. According to Reinschmidt countries, by regional telecom operator, with the
and Francoise [1], BI is "an integrated set of tools, monitoring of concerned regulatory and with the
technologies and programmed products that are support of government and related bodies.
used to collect, integrate, analyze and make data

978-1-61284-204-2/11/$26.00 ©2011 IEEE

536
9/23

This paper is organized as follows, Section 2, processing (OLAP) engine, client analysis tools,
discusses the Business intelligence (BI) and other applications that manage the process of
Architecture, BI stages, and BI application Area, gathering data and delivering it to business users.
Section 3 introduces Cloud computing , its [9]
essential characteristics , service and deployment Extract, Transform, and Load (ETL).
Models, section 4 describes an implementation of The data warehouse should be loaded regularly so
Bl-in-Cloud computing for the SMEs , and the that it can serve its purpose of facilitating business
regional telecom operator as a service provider. analysis. To do this, data from one or more
and Section 5, gives the final conclusion of this operational systems needs to be extracted and
Paper. copied into the warehouse. The process of
extracting data from source systems and bringing it
2 Business intelligence architecture into the data warehouse is commonly called ETL,
which stands for extraction, transformation, and
The BI architecture is built on a three-layer loading.
Platform (see Fig-1). On-line Analytical Processing (OLAP).
BI applications (BI solutions), which include the On-line Analytical Processing (OLAP) describes
ability to deliver informational views , queries, an approach to decision support, which aims to
reports , and modeling capabilities that go away extract knowledge from a data warehouse, or more
beyond current offering. specifically, from data marts. Its main idea is
Enabling technologies, such as data mining, query providing navigation through data to non-expert
processing, and result distribution infrastructure, users, so that they are able to interactively generate
which include the ability to store data in multi ad-hoc queries without the intervention of IT
dimensional cube format for On-Line Analytical professionals. [10]
Processing (OLAP), to enable rapid data Data Mining.
aggregation and drill down analysis. The process of extracting previously unknown ,
Core technologies, mainly responsible for data valid and actionable information from large
transfer, such as data warehouses and data Mart , databases and the using the information to make
which include the ability to extract , cleanse, and crucial business decision and the science of
aggregate (Extraction-Transformation-Load )data extracting useful information from large data set or
from multiple operational system into a separate databases. [11].
and drill-down analysis. [7] [8]
2.2 BI Application Areas
Financial Analyses that involve reviewing of
costs and revenues, calculation and comparative
analyses of corporate income statements, analyses
of corporate balance sheet and profitability, cash
flow statement, analyses of financial markets and
sophisticated controlling;
Marketing Analyses that involve analyses of sales
receipts, sales profitability, profit margins, meeting
sales targets, time of orders, actions undertaken by
competitors, stock exchange quotations, and
Figure 1 Three layer BI solution architecture in market identification and segmentation.
cloud computing, adapted from Kalakota, & Customer Analyses that concern time of
Robinson, maintaining contacts with customers, customer
profitability, modeling customers' behavior and
2.1 BI Stages reactions, customer satisfaction, churn analysis etc.;
Production Management Analyses that make it
Data Warehousing. possible to identify production 'bottlenecks' and
A data warehouse is a relational database that is delayed orders, thus enabling organizations to
designed for query and analysis rather than for examine production dynamics and to compare
transaction processing. It usually contains production results obtained by departments or
historical data derived from transaction data, but it plants, etc.
can include data from other sources. It separates Logistic Analyses that enable to identify partners
analysis workload from transaction workload and of supply chain quickly, reverse logistics analysis
enables an organization to consolidate data from and handling.
several sources. In addition to a relational database, Wage analysis, analyses of wage related data
a data warehouse environment includes an including wage component reports made with
extraction, transportation, transformation, and reference to the type required, reports made from
loading (ETL) solution, an online analytical
9/23

the perspective of a given enterprise, wage reports Resource usage can be monitored, controlled, and
distinguishing employment types, payroll reported providing transparency for both the
surcharges, personal contribution reports, analyses provider and consumer of the utilized service. [13]
of average wages, etc.
Personal data analyses that involve examination 3.2 Cloud computing service models
of employment turnover, employment types,
Cloud Software as a Service (SaaS), the
presentation of information on individual
capability provided to the consumer is to use the
employee's personal data, etc. [11] [12]
provider's applications running on a cloud
infrastructure. The applications are accessible from
3 Cloud computing various client devices through a thin client
Cloud computing is a model for enabling interface such as a Web browser (e.g., Web-based
email, Sales force CRM, Google Docs, etc). The
convenient, on-demand network access to a shared
consumer does not manage or control the
pool of configurable computing resources (e.g.,
underlying cloud infrastructure including network,
networks, servers, storage, applications, and
servers, operating systems, storage, or even
services) that can be rapidly provisioned and
individual application capabilities, with the
released with minimal management effort or
possible exception of limited user-specific
service provider interaction. This cloud model is
application configuration settings.
composed of five essential characteristics, three
Cloud Platform as a Service (PaaS), the
service models, and four deployment models.
capability provided to the consumer is to deploy
onto the cloud infrastructure consumer-created or -
3.1 Essential characteristics acquired applications created using programming
On-demand self-service. A consumer / subscriber languages and tools supported by the provider. The
can unilaterally provision computing capabilities, consumer does not manage or control the
such as server time (CPU time) and network underlying cloud infrastructure including network,
storage, as needed automatically (conveniently, servers, operating systems, or storage, but has
self serve method) without requiring human control over the deployed applications and
interaction with each service's provider. possibly application hosting environment
Broad network access. Capabilities (resources) configurations. Examples are Microsoft Azure,
are available over the network (e.g. internet) and Force and Google App engine.
accessed through standard mechanisms that Cloud Infrastructure as a Service (IaaS), the
promote use by heterogeneous thin or thick client capability provided to the consumer is to provision
platforms (e.g., mobile phones, laptops, and processing, storage, networks, and other
personal digital assistants). fundamental computing resources where the
Resource pooling. The cloud service provider's consumer is able to deploy and run arbitrary
computing resources are pooled to serve multiple software, which can include operating systems and
consumers using a multi-tenant model, with applications. The consumer does not manage or
different physical and virtual resources control the underlying cloud infrastructure but has
dynamically assigned and reassigned according to control over operating systems, storage, deployed
consumer demand. There is a sense of location applications, and possibly limited control of select
independence in that the subscriber generally has networking components (e.g., host firewalls ,
no control or knowledge over the exact location of Amazon EC2 and S3, Terremark Enterprise Cloud,
the provided resources but may be able to specify Windows Live Skydrive and Rackspace
location at a higher level of abstraction (e.g., Cloud.).[13][14]
country, state, or datacenter). Examples of
resources include storage, processing, memory, 3.3 Deployment models
network bandwidth, and virtual machines.
Rapid elasticity. Capabilities can be rapidly and Private Cloud. The cloud infrastructure is
elastically provisioned, in some cases operated solely for an organization. It may be
automatically, to quickly scale out and rapidly managed by the organization or a third party and
released to quickly scale in. To the consumer, the may exist on premise or off premise.
capabilities available for provisioning often appear Community Cloud. The cloud infrastructure is
to be unlimited and can be purchased in any shared by several organizations and supports a
quantity at any time. specific community that has shared concerns (e.g.,
mission, security requirements, policy, and
Measured Service. Cloud systems automatically
compliance considerations). It may be managed by
control and optimize resource use by leveraging a
the organizations or a third party and may exist on
metering capability at some level of abstraction
premise or off premise.
appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Public Cloud. The cloud infrastructure is made
available to the general public or a large industry
9/23

group and is owned by an organization selling Medium Enterprises (SMEs) constitute Ninety
cloud services. percent of businesses in Pakistan., According to
Hybrid cloud. The cloud infrastructure is a more recent estimates there are approximately 3.2
composition of two or more clouds (private, million business enterprises in Pakistan, (44%
community, or public) that remain unique entities Rural & 56% Urban), , SMEs account for about
but are bound together by standardized or 30% of Pakistan's GDP, 15% of investment, and
proprietary technology that enables data and 78-80% of employment of non agriculture labor
application portability (e.g., cloud bursting for force. They also play a prominent role as existing
load-balancing between clouds). or potential producers of export goods. . [19]
[14][15][16][17]
BI on the Cloud computing means , to move of
3.4 Business challenges computing resources into the cloud giving small
and large companies access to the same resources.
The European Network and Information Security Keeping in view the resource poverty of SMEs
Agency, a cross-border organization formed by the (Economic, Technological and human skill) and
European Union to address IT security for all barriers to the innovation (i.e. low internet user,
member states, has summarized the unique security
lack of education, lack of use of information and
issues raised by cloud computing:
communication technology), the Bl-in-Cloud
•Loss of Governance- Data processed outside the Model allow the SMEs to have access to powerful
enterprise brings with it an inherent level of risk, tools and services without having to purchase the
because the organization may not have direct solution or infrastructure needed to host it on-
control of the infrastructure, trust in the provider premise. Thus the SMEs can reduce the invest cost,
and its own ability to provide proper security is
reduce the project risk, and reduce the operation
paramount.
and maintenance cost.
•Compliance Risk- Customers are responsible for
the security and integrity of their own data. The
There are number of companies that offer cloud
cloud provider impacts the organization's ability to
comply with regulations, privacy expectations and computing services like Amazon offers Amazon
industry standards, because data and systems may Elastic Compute Cloud (EC2), Google with its
exist outside the organization's direct control. own cloud computing offering, Google App
Engine and Microsoft offers Microsoft Azure. [20]
•Isolation Failure- Data in the cloud is in a
shared environment alongside data from other Pakistan Telecommunication Company Limited
customers. Multi-tenancy and resource sharing are (PTCL) is providing Data Centre services (DC) in
defining characteristics of the cloud. It is entirely Pakistan , DCs are Located in Karachi and Lahore.
possible for competing companies to be using the The data centers are designed to be consistent with
same cloud services, in effect running their international standards (TIA 942 compliant) and
workloads shoulder-to-shoulder. Keeping memory, data center certification bodies.
storage and network access separate is essential.
•Data Protection- In the cloud, the organization PTCL is moving beyond being only an information
doesn't know where his data hosted. The transport provider by extending their offering in
ubiquitous nature of data in the cloud raises the direction of services on the Internet. As the BI
unprecedented identity and access management on the Cloud is new opportunity for business, the
threats. Because the organization relinquishes PTCL can provide the BI platform, according to
direct control over data, it relies on the provider to the Businesses need and requirement. PTCL gains
keep that data secure and, when it is deleted, economies of scale in production and distribution
ensure that it is permanently destroyed. leads to reduce the cost.
•Management Interface and Role-Based
Access- Cloud applications are accessed and While reducing cost is a primary motivation for
managed through the Internet, and involve deep moving towards a cloud provider, reducing
and extensive control. The risk associated with a responsibility for security or privacy should not be.
security breach is therefore increased and proper [21].Cloud Service providers need to protect the
access authorization must be care-fully considered. privacy and security of personal data that they hold
[18] on behalf of organizations and users. Responsible
management of personal data is a central part of
4 Business intelligence in the cloud creating the trust that underpins adoption of cloud
computing based services - without trust, customers will be
reluctant to use cloud-based services. Privacy
Globally, it is recognized that approximately 80% protection builds trust between service providers
of the economic growth comes from the SME and users: accountability and privacy by design
sector. Ninety-nine percent of all businesses in provide mechanisms to achieve the desired end
North America and Europe are SMEs. Small and effects and create this trust. [22]
9/23

The Government should develop and implement Intelligence as a Service (SaaS BI) , Hefei
Up-to-date and adequate policies, regulations and University of Technology, Hefei, Anhui,
laws, to protect the interests of consumers and 230009, China
cloud computing providers Govt should ensure the [5] Tim Weber , Cloud computing: How to get
viability and reliability of Cloud Service Providers. your business ready BBC News website
[6] Tim Weber , Cloud computing after Amazon
Clod computing provider should be able to meet and Sony: ready for primetime, ,BBC News
the international regulatory requirement. The website 20 May 2011 Last updated at 00:10
Cloud Computing Provider should provide the GM
comprehensive SLA (Service Level Agreement), [7] Kalakota, R. & Robinson, M. (2000). E-
i.e. level of service they will provide, how will the business: roadmap for success. ISBN 978-81-
Cloud Provider respond to disaster recovery, to the 7758-116-4.
security breach and to the Data loss ? [8] Celina M. Olszak and Ewa Ziemba Business
Intelligence Systems in the Holistic
Cloud Service provider should train their Infrastructure Development Supporting
employees, about the service provisioning, security, Decision-Making in Organizations University
privacy and regulatory requirement, of Economics, Katowice, Poland .
[9] Oracle® Database Concepts lOg Release 2
Government, Concerned authorities and (10.2)
developing bodies should arrange training program [10] Alberto AbelLo and Oscar Romero , ON-
for the business community, to educate them about LINE ANALYTICAL PROCESSING
the use of cloud computing, economic gain, and Universitat Polif ecnica de Catalunya
on-line services, and teach them security measured. [11] Deepak Pareek (2007) Business Intelligence
for Telecommunication
5 Conclusions [12] Celina M. Olszak and Ewa Ziemba , Approach
to Building and Implementing Business
Small and Medium Sized Enterprises (SMEs) Intelligence Systems. University of
constitute ninety percent (90%) of businesses in Economics, Katowice, Poland
Pakistan, SMEs facing the challenges of [13] Lee Badger, T.Grance , R. Patt-Corner , Jeff
processing and analyzing the business data, to Voas DRAFT Cloud Computing Synopsis and
predict market trends and to improve enterprise Recommendations Recommendation of the
performance. Business intelligence "an integrated National Institute of Standards and
set of tools, technologies and programmed Technology (NIST)
products that are used to collect, integrate, analyze [14] .The European Network and Information
and make data available" is the remedy. Due to the Security Agency (ENISA) ,Cloud Computing
resource (Economic, technological and Human Security Risk Assessment
Skill) poverty the SMEs, are not capable to enjoy www.enisa.europa.eu
the benefits of BI. To address this gap a BI in the [15] http://stephenslighthouse.sirsidynix.com/archi
Cloud Model is proposed. Local telecom operator ves/2009/10/what_is_cloud_c.html
like PTCL in case of Pakistan, can launch the BI [ 16] http://csrc.nist.gov/groups/SNS/cloud-
on cloud services, The Govt. should develop and computing/index.html
implement Up-to-date, and adequate policies, [ 17] http://doctrina.wordpress.com
regulations and laws, to protect the interests of all /2009/09/06/nists-defmition-of-cloud-
stakes holders. computing-what-is-cloud-computing/
[18]Secure your cloud applications...inside and
References out IBM Application Security Services for
Cloud, www.IBM.com
[1] Reinschmidt, J. & Francoise, A. Business [ 19] http ://www.unido. org/index.php?id=5 812
Intelligence Certification Guide, IBM [20] Sohan Singh Yadav, ZengWen Hua, CLOUD:
International Technical Support Organization, A Computing Infrastructure On Demand
San Jose, CA, 2000. Commercially Available Cloud Services
[2] Bill Hostmann, Nigel Rayner, Ted Friedman, [21] Wayne A. Jansen, Cloud Hooks: Security and
Gartners Business Intelligence and Privacy Issues in Cloud Computing NIST
Performance Management Framework. [22]Siani Pearson and Azzedine Benameur
[3] A. Dubey and D. Wage. "Delivering software Privacy, Security and Trust Issues Arising
as a service". The McKinsey Quarterly, 2007. from Cloud Computing Cloud and Security
[4] Tang Liyang, Ni Zhiwei, Wu Zhangjun, Wang Research Lab HP Labs Bristol, UK.
Li, A Conceptual Framework for Business

Anda mungkin juga menyukai