Cloud Computing: Issues and risks of Embracing the Cloud in a Business Environment

Full Text (PDF, 910KB), PP.44-56

Views: 0 Downloads: 0

Author(s)

Shafat Khan 1,*

1. IT Faculty, COMPILER – Institute of Computer Science, Srinagar J&K India

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2019.04.05

Received: 1 Feb. 2019 / Revised: 22 Mar. 2019 / Accepted: 25 Apr. 2019 / Published: 8 Jul. 2019

Index Terms

Cloud computing, Data center, Risks, Challenges, Security, Business

Abstract

Over the latest couple of years, cloud computing has created from being a promising business thought to one of the rapidly creating portions of the IT business. Despite the boom of cloud and the numerous favorable circumstances, for example, financial advantage, rapid elastic resource pool, and on-demand benefit, endeavor clients are yet hesitant to send their business in the cloud and the paradigm likewise makes difficulties for the two clients and suppliers. An absence of fitting answers for such difficulties may cause dangers, which may exceed the normal advantages of utilizing the paradigm. To address the difficulties and related dangers, an orderly hazard the board practice is vital that guides clients dissect the two advantages and dangers identified with cloud-based frameworks. The point of this paper is to provide better comprehension to configuration difficulties of cloud computing and distinguish essential research heading in such manner as this is an expanding area.

Cite This Paper

Shafat Khan,"Cloud Computing: Issues and risks of Embracing the Cloud in a Business Environment", International Journal of Education and Management Engineering(IJEME), Vol.9, No.4, pp. 44-56, 2019. DOI: 10.5815/ijeme.2019.04.05

Reference

[1]Zhang, Q., Cheng, L. & Boutaba, R. (2010). “Cloud computing: state-of-the-art and research challenges”, J Internet Serv Appl (2010) 1: 7-18. DOI 10.1007/s13174-010-0007-6

[2]Islam, S., Mouratidis, H., & Weippl, E. R. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In D. Rosado, D. Mellado, E. Fernandez-Medina, & M. Piattini (Eds.), Security Engineering for Cloud Computing: Approaches and Tools (pp. 97-122). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-2125-1.ch006

[3]Takabi, H., Joshi, J. B.  and Ahn, G. (2010). “Security and Privacy Challenges in Cloud Computing Environments,” in IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31.  doi:10.1109/MSP.2010.186

[4]Al-Mascati, H., & Al-Badi, A. H. (2016). Critical success factors affecting the adoption of cloud computing in oil and gas industry in Oman. In 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016 (pp. 187-193). [7460365] Institute of Electrical and Electronics Engineers Inc.  DOI 10.1109/ICBDSC.2016.7460365

[5]Mell, P. & Grance, T. (2011). The NIST definition of cloud computing, National Institute of Standards and Technology, USA, NIST Special Publication 800-145 doi:10.6028/nist.sp.800-145

[6]Bask, I. (2015). Why cloud technology is the smart move right from startup. Entrepreneur. [Online] Available at:   https://www.entrepren eur.com/article/24 1914 [Accessed 31 Oct 2018]

[7]Vasiljeva, T., Shaikhulina, S., & Kreslins, K. (2017). “Cloud Computing: Business Perspectives, Benefits and Challenges for Small and Medium Enterprises (Case of Latvia)”. Procedia Engineering, 178, 443-451. doi:10.1016/j.proeng.2017.01.087

[8]Subashini, S. and V. Kavitha. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications [Electronic], 34(1), pp.1-11. doi:10.1016/j.jnca.2010.07.006.

[9]Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing - The business perspective. Decision Support systems, 51(1), 176-189.

[10]Iyer, B. and J.C.Henderson. (2010). Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing. MIS Quarterly Executive, 9(2), pp.117-131.  

[11]Khan S., Mohiuddin K., Maqbool F. (2017). “Analysis of Paradigm Shift in Cloud-based GIS Systems”, International Journal of Advance Research in Science and Engineering, 6(3), pp. 345-354

[12]Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., and Zagorodnov, D. (2009). “The Eucalyptus open-source cloud-computing system”, in Proceedings of IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2009), Shanghai, China, pp. 124-131.

[13]Voorsluys, W., Broberg, J. and Buyya, R. (2011). Introduction to Cloud Computing, in Cloud Computing: Principles and Paradigms, ed. by R. Buyya, J. Broberg, A.Goscinski (New York: Wiley, 2011), pp. 1-41

[14]Youseff, L., Butrico, M. and Silva D. D. (2008) Toward a unified ontology of cloud computing, in Proceedings of the 2008 Grid Computing Environments Workshop, pp. 1-10.

[15]Armbrust, M., A. Fox, R. Griffith, A.D.  Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M.I Zaharia. (2010). A view of cloud computing. Communications of the ACM [Electronic], 53(4), pp.50-58.

[16]Avram, M. G. (2014). “Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective”. Procedia Technology, 12, 529-534. doi:10.1016/j.protcy.2013.12.525

[17]Buyya, R., Pandey, S. and Vecchiola, C. (2009). “Cloudbus toolkit for market-oriented cloud computing”, in Proceedings 1st International Conference on Cloud Computing (CloudCom 09), Beijing, 2009, pp. 3-27

[18]Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M., Naslundy, M., & Pourzandiy, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Escola Politecnica at the University of Sao Paulo (EPUSP), Sao Paulo, Brazil.

[19]Mazzarol, T. (2003). A model of small business HR growth management. International Journal of Entrepreneurial Behaviour & Research, 9(1), 27-49.

[20]Feltham, T. S., Feltham, G., & Barnett, J. J. (2005). The dependence of family businesses on a single decision-maker. Journal of small business management, 43(1), 1-15.

[21]Shaqrah, A. (2016). Cloud CRM: State-of-the-Art and Security Challenges, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, pp. 39-43

[22]Shaqrah, A. (2011). “The Influence of Internet Security on E-Business Competence in Jordan: An Empirical Analysis”, International Journal of business data communications and networking, Vol 7, No.4 

[23]Zhang J, Bandyopadhyay S, Piramuthu S. (2008). Real option valuation on grid computing, Decision Support Systems 46 (1) 333-343

[24]Cappuccio, D. (2009). 03 - Best Practices in Data Center Consolidation [Online] Available at:  https://www.gartner.com/doc/1489538?ref= mrktg-srch [Accessed 17 Nov 2018]

[25]Clark C, Fraser K, Hand S, Hansen JG, Jul E, Limpach C, Pratt I, Warfield A (2005) Live migration of virtual machines. In: Proc of NSDI

[26]Mir, I. A. & Raina CK., (2017). “Cloud Computing and its Research Challenges”, International Journal of Engineering Science and Computing, vol.7, no.4, pp. 6501-6506.

[27]Mather T., Kumaraswamy S., Latif S. (2009). “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2009

[28]Weins, K. (2017). Cloud Computing Trends: 2017 State of the Cloud Survey [Online] Available at https://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2017-state-cloud-survey [Accessed 28 Dec 2018].

[29]Khan, S. (2019). “Cloud Computing Paradigm: A realistic option for Business Organizations - A Study”, Journal of Multi Disciplinary Engineering Technologies, 12(2), pp. 85-97.