Recent Advances in Computer Science and Communications

Author(s): Dhanapal Angamuthu* and Nithyanandam Pandian

DOI: 10.2174/2213275911666181114142428

A Study of the Cloud Computing Adoption Issues and Challenges

Page: [313 - 318] Pages: 6

  • * (Excluding Mailing and Handling)

Abstract

Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud.

Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment.

Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored.

Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.

Keywords: Cloud computing, cloud adoption challenges, cloud security issues, overview of cloud issues, cloud research areas, Delivery and Deployment Model.

Graphical Abstract

[1]
National Institute of Standards and Technology (NIST), Available From:, https://www.nist.gov/programs-projects/cloud-computing
[2]
Cloud computing – Wikipedia, Available From:, https://en.wikipedia.org/wiki/ Cloud_computing
[3]
Cloud Delivery Model, Available From:, http://whatiscloud.com/ cloud_ delivery_ models/index
[4]
Cloud Deployment, Available From:, http://whatiscloud.com/cloud_deployment_ models/index
[5]
Cloud Standards Customer Council (CSCC) guide for interoperability and portability, Available From:, http://www.cloud-council.org/deliverables/ CSCC-Interoperability-and-Portability-for-Cloud-Computing-A-Guide.pdf
[6]
M. Divyakant, and C.K. Kumbharana, "Issues and challenges of security in cloud computing environment", International Journal of Advanced Networking Applications (IJANA), pp. 108-111, Special issue, 2018.
[7]
J. Opara-Martins, R. Sahandi, and F. Tian, "Critical analysis of vendor lock-in and its impact on cloud computing migration: A business perspective", J. Cloud Comput.-Adv. Sys. App., pp. 1-18, 2016.
[8]
S. Kumar, and R.H. Goudar, "Cloud computing – research issues, challenges, architecture, platforms and applications: A survey", Int. J. Future Comput. Commun., vol. 1, no. 4, pp. 356-360, December 2012.
[9]
M.P.B. Rajegore, and G. MS, "Issues & solution of SAAS model in cloud computing", IOSR J. Comput. Eng. (IOSR-JCE), vol. 1, pp. 40-44, 2017.
[10]
Worldwide Infrastructure Security Report by Arbor Networks Inc, Available From:, https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf
[11]
Y.Z. An, Z.F. Zaaba, and N.F. Samsudin, "Reviews on security issues and challenges in cloud computing", IOP Conf. Series: Materials Science and Engineering, pp. 1-9, 2016.
[12]
A. Dhanapal, and P. Nithyanandam, "An effective mechanism to regenerate HTTP flooding DDoS attack using real time data set"International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), IEEE, pp. 570-575. 2017
[13]
A. Duncan, S. Creese, and M. Goldsmith, "An overview of insider attacks in cloud computing", Concurrency and Computation: Practice and Experience, vol. 27, no. 12, pp. 2964-2981, August 2015.
[14]
Review and Summary of cloud SLAs, IBM Computers, Available From:, https:// www.ibm.com/developerworks/cloud/library/clrev2sla.html
[15]
Cloud Interoperability: Problems and best practices, Available From:, https://www. computerworld.com/article/2508726/cloudcomputing/cloud-interoperability--problems-and-bestpractices.html
[16]
T. Saxena, and V. Chourey, "A survey paper on cloud security issues and challenges", Int. J. Innovat. Res. Comput. Comm. Eng., vol. 5, no. 5, pp. 9987-9990, May 2017.