Cloud Computing Adoption in Enterprise: Challenges and Benefits

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-6
Year of Publication : 2019
Authors : Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey, Dr. Jun Li
DOI :  10.14445/22312803/IJCTT-V67I6P116

MLA

MLA Style:Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey, Dr. Jun Li "Cloud Computing Adoption in Enterprise: Challenges and Benefits" International Journal of Computer Trends and Technology 67.6 (2019): 93-104.

APA Style Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey, Dr. Jun Li. Cloud Computing Adoption in Enterprise: Challenges and Benefits International Journal of Computer Trends and Technology, 67(6),93-104.

Abstract
Loss of the business and downturn of economics are part of almost all types of business activities. There are also new concepts and technologies evolved and entrepreneurs need to keep update accordingly. Therefore, business people have to concentrate on keep exploring new ways to cut down expenses without compromising on the quality. One of the options is to go for the latest technologies. Taking into consideration these problems, the entrepreneurs always choose the right technology to minimise losses, increase efficiency and maximise their profit. In order to help out the entrepreneurs, the IT industries have developed platforms for businesses to use shared resources and online applications through cloud computing. The significant role played by cloud computing in providing a solution to the problems faced by business enterprises to increase business growth and help them to stay alive in a competitive environment. Cloud computing also brings efficiency in managing business resources and make improvements in traditional business practices. It also facilitates the enterprises to avoid unnecessary expenses of procedural and administrative nature, hardware and software costs. Apart from the advantages of cloud computing have certain drawbacks also. The main issue is the security in cloud computing considering the attacks on the cloud too. The primary objective of this paper is to highlight the benefits, challenges in adopting cloud computing and utilizing services offered by cloud computing. Recommendations have also been made to ease the adoption process and how to address security issues.The method has been used is the secondary research, that is collecting the respective data from published journal papers and conference papers.

Reference
[1] Journal: Effects of Industry Type on ICT Adoption among Malaysian SMEs. Authors Khong Sin Tan ,Uchenna Cyril Eze, and Siong Choy Chong. IBIMA Publishing Journal of Supply Chain and Customer Relationship Management. Vol. 2012 (2012), Article ID 113797, 12 pages DOI: 10.5171/2012.113797. Malaysia. http://ibimapublishing.com/articles/JSCCRM/2012/113797/113797.pdf
[2] Article: Roundup Of Cloud Computing Forecasts, 2017. Author Louis Columbus, 29th April, 2017. https://www.forbes.com/sites/louiscolumbus/2017/04/29/roundup-of-cloud-computing-forecasts-2017/#6f02ae7131e8
[3] Journal: Cloud Computing: Advantages and Security Challenges. Authors Satyakam Rahul and Sharda. International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 771-778. India. https://www.ripublication.com/irph/ijict_spl/06_ijictv3n8spl.pdf
[4] Dot-com bubble, from Wikipedia. https://en.wikipedia.org/wiki/Dot-com_bubble
[5] Article: Cloud Computing and Computing Evolution. AuthorsMarkus Böhm,Stefanie Leimeister,Christoph Riedl,Helmut Krcmar. January 2011. from IEEE Xplore. 978-0-7695-3840-2/09 $26.00 © 2009 IEEE. DOI 10.1109/CLOUD.2009.6. Germany. https://www.researchgate.net/publication/268011245_Cloud_Computing_and_Computing_Evolution
[6] Book: Cloud Computing: Web Based Dynamic IT Services. Author: Baun, Christian, Publisher: Springer - Date 14-07-2011. https://epdf.tips/cloud-computing-web-based-dynamic-it-services.html
[7] Book: Cloud Security: A Comprehensive Guide to Secure Cloud Computing – Authors: Ronald L. Krutz and Russell Dean Vines. Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana. ISBN: 978-0-470-58987-8. Manufactured in the United States of America. http://www.itfront.cn/attachment.aspx?attachmentid=998
[8] Journal: Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. Authors Santosh Kumar and R. H. Goudar. International Journal of Future Computer and Communication, vol. 04, 2012. India. http://www.ijfcc.org/papers/95-F0048.pdf
[9] Conference: Adoption of Cloud Computing by SMEs in India: A study of the Institutional Factors. Completed Research Paper Author Jyoti M. Bhat (India). Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. India. https://pdfs.semanticscholar.org/e35c/17887b3c2c79466725eb4aad4abdf5e2c266.pdf
[10] Conference: A comparative study of major service providers for cloud computing. Authors Noman Islam and Aqeel-ur-Rehman. September 2013. Karachi, Pakistan. https://www.researchgate.net/publication/258489864_A_Comparative_Study_of_Major_Service_Providers_for_Cloud_Computing
[11] Book: What is Cloud Computing, Basic of Cloud Computing (PDF). Author Sourabh, February 11, 2014. http://sourcedigit.com/3623-cloud-computing-pdf-free-download/
[12] Conference: Adoption of Cloud Computing by SMEs in India: A study of the Institutional Factors. Completed Research Paper Author Jyoti M. Bhat (India). Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. India. https://pdfs.semanticscholar.org/e35c/17887b3c2c79466725eb4aad4abdf5e2c266.pdf.
[13] Book: Basic Cloud Computing Types. In: Cloud Computing Basics. Author Srinivasan, S. First online 15th May 2014. SpringerBriefs in Electrical and Computer Engineering. [Online]. New York, NY: Springer New York, Pages. 17–41. http://link.springer.com/10.1007/978-1-4614-7699-3
[14] Conference: Secure Cloud Computing Benefits, Risks and Controls. Authors Mariana Carroll, Alta van der Merwe and Paula Kotzé. September 2011. DOI: 10.1109/ISSA.2011.6027519 · Source: IEEE Xplore Conference: Conference: Information Security South Africa (ISSA), 2011. South Africa. https://www.researchgate.net/publication/224259118_Secure_cloud_computing_Benefits_risks_and_controls
[15] Article: Cloud Computing and Computing Evolution. AuthorsMarkus Böhm,Stefanie Leimeister,Christoph Riedl,Helmut Krcmar. January 2011. from IEEE Xplore. 978-0-7695-3840-2/09 $26.00 © 2009 IEEE. DOI 10.1109/CLOUD.2009.6. Germany. https://www.researchgate.net/publication/268011245_Cloud_Computing_and_Computing_Evolution
[16] Journal: Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review. Author Sumit Goyal. I.J. Computer Network and Information Security, 2014, 3, 20-29 Published Online February 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.03.03. India. http://www.mecs-press.org/ijcnis/ijcnis-v6-n3/IJCNIS-V6-N3-3.pdf
[17] Conference: SaaAS – The Mobile Agent based Service for Cloud Computing in Internet Environment. Authors Gaoyun Chen, Jun Lu and Jian Huang, Zexu Wu. Sixth International Conference on Natural Computation, ICNC 2010, pp. 2935-2939, IEEE, Yantai, Shandong, 2010. ISBN: 978-1-4244-5958-2. China. https://ieeexplore.ieee.org/abstract/document/5582438/
[18] IEEE International Conference:Cloud Computing: Issues and Challenges. Authors Tharam Dillon, Chen Wu and Elizabeth Chang. (2010). In: 2010. 24th IEEE International Conference on Advanced Information Networking and Applications. [Online]. 2010, IEEE, pp. 27–33. Australia. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5474674
[19] Article: Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs). Author Ravi Seethamraju. Information Systems Frontiers. 17 (3). p.pp. 475–492. Published 27th May 2014. Australia. http://www.academia.edu/18892212/Adoption_of_Software_as_a_Service_SaaS_ERP_systems_in_SMEs
[20] Conference: Study on advantages and disadvantages of Cloud Computing - the advantages of Telemetry Applications in the Cloud. Authors AncaApostu, Florina Puican, GeaninaUlaru, George Suciu and GyorgyTodoran. International Conference; 13th, Applied computer science; 2013; Morioka City, Japan in Applied computer science; 118-123. ISBN: 978-1-61804-179-1. Romania. https://pdfs.semanticscholar.org/da62/49af5e0df8ed36334b34c2f1010ed19c53f4.pdf
[21] Journal: A Brief Survey on Architecture, Challenges & Security Benefit in Cloud Computing. Authors Ajith Singh. N, Vasanthi.V, M. Hemalatha. International Journal of Information and Communication Technology Research, vol. 2, 2012. India. http://esjournals.org/journaloftechnology/archive/vol2no2/vol2no2_2.pdf
[22] Paper: Cloud Computing Building a Framework for Successful transition, http://www.gtsi.com/cms/documents/WhitePapers/Cloud-Computing.pdf
[23] Journal: Analysis of Data Confidentiality Techniques in Cloud Computing. Authors Ms. Mayuri R. Gawande, and Mr. Arvind S. Kapse. International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 169-175. India. https://www.ijcsmc.com/docs/papers/March2014/V3I3201433.pdf
[24] The Cloud - Changing the Business Ecosystem. Authors Kumar Parakala and EMA Pradeep Udhas. © 2011 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative(“KPMG International”), a Swiss entity. All rights reserved. India. https://www.scribd.com/document/99602507/The-Cloud-Changing-the-Business-Ecosystem
[25] The Cloud - Changing the Business Ecosystem. Authors Kumar Parakala and EMA Pradeep Udhas. © 2011 KPMG, an Indian Partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative(“KPMG International”), a Swiss entity. All rights reserved. India. https://www.scribd.com/document/99602507/The-Cloud-Changing-the-Business-Ecosystem
[26] Survey: The Cloud in 2017: Trends in Security, Author Riley Panko, July 18, 2017. https://clutch.co/cloud/resources/cloud-computing-security-survey-2017
[27] Conceptual Paper: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Prepared by the Cloud Security Alliance December 2009. Authors Jerry Archer, Alan Boehme, Dave Cullinane, Paul Kurtz, Nils Puhlmann and Jim Reavis. USA. https://cloudsecurityalliance.org/csaguide.pdf
[28] Conference: Security Prospects through Cloud Computing by Adopting Multiple Clouds. Authors Meiko Jensen, JorgSchwenk , Jens-Matthias Bohli, Nils Gruschka and Luigi Lo Iacono. 2011 IEEE 4th International Conference on Cloud Computing. 978-0-7695-4460-1/11 $26.00 © 2011 IEEE DOI 10.1109/CLOUD.2011.85. Germany. https://pdfs.semanticscholar.org/0f8f/7cbea317a1850b871256fd5f82593ab0b0b0.pdf
[29] Journal:. Factors Affecting Cloud Computing Adoption in a Developing Country - Ghana: Using Extended Unified Theory of Acceptance and Use Of Technology (UTAUT2) Model Authors Rebecca AdwoaAmponsah, Joseph KobinaPanford and James Ben Hayfron-Acquah. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056, p-ISSN: 2395-0072, Volume: 03 Issue: 11,| Nov -2016. Ghana. Pp. 59-76. https://www.irjet.net/archives/V3/i11/IRJET-V3I1109.pdf
[30] Journal: Brief Review on Cloud Computing. Author Vijay Kumar. International Journal of Computer Science and Mobile Computing, Vol.5 Issue.9, September- 2016, pg. 01-05. India. https://pdfs.semanticscholar.org/6cee/0bf3cf5400dc3211c9a4795dda6b1239a4db.pdf
[31] Data Remanence, https://en.wikipedia.org/wiki/Data_remanence
[32] CSA - Cloud Security Alliance Warns Providers of „The Notorious Nine? Cloud Computing Top Threats in 2013. https://cloudsecurityalliance.org/media/press-releases/ca-warns-providers-of-the-notorious-nine-cloud-computing-top-threats-in-2013/
[33] 2011 Data Breach Investigations Report. Authors Wade Baker, Alexander Hutton, C. David Hylender, Joseph Pamula, Ph.D., Christopher Porter and Marc Spitler. A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit. https://citadel-information.com/wp-content/uploads/2010/12/2011-data-breach-investigations-report-verizon.pdf
[34] Journal: Security and Authentication and Access on Data Transfer under the Cloud computing by using key, By Saeed M. HashimM.Sc (Computer Science) ALqasim Green University, Iraq. International Journal of Advances in Computer Science and Technology, Volume 4 No.6, June 2015, ISSN 2320 – 2602. Iraq. http://www.warse.org/IJACST/static/pdf/file/ijacst01462015.pdf
[35] Journal: Benefits And Challenges Of The Adoption Of Cloud Computing In Business. Authors Colin Ting Si Xue and Felicia Tiong Wee Xin. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 6, No. 6. December 2016 DOI: 10.5121/ijccsa.2016.6601. Malaysia. http://aircconline.com/ijccsa/V6N6/6616ijccsa01.pdf
[36] Journal: Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. Authors Sultan Aldossary and William Allen, International Journal of Advanced Computer Science and Applications, Vol. 7, 2016. USA. https://thesai.org/Downloads/Volume7No4/Paper_64-Data_Security_Privacy_Availability_and_Integrity.pdf
[37] CSA - Top Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010. Authors Dan Hubbard, Websence Michael Sutton and Zscaler. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[38] Journal: Data Location in Cloud Computing. Authors Puneet Kumar, Harwant Singh Arri. International Journal for Science and Emerging Technologies with Latest Trends, 5(1): 24-27 (2013). India. http://www.ijsett.com/images/Paper(3)24-27.pdf
[39] Conference: Saas Authentication Middleware For Mobile Consumers Of IaaS Cloud. Authors R. Lomotey and R. Deters. In Services (SERVICES), 2013 IEEE Ninth World Congress on, pp. 448–455, June 2013. Canada. https://ieeexplore.ieee.org/document/6655734/
[40] Conference: Integrating trust with cryptographic role-based access control for secure cloud data storage. Authors Lan Zhou, Vijay Varadharajan, and Michael Hitchens . In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 560–569, July 2013. Australia. https://ieeexplore.ieee.org/document/6680887/
[41] Conference: X.509 authentication and authorization in fermi cloud. Authors Hyunwoo Kim and Steven C. Timm. In Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on, pp. 732–737, Dec 2014. USA. http://lss.fnal.gov/archive/2014/conf/fermilab-conf-14-469-cd.pdf
[42] Conference: A Multi-Tenant RBAC Model for Collaborative Cloud Services. Authors Bo Tang, Qi Li and Ravi Sandhu. 2013 Eleventh Annual Conference on Privacy, Security and Trust (PST) 978-1-4673-5839-2/13/$31.00 ©2013 IEEE 229. USA. http://www.profsandhu.com/cs6393_s16/Tang-etal-2013b.pdf
[43] Paper: Identity-Based Authentication for Cloud Computing. Authors Hongwei Li, Yuanshun Dai, Ling Tian, and Haomiao Yang. In Cloud Computing (M. Jaatun, G. Zhao, and C. Rong, eds.), vol. 5931 of Lecture Notes in Computer Science, pp. 157–166, Springer Berlin Heidelberg, 2009. https://pdfs.semanticscholar.org/47e9/fa09ada6564e9611bcd6de488999d46bc1d4.pdf
[44] Conference: Integral federated identity management for cloud computing. Authors MaiconStihler, Altair OlivoSantin, Arlindo L. Marcon Jr. and Joni da Silva Fraga. In New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, pp. 1–5, May 2012. Brazil. https://secplab.ppgia.pucpr.br/files/papers/2012-1.pdf
[45] Article: Cloud Federations in Contrail. Authors Emanuele Carlini, Massimo Coppola, Patrizio Dazzi, Laura Ricci and Giacomo Righetti. vol. 7155 of Lecture Notes in Computer Science, pp. 159–168, Springer Berlin Heidelberg, 2012. Italy. https://pdfs.semanticscholar.org/ab72/b755ca6ba237af1bb15910569b2c723dd2e1.pdf
[46] Conference: Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth. Authors Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall and Carlos B. Westphall. ICN 2012 : The Eleventh International Conference on Networks. Copyight (c) IARIA, 2012. ISBN: 978-1-61208-183-0. Brazil. http://www.inf.ufsc.br/~carlos.westphall/s4.pdf
[47] Article: Towards Trusted Cloud Computing. Authors Nuno Santos, Krishna P. Gummadi and Rodrigo Rodrigues. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud?09, (Berkeley, CA, USA), USENIX Association, 2009. https://people.mpi- sws.org/~gummadi/papers/trusted_cloud.pdf
[48] Article: Terra: A Virtual Machine-Based Platform for Trusted Computing. Authors Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum and Dan Bone. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ?03, (New York, NY, USA), pp. 193–206, ACM, 2003. USA. https://suif.stanford.edu/papers/sosp03-terra.pdf
[49] Article: Fuzzy Authorization For Cloud Storage. Authors Shasha Zhu and Guang Gong. Cloud Computing, IEEE Transactions on, vol. 2, pp. 422–435, Oct 2014. Canada. http://cacr.uwaterloo.ca/techreports/2014/cacr2014-16.pdf
[50] Conference: Enabling Security In Cloud Storage SLAs With CloudProof. Authors Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li Zhuang. in Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC?11, (Berkeley, CA, USA), pp. 31–31, USENIX Association, 2011. https://pdfs.semanticscholar.org/0247/35cc8a42fe4d9fa7c4c1c097b1f7a71286a3.pdf
[51] Conference: Hypervisor-Based Cloud Intrusion Detection System. Authors Jason Nikolai and Yong Wang. in Computing, Networking and Communications (ICNC), 2014 International Conference on, pp. 989–993, Feb 2014. USA. https://ieeexplore.ieee.org/document/6785472/
[52] Conference: Cloud Monitor: Monitoring Applications In Cloud. Authors Manu Anand. In Cloud Computing. in Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1–4, Oct 2012. India. https://ieeexplore.ieee.org/document/6354603/
[53] Conference: Scalable Monitoring System For Clouds. Authors Andre Brinkmann, Christoph Fiehe, Anna Litvina, Ingo Lück, Lars Nagel, Krishnaprasad Narayanan, Florian Ostermair and Wolfgang Thronicke. in Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC ?13, (Washington, DC, USA), pp. 351–356, IEEE Computer Society, 2013. Germany. http://easi-clouds.eu/wp-content/uploads/2013/11/ScalableMonitoring_ITAAC_2013_JGU_Materna_Atos.pdf
[54] Conference: Accountability For Cloud And Other Future Internet Services. Authors S. Pearson, V. Tountopoulos, D. Catteddu, M. Sudholt, R. Molva, C. Reich, S. Fischer-Hubner, C. Millard, V. Lotz, M. Jaatun, R. Leenes, C. Rong, and J. Lopez. in Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on, pp. 629–632, Dec 2012. https://pdfs.semanticscholar.org/f436/e32b02943f104fb573b63c4e4c08d49bfca9.pdf
[55] Conference: Managing Data Access On Clouds: A Generic Framework For Enforcing Security Policies. Authors Cristina Basescu, Alexandra Carpen-Amarie, CatalinLeordeanu, AlexandruCostan and Gabriel Antoniu. in Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pp. 459–466, March 2011. https://hal.inria.fr/inria-00536603/file/GenericFrameworkForEnforcingSecurityPolicies.pdf
[56] Article: Policy Enforcement Framework For Cloud Data Management. Authors Kevin W. Hamlen, LalanaKagal and Murat Kantarcioglu. IEEE Data Eng. Bull., vol. 35, no. 4, pp. 39–45, 2012. USA. https://www.utdallas.edu/~hamlen/hamlen12deb.pdf
[57] Conference: Policy Management As A Service: An Approach To Manage Policy Heterogeneity In Cloud Computing Environment. Authors Hassan Takabi and James B. D. Joshi. in System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 5500–5508, Jan 2012. USA. https://pdfs.semanticscholar.org/410e/a46d04f251d2f16129fd1e35f037a7010bd8.pdf
[58] Journal: A Survey Based Investigation for Cloud Computing Adoption Internationally. Authors Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley, Dr. Mary Garvey and Dr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 4 - April 2019. ISSN: 2231-2803 United Kingdom. http://www.ijcttjournal.org Page 106
[59] Journal: A Systematic Literature Review of Factors Affecting Cloud Computing Adoption Internationally. Authors Raja M. Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey andDr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 3 - March 2019. ISSN: 2231-2803 United Kingdom. http://www.ijcttjournal.org Page 41
[60] Journal: Factors Analysis of the Cloud Computing Adoption in England. Authors Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley, Dr. Mary Garvey and Dr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 6 - June 2019. ISSN: 2231-2803 United Kingdom. http://ijcttjournal.org/archives/ijctt-v67i6p103

Keywords
Benefits, Challenges, Cloud Computing, Cloud, Computing, Internet, IT, Adoption, Technology.