Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach

Abstract

As cloud computing continues to gain more momentum in the IT industry, more issues and challenges are being reported by academics and practitioners. In this paper, we aim to attain an understanding of the types of issues and challenges that have been emerging over the past five years and identify gaps between the focus of the literature and what practitioners deem important. A systematic literature review as well as interviews with experts have been conducted to answer our research questions. Our findings suggest that researchers have been mainly focusing on issues related to security and privacy, infrastructure, and data management. Interoperability across different service providers has also been an active area of research. Despite the significant overlap between the topics being discussed in the literature and the issues raised by the practitioners, our findings show that some issues and challenges that practitioners consider important are understudied such as software related issues, and challenges pertaining to learning fast-evolving technologies.

Share and Cite:

Y. Ghanam, J. Ferreira and F. Maurer, "Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach," Journal of Software Engineering and Applications, Vol. 5 No. 11A, 2012, pp. 923-937. doi: 10.4236/jsea.2012.531107.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] National Institute of Standard and US Department of Commerce Technology, “The NIST Definition of Cloud Computing,” 12 October 2012. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[2] B. Kitchenham, “Procedures for Performing Systematic Reviews”, Technical Report TR/SE-0401, Keele University, Lyme, and Technical Report 0400011T.1, NICTA, 2004.
[3] A. Greenberg, J. Hamilton, D. A. Maltz and P. Patel, “The Cost of a Cloud: Research Problems in Data Center Networks,” SIGCOMM Computer Communication Review, Vol. 39, No. 1, 2008, pp. 68-73. doi:10.1145/1496091.1496103
[4] H. Lim, S. Babu, J. Chase and S. Parekh, “Automated Control in Cloud Computing: Challenges and Opportunities,” Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, New York, 19 June 2009, pp. 13-18. doi:10.1145/1555271.1555275
[5] A. Khalid and H. Mujtaba, “Data Processing Issues in Cloud Computing,” Proceedings of the 2nd International Conference on Machine Vision (ICMV '09), Dubai, 28-30 December 2009, pp. 301-304.
[6] D. Bernstein and E. Ludvigson, “Networking Challenges and Resultant Approaches for Large Scale Cloud Construction,” Proceedings of the 2009 Workshops at the Grid and Pervasive Computing Conference (GPC '09), 4-8 May 2009, Geneva, pp. 136-142.
[7] H. J. La, S. W. Choi and S. D. Kim, “Technical Challenges and Solution Space for Developing SaaS and Mash-Up Cloud Services,” Proceedings of the 2009 IEEE International Conference on e-Business Engineering (IC-EBE '09), Macau, 21-23 October 2009, pp. 359-364.
[8] R. Buyya, R. Ranjan and R. N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities,” International Conference on High Performance Computing & Simulation, HPCS '09, Leipzig, 21-24 June 2009, pp. 1-11
[9] H. Motahari Nezhad, B. Stephenson and S. Singhal, “Outsourcing Business to Cloud Computing Services: Opportunities and Challenges,” IEEE Internet Computing, Special Issue on Cloud Computing, 6 February 2009. http://www.hpl.hp.com/techreports/2009/HPL-2009-23.html
[10] L. Gu and S.-Ch. Cheung, “Constructing and Testing Privacy-Aware Services in a Cloud Computing Environment: Challenges and Opportunities,” Proceedings of the First Asia-Pacific Symposium on Internetware (Internetware '09), Beijing, 15-16 October 2009.
[11] M. Jensen, J. Schwenk, N. Gruschka and L. Iacono, “On Technical Security Issues in Cloud Computing,” Proceedings of the 2009 IEEE International Conference on Cloud Computing (CLOUD '09), Bangalore, 21-25 September 2009, pp. 109-116.
[12] B. R. Kandukuri, V. R. Paturi and A. Rakshit, “Cloud Security Issues,” IEEE International Conference on Services Computing, Bangalore, 21-25 September 2009, pp. 517-520.
[13] W. Kim, S. D. Kim, E. Lee and S. Y. Lee, “Adoption Issues for Cloud Computing,” Proceedings of the 11th International Conference on Information Integration and Web-Based Applications & Services (iiWAS '09), 14-16 December 2009, Kuala, pp. 3-6.
[14] L. J. Mei, Z. Y. Zhang and W. K. Chan, “More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective,” Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC '09), Seattle, 20-24 July 2009, pp. 525-530.
[15] Q. Zhang, L. Cheng and R. Boutaba, “Cloud Computing: State-of-the-Art and Research Challenges,” Journal of Internet Services and Applications, Vol. 1, No. 1, 2010, pp. 7-18. doi:10.1007/s13174-010-0007-6
[16] D. Agrawal, A. El Abbadi, S. Antony and S. Das, “Data Management Challenges in Cloud Computing Infrastructures,” Proceedings of the 6th International Conference on Databases in Networked Information Systems (DNIS' 10), Aizu-Wakamatsu, 29-31 March 2010, pp. 1-10.
[17] M. A. Sakka, B. Defude and J. Tellez, “Document Provenance in the Cloud: Constraints and Challenges,” Proceedings of the 16th EUNICE/IFIP WG 6.6 Conference on Networked Services and Applications: Engineering, Control and Management (EUNICE'10), Trondheim, 20-30 June 2010, pp. 107-117.
[18] P. Goyal, “Enterprise Usability of Cloud Computing Environments: Issues and Challenges,” Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE '10), Larissa, 28-30 June 2012, pp. 54-59.
[19] H. Chang and E. Choi, “Challenges and Security in Cloud Computing,” Communication and Networking, Communications in Computer and Information Science, Vol. 120, 2010, pp. 214-217.
[20] G. L. Myoungand N. Crespi, “Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution,” Proceedings of the 4th International Conference on Leveraging Applications of Formal Methods, Verification, and Validation, Amirandes, 18-20 October 2010, pp. 399-410.
[21] J. Q. Tan, X. H. Pan, E. Marinelli, S. Kavulya, R. Gandhi and P. Narasimhan, “Kahuna: Problem Diagnosis for Mapreduce-Based Cloud Computing Environments,” IEEE Network Operations and Management Symposium (NOMS), Osaka, 19-23 April 2010, pp. 112-119.
[22] Z. Yusoh and M. Tang, “A Penalty-Based Genetic Algorithm for the Composite SaaS Placement Problem in the Cloud,” Proceeding of the 2010 IEEE World Congress on Computational Intelligence, Barcelona, 18 - 23 July 2010, pp. 600-607.
[23] Z. I. M. Yusoh and M. L. Tang, “A Cooperative Coevolutionary Algorithm for the Composite SaaS Placement Problem in the Cloud,” Proceedings of the 17th International Conference on Neural Information Processing: Theory and Algorithms (ICONIP'10), Sydney, 9 March 2010, pp. 618-625.
[24] Y. Pan, S. Maini and E. Blevis, “Framing the Issues of Cloud Computing & Sustainability: A Design Perspective,” Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science (CLOUDCOM '10), Indianapolis, 30 November -3 December 2010, pp. 603-608.
[25] M. Mathur, “Elucidation of Upcoming Traffic Problems in Cloud Computing,” Recent Trends in Networks and Communications, Communications in Computer and Information Science, Vol. 90, 2010, pp. 68-79.
[26] A. Khalid, “Cloud Computing: Applying Issues in Small Business,” International Conference on Signal Acquisition and Processing, Bangalore, 9-10 February 2010, pp. 278-281. doi:10.1109/ICSAP.2010.78
[27] Y. Wei and M. Blake, “Service-Oriented Computing and Cloud Computing: Challenges and Opportunities,” IEEE Internet Computing, Vol. 14, No. 6, 2012, pp. 72-75. doi:10.1109/MIC.2010.147
[28] P. Mathur and N. Nishchal, “Cloud Computing: New Challenge to the Entire Computer Industry,” 1st International Conference on Parallel Distributed and Grid Computing (PDGC), Solan, 28 - 30 October 2010, pp. 223-228.
[29] L. M. Kaufman, “Can Public-Cloud Security Meet Its Unique Challenges?” IEEE Security & Privacy, Vol. 8, No. 4, 2010, pp. 55-57. doi:10.1109/MSP.2010.120
[30] C. Tsai, U. Lin, A. Chang and C. Chen, “Information Security Issue of Enterprises Adopting the Application of Cloud Computing,” 6th International Conference on Networked Computing and Advanced Information Management (NCM), Seoul, 16-18 August 2010, pp. 645-649.
[31] A. Kim, J. McDermott and M. Kang, “Security and Architectural Issues for National Security Cloud Computing,” Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Genova, 21-25 June 2010, pp. 21-25.
[32] D. Wyld, “Risk in the Clouds? Security Issues Facing Government Use of Cloud Computing,” Innovations in Computing Sciences and Software Engineering, Cape Town, 5 May 2010, pp. 7-12. doi:10.1007/978-90-481-9112-3_2
[33] S. Ahmed and M. Y. A. Raja, “Tackling Cloud Security Issues and Forensics Model,” High-Capacity Optical Networks and Enabling Technologies (HONET), Cairo, 19- 21 December 2010, pp. 190-195.
[34] R. E. Johnson, “Cloud Computing Security Challenges and Methods to Remotely Augment a Cloud’s Security Posture,” 2010 International Conference on Information Society (i-Society), London, 28-30 June 2010, pp. 179-181.
[35] P. Kresimir and H. Zeljko, “Cloud Computing Security Issues and Challenges,” MIPRO, Proceedings of the 33rd International Convention, Opatijapp, 24-28 May 2010, pp. 344-349.
[36] B. Grobauer and T. Schreck, “Towards Incident Handling in the Cloud: Challenges and Approaches,” Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, 4-8 October 2010, pp. 77-86. doi:10.1145/1866835.1866850
[37] H. Takabi, J. Joshi and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, Vol. 8, No. 6, 2010, pp. 24-31. doi:10.1109/MSP.2010.186
[38] T. Dillon, C. Wu and E. Chang, “Cloud Computing: Issues and Challenges,” 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), Perth, 20-23 April 2010, pp. 27-33.
[39] J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan, 10-12 December 2010, pp. 1-3.
[40] S. Pearson and A. Benameur, “Privacy, Security and Trust Issues Arising from Cloud Computing,” IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, 30 November - 3 December 2010, pp. 693-702. doi:10.1109/CloudCom.2010.66
[41] L. Riungu, O. Taipale and K. Smolander, “Research Issues for Software Testing in the Cloud,” Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, 30 November - 3 December 2010, pp. 557-564.
[42] T. Forell, D. Milojicic and V. Talwar, “Cloud Management: Challenges and Opportunities,” IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum, Anchorage 16-20 May 2011, pp. 881-889.
[43] K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities,” World Wide Web, Vol. 15, No. 4, 2012, pp. 409-428. doi:10.1007/s11280-011-0138-0
[44] B. Suleiman, S. Sakr, R. Jeffrey and A. Liu, “On Understanding the Economics and Elasticity Challenges of Deploying Business Applications on Public Cloud Infrastructure,” Internet Services and Applications, 2012, in press.
[45] K. Wakunuma, B. Stahl and V. Ikonen, “Cloud Computing as an Emerging Technology and Its Associated Ethical Issues: Experiences That May Be Shared between Europe and Africa,” IST-Africa Conference Proceedings, Botswana, 11-13 May 2011, pp. 1-10.
[46] H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, T. Sun and Y. Zhou, “Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems,” IEEE International Conference on Services Computing (SCC), Washington DC, 4-9 July 2011, pp. 418-425.
[47] H. Mi, H. Wang, G. Yin, H.Cai, Q. Zhou, and T. Sun. 2011. Performance problems online detection in cloud computing systems via analyzing request execution paths. Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshop, Hong Kong, 27-30 June 2011, pp. 135-139.
[48] B. Radojevic and M. Zagar, “Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments,” MIPRO, 2011 Proceedings of the 34th International Convention, Opatija, 23-27 May 2011, pp. 416-420.
[49] T. Kusaka, T. Okuda, T. Ideguchi and X. Tian, “Queuing Theoretic Approach to Server Allocation Problem in Time-Delay Cloud Computing Systems,” Proceedings of the 23rd International Teletraffic Congress, San Francisco, 6-8 September 2011, pp. 310-311.
[50] X. Sun, B. Gao, Y. Zhang, W. An, H. Cao, C. Guo and W. Sun, “Towards Delivering Analytical Solutions in Cloud: Business Models and Technical Challenges,” Proceedings of the 2011 IEEE 8th International Conference on e-Business Engineering (ICEBE '11), Beijing, 19-21 October, 2011, pp. 347-351.
[51] S. S. Qureshi, T. Ahmad, K. Rafique and Shuja-ul-islam, “Mobile Cloud Computing as Future for Mobile Applications: Implementation Methods and Challenging Issues,” IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, 15-17 September 2011, pp. 467-471. doi:10.1109/CCIS.2011.6045111
[52] S. Pohorec and M. Zorman, “The Challenges of the Move from the Desktop to the Cloud,” Proceedings of the ITI 33rd International Conference on Information Technology Interfaces (ITI), Cavtat, 27-30 June 2011, pp. 119-124.
[53] J. O. Fito and J. Guitart, “Initial Thoughts on Business-Driven IT Management Challenges in Cloud Computing Providers,” IFIP/IEEE International Symposium on Integrated Network Management (IM), Dublin, 23-27 May 2011, pp. 1070-1073
[54] R. Buyya, S. Garg and R. Calheiros, “SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions,” Proceedings of the 2011 International Conference on Cloud and Service Computing, Hong Kong, 12-14 December 2011, pp. 1-10.
[55] P. T. Endo, A. V. de A. Palhares, N. N. Pereira, G. E. Goncalves, D. Sadok, J. Kelner, B. Melander and J. Mangs, “Resource Allocation for Distributed Cloud: Concepts and Research Challenges,” IEEE Network, Vol. 25, No. 4, 2011, pp. 42-46. doi:10.1109/MNET.2011.5958007
[56] A. Waqar, A. Raza and H. Abbas, “User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM '11), 16-18 November 2011, Changsha, pp. 927-932.
[57] K. Venugopal and L. Patnaik, “Cloud Computing Privacy Issues and User-Centric Solution,” Communications in Computer and Information Science, Vol. 157, 2011, pp. 448-456.
[58] B. Hay, K. Nance and M. Bishop, “Storm Clouds Rising: Security Challenges for IaaS Cloud Computing,” 44th Hawaii International Conference on System Sciences, Koloa, 4-7 January 2011, pp. 1-7. doi:10.1109/HICSS.2011.386
[59] E. Mathisen, “Security Challenges and Solutions in Cloud Computing,” Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference, Daejeon, 31 May - 3 June 2011, pp. 208-212.
[60] B. Lagesse, “Challenges in Securing the Interface between the Cloud and Pervasive Systems,” IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM), Seattle, 21-25 March 2011, pp. 106-110. doi:10.1109/PERCOMW.2011.5766850
[61] P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub and D. Zeghlache, “Challenges for Cloud Networking Security,” Mobile Networks and Management, Social Informatics and Telecommunications Engineering, Springer, New York, 2010.
[62] A. Verma and S. Kaushal, “Cloud Computing Security Issues and Challenges: A Survey,” Proceeding of Springer International Conference on Advances in Computing and Communication, Kochi, 22-24 July 2011, pp. 445-454.
[63] S. Pardeep, S. Sood, et al., “Security Issues in Cloud Computing,” Communications in Computer and Information Science, Vol. 169, 2011, pp. 36-45. doi:10.1007/978-3-642-22577-2_5
[64] J. Wang and S. Mu, “Security Issues and Countermeasures in Cloud Computing,” IEEE International Conference on Grey Systems and Intelligent Services (GSIS), pp. Nanjing, 15-18 September 2011, pp. 843-846. doi:10.1109/GSIS.2011.6043978
[65] A. Behl, “Emerging Security Challenges in Cloud Computing: An Insight to Cloud Security Challenges and Their Mitigation,” World Congress on Information and Communication Technologies (WICT), Mumbai, 11-14 December 2011, pp. 217-222. doi:10.1109/WICT.2011.6141247
[66] X. Tan and B. Ai, “The Issues of Cloud Computing Security in High-Speed Railway,” International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), Harbin, 12-14 August 2011, pp. 4358-4363. doi:10.1109/EMEIT.2011.6023923
[67] J. C. Roberts and W. Al-Hamdani, “Who Can You Trust in the Cloud? A Review of Security Issues within Cloud Computing,” Proceedings of the 2011 Information Security Curriculum Development Conference, Kennesaw, 7-9 October 2011, pp. 15-19. doi:10.1145/2047456.2047458
[68] S. Tanimoto, M. Hiramoto, M. Iwashita, H. Sato and A. Kanai, “Risk Management on the Security Problem in Cloud Computing,” First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), Jeju, 23-25 May 2011, pp.147-152.
[69] B. Dhinesh, K. Venkata, Z. Mohammed, et al., “An Analysis of Security Related Issues in Cloud Computing,” Communications in Computer and Information Science, Vol. 168, No. 2, 2011, pp. 180-190.
[70] W. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, 44th Hawaii International Conference on System Sciences, Koloa, 4-7 January 2011. doi:10.1109/HICSS.2011.103
[71] S.-U. Lar, X. F. Liao and S. A. Abbas, “Cloud Computing Privacy & Security Global Issues, Challenges, & Mechanisms,” 6th International ICST Conference on Communications and Networking in China, Harbin, 17-19 August, 2011, pp. 1240-1245.
[72] M. Morshed, M. Islam, M. Huq, M. Hossain and M. Basher, “Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues,” Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Barcelona, 26-28 October 2011, pp. 83-88.
[73] Z. Wang, “Security and Privacy Issues within the Cloud Computing,” International Conference on Computational and Information Sciences (ICCIS), Chengdu, 21-23, October, 2011, pp. 175-178. doi:10.1109/ICCIS.2011.247
[74] N. Poolsappasit, V. Kumar, S. Madria and S. Chellappan, “Challenges in Secure Sensor-Cloud Computing,” Proceedings of the 8th VLDB International Conference on Secure Data Management (SDM'11), Seattle, 2 September 2011, pp. 70-84.
[75] P. Hemant, N. P. Chawande, A. Sonule, H. Wani, “Development of Servers in Cloud Computing to Solve Issues Related to Security and Backup,” IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, 15-17 September 2011, pp. 158-163. doi:10.1109/CCIS.2011.6045052
[76] Z. Mahmood, “Data Location and Security Issues in Cloud Computing,” International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), Tirana, 7-9 September 2011, pp. 49-54. doi:10.1109/EIDWT.2011.16
[77] R. Liu and I. Wassell, “Opportunities and Challenges of Wireless Sensor Networks Using Cloud Services,” Proceedings of the Workshop on Internet of Things and Service Platforms, Tokyo, 6-9 December 2011, 7 pages.
[78] K. Rafique, A. W. Tareen, M. Saeed, J. Z. Wu and S. S. Qureshi, “Cloud Computing Economics Opportunities and Challenges,” 4th IEEE International Conference on Broadband Network and Multimedia Technology (ICBNMT), Shenzhen, 28-30 October 2011, pp. 401-406. doi:10.1109/ICBNMT.2011.6155965
[79] X.-P. Zheng, “Study on the Opportunities and Challenges of the Cloud Computing for Chinese Medium-Sized and Small Enterprises,” International Conference on E-Business and E-Government (ICEE), Shenzhen, 28-30 October 2011.
[80] D. Ardagna, B. Panicucci and M. Passacantando, “A Game Theoretic Formulation of the Service Provisioning Problem in Cloud Systems,” Proceedings of the 20th International Conference on World Wide Web, Hyderabad, 28 March - 1 April 2011, pp. 177-186. doi:10.1145/1963405.1963433
[81] L. Savu, “Cloud Computing: Deployment Models, Delivery Models, Risks and Research Challenges,” International Conference on Computer and Management, Wuhan, 19-21 May 2011, pp. 1-4.
[82] J. Araujo, R. Matos, P. Maciel and R. Matias, “Software Aging Issues on the Eucalyptus Cloud Computing Infrastructure,” IEEE International Conference on Systems, Man, and Cybernetics (SMC), Anchorage, 9-12 October 2011, pp. 1411-1416.
[83] S. Patidar, D. Rane and P. Jain, “Challenges of Software Development on Cloud Platform,” World Congress on Information and Communication Technologies (WICT), Mumbai, 11-14 December 2011, pp. 1009-1013. doi:10.1109/WICT.2011.6141386
[84] P. Mohagheghi and T. S?ther, “Software Engineering Challenges for Migration to the Service Cloud Paradigm: Ongoing Work in the REMICS Project,” IEEE World Congress on Services (SERVICES), Washington DC, 4-9 July 2011, pp. 507-514. doi:10.1109/SERVICES.2011.26
[85] I. Neamtiu and T. Dumitras, “Cloud Software Upgrades: Challenges and Opportunities,” International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, Williamsburg, 26 September 2011, pp. 1-10. doi:10.1109/MESOCA.2011.6049037
[86] M. Khorshed, A. Ali and S. Wasimi, “Trust Issues That Create Threats for Cyber Attacks in Cloud Computing,” IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), Tainan, 7-9 December 2011, pp. 900-905.
[87] P. Harsh, Y. Jegou, R. Cascella and C. Morin, “Contrail Virtual Execution Platform Challenges in Being Part of a Cloud Federation,” Proceedings of the 4th European Conference on towards a Service-Based Internet (ServiceWave'11), Poznan, 26-28 October 2011, pp. 50-61.
[88] O. Min, C. Park, J. Lee, J. Cho and H. Kim, “Issues on Supporting Public Cloud Virtual Machine Provisioning and Orchestration,” 13th International Conference on Advanced Communication Technology, Phoenix Park, 13-16 February 2011, pp. 270-273.
[89] E. Elmroth, J. Tordsson, F. Hernández, A. Ali-Eldin, P. Svard, M. Sedaghat and W. Li, “Self-Management Challenges for Multi-Cloud Architectures,” Proceedings of the 4th European Conference on towards a Service-Based Internet, Poznan, 26-28 October 2011, pp. 8-49.
[90] D. Nguyen, F. Lelli, M. Papazoglou and W. van den Heuvel, “Issue in Automatic Combination of Cloud Services,” IEEE 10th International Symposium on Parallel and Distributed Processing with Applications, Leganés, 10-13 July 2012, pp. 487-493.
[91] R. Moreno-Vozmediano, R. Montero and I. Llorente, “Key Challenges in Cloud Computing to Enable the Future Internet of Services,” IEEE Internet Computing, 18 May 2012. http://doi.ieeecomputersociety.org/10.1109/MIC.2012.69
[92] C. Pham, P. Cao, Z. Kalbarczyk and R. Iyer, “Toward a High Availability Cloud: Techniques and Challenges,” IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W), Boston, 25- 28 June 2012, pp. 1-6.
[93] H. Mi, H. Wang, G. Yin, H. Cai; Q. Zhou and T. Sun, “Performance Problems Diagnosis in Cloud Computing Systems by Mining Request Trace Logs,” IEEE Network Operations and Management Symposium, Maui, 16-20 April 2012, pp. 893-899.
[94] M. Tang, M. Yusoh and Z. Izzah, “A Parallel Cooperative Co-Evolutionary Genetic Algorithm for the Composite SaaS Placement Problem in Cloud Computing,” Lecture Notes in Computer Science, Springer, Berilin, 2012, pp. 225-234.
[95] B. Kantarci and H. T. Mouftah, “Minimizing the Provisioning Delay in the Cloud Network: Benefits, Overheads and Challenges,” IEEE Symposium on Computers and Communications (ISCC), Cappadocia, 1-4 July 2012, pp. 806-811.
[96] R. Patibandla, S. Kurra and N.Mundukur, “A study on Scalability of Services and Privacy Issues in Cloud Computting,” Proceedings of the 8th International Conference on Distributed Computing and Internet Technology (ICDCIT'12), Bhubaneswar, 2-4 February 2012, pp. 212-230.
[97] T. Hobfeld, R. Schatz, M. Varela and C. Timmerer, “Challenges of QoE Management for Cloud Applications,” IEEE Communications Magazine, Vol. 50, No. 4, 2012, pp. 28-36. doi:10.1109/MCOM.2012.6178831
[98] P. You, Y. Pen, W. Liu and S. Xue, “Security Issues and Solutions in Cloud Computing,” 32nd International Conference on Distributed Computing Systems Workshops, Macau, 18-21 June 2012, pp. 573-577.
[99] W. Liu, “Research on Cloud Computing Security Problem and Strategy,” 2nd International Conference on Consumer Electronics, Communications and Networks, Yi-Chang, 21-23 April 2012, pp. 1216-1219.
[100] H. Yu, N. Powell, D.Stembridge and X. Yuan, “Cloud Computing and Security Challenges,” Proceedings of the 50th Annual Southeast Regional Conference, Tuscaloosa, 29-31 March 2012, pp. 298-302.
[101] M. Srinivasan, K. Sarukesi, P. Rodrigues, M. Manoj and P. Revathy, “State-of-the-Art Cloud Computing Security Taxonomies: A Classification of Security Challenges in the Present Cloud Computing Environment,” Proceedings of the International Conference on Advances in Computing, Communications and Informatics, Chennai, 3-5 August 2012, pp. 470-476.
[102] E. Atanassov, T. Gurov and A. Karaivanova, “Security Issues of the Combined Usage of Grid and Cloud Resources,” Proceedings of the 35th International Convention MIPRO, Opatija/Abbazia, 21-25 May 2012, pp. 417-420.
[103] K. Ren, C. Wang and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, Vol. 16, No. 1, 2012, pp. 69-73. doi:10.1109/MIC.2012.14
[104] Y. D. Zhang and Y. S. Zhang, “Cloud Computing and Cloud Security Challenges,” International Symposium on Information Technology in Medicine and Education (ITME), Hokkaido, 3-5 August 2012, pp. 1084-1088.
[105] A. Fauzi, N. Ahmad, T. Herawan and N. Zin, “On Cloud Computing Security Issues,” In: J.-S. Pan, S.-M. Chen and N. T. Nguyen, Eds., ACIIDS, Part II. LNCS, Springer, Heidelberg, 2012, pp. 560-569.
[106] T. Takahashi, G. Blanc, Y. Kadobayashi, D. Fall, H. Hazeyama and S. Matsuo, “Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches,” 2nd Baltic Congress on Future Internet Communications (BCFIC), Vilnius, 25-27 April 2012, pp. 72-79. doi:10.1109/BCFIC.2012.6217983
[107] J. Viega, “Cloud Security: Not a Problem,” IEEE Security & Privacy, Vol. 10, No. 4, 2012, p.3. doi:10.1109/MSP.2012.93
[108] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, 23-25 March 2012, pp. 647-651. doi:10.1109/ICCSEE.2012.193
[109] Y. Jadeja and K. Modi, “Cloud Computing-Concepts, Architecture and Challenges,” International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Kanyakumari, 21-22 March 2012, pp. 877-880. doi:10.1109/ICCEET.2012.6203873
[110] A. Cardoso and P. Sim?es, “Cloud Computing: Concepts, Technologies and Challenges, Virtual and Networked Organizations, Emergent Technologies and Tools,” Vol. 248, Springer, Berlin, 2012, pp. 127-136. doi:10.1007/978-3-642-31800-9_14
[111] S. Dey, “Cloud Mobile Media: Opportunities, Challenges, and Directions,” International Conference on Computing, Networking and Communications (ICNC), Maui, 30 January - 2 February 2012, pp. 929-933. doi:10.1109/ICCNC.2012.6167561
[112] H. Al-Aqrabi, L. Liu, J. Xu, R. Hill, N. Antonopoulos and Y. Z. Zhan, “Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing,” 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, Shenzhen, 11-13 April 2012, pp. 124-129.
[113] C. Brooks, “Amazon’s Early Efforts at Cloud Computing Partly Accidental,” IT Knowledge Exchange, 17 June 2010. http://itknowledgeexchange.techtarget.com/cloud-computing/amazons-early-efforts-at-cloud-computing-partly-accidental/
[114] D. Farber, “The IBM-Google Connection,” CNET News, 12 October 2012. http://news.cnet.com/8301-13953_3-9933714-80.html?tag=nefd.top.
[115] “The Eucalyptus Story,” 12 October 2012. http://www.eucalyptus.com/about/story
[116] B. Rochwerger, J. Caceres, R. Montero, et al., “The RESERVOIR Model and Architecture for Open Federated Cloud Computing,” IBM Journal of Research & Development, Vol. 53, No. 4, 2009. doi:10.1147/JRD.2009.5429058

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.