Study on Challenges, Opportunities and Predictions in Cloud Computing

Full Text (PDF, 499KB), PP.17-27

Views: 0 Downloads: 0

Author(s)

Jitendra Singh 1,*

1. CS Department, Bhagini Nivedita College, University of Delhi-110043, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2017.03.03

Received: 8 Dec. 2016 / Revised: 15 Jan. 2017 / Accepted: 13 Feb. 2017 / Published: 8 Mar. 2017

Index Terms

Cloud challenges, cloud future, cloud opportunity, cloud prediction, security challenges

Abstract

Cloud computing is transforming the way IT is owned and utilized in the present day business scenario. Several predictions by the researchers and analytical enterprises have predicted unprecedented growth for this emerging paradigm. This work is an attempt to analyze the cloud future based on the various reports and predictions published recently. We have explored the various opportunities that will drive the cloud growth. We have also highlighted the effect of cloud in Indian and US market. Significance of the study is validated by conducting the Strength, weakness, opportunity, and Threat (SWOT) analysis. Based on the findings, we have identified the intensity of challenges faced by the various types of cloud deployment model. Correspondingly, we have recommended the critical challenges that need to be addressed first, in order to facilitate the cloud in gaining further momentum.

Cite This Paper

Jitendra Singh, "Study on Challenges, Opportunities and Predictions in Cloud Computing", International Journal of Modern Education and Computer Science(IJMECS), Vol.9, No.3, pp.17-27, 2017. DOI:10.5815/ijmecs.2017.03.03

Reference

[1]Barton, M. (2012). Cloud downtime’s cost: $70M since 2007, give or take. Retrieved October 29,2012, from http://www.wired.com/insights/author/mikeburton.
[2]Bigo, D., Boulet, G., Bowden, C., Carrera, S., Jeandesboz, J, and Scherrer, A.(2012). Fighting cyber crime and protecting privacy in the cloud. DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS. Available at http://www.europarl.europa.eu/RegData/etudes/etudes/join/2012/462509/IPOL-LIBE_ET(2012)462509_EN.pdf.
[3]Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J. & Brandic, I. (2009), ‘Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility’, Future Generation computer systems 25(6), 599–616.
[4]Coleman, C. (2012, September 25). Cloud conversion saves GSA millions. Retrieved from http://gsablogs.gsa.gov/ gsablog/2012/09/25/cloud-conversion-saves-gsa-millions/.
[5]CSA (2010). Top ten threats in cloud computing. Cloud Security Alliance, 2010.
[6]CSA (2013). The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance, 2013.
[7]Cisco (2014). Forecast and Methodology, 2013–2018. Cisco Global Cloud Index
[8]American Power Conversion, Increasing Data Center Efficiency by Using Improved High Density Power
Distribution (2008), www.apcmedia.com/salestools/NRAN-6CN8PK_R1_EN.pdf.
[9]Gartner (2013).Forecast Overview: Public Cloud Services, Worldwide, 2011-2016, 4Q1. Published: 8 February 2013.
[10]Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M. & Pourzandi, M. (2012), ‘A quantitative analysis of current security concerns and solutions for cloud computing’, Journal of Cloud Computing 1(1), 1–18.
[11]Gite, V. (2008). Explain: Five nines (99.999%) computer / network uptime concept. Available at http://www.cyberciti.biz/faq/computer-networkuptime-five-nines-999999/
[12]Hooper, Christopher and Martini, Ben and Choo, Kim-Kwang Raymond. Cloud Computing and Its Implications for Cybercrime Investigations in Australia (October 15, 2013), Computer Law and Security Review 29(2): 152-163, 2013.
[13]http://aws.amazon.com/blogs/aws/aws-data-transfer-price-reduction/
[14]http://googlecloudplatform.blogspot.in/2014/10/Announcing-across-the-board-price-cuts-on-Compute-Engine.html
[15]http://iwgr.org.
[16]JanakiramMSV(2014), "CloudTracker, Fourth-Quarter 2014", technical report, GIGAOM Research, Jan 2015.
[17]Joshi, J. B. D., Bhatti, R., Bertino, E., & Ghafoor, A. (2004). An access control language for multidomain environments. IEEE Internet Computing, 8(6), 40–50. doi:10.1109/MIC.2004.53
[18]Kwang, K., Choo, R.(2013).Trends & issues in crime and criminal justice. Australian Institute of criminology, No. 400 October 2010.
[19]Lin, G., Fu, D., Zhu, J., &Dasmalchi, G. (2009).Cloud computing: IT as a service [IEEE]. IT Professional, 11(2), 10–13. doi:10.1109/MITP.2009.22.
[20]Liu, Y., Sun, Y. L., Ryoo, J., Rizvi, S. & Vasilakos, A. V. (2015), ‘A survey of security and privacy challenges in cloud computing: Solutions and future directions’, Journal of Computing Science and Engineering 9(3), 119–133.
[21]Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Special publication 800-145, National Institute of Standards and Technology.Available at http://csrc.nist.gov/ publications/PubsSPs.html#800-145.
[22]Microsoft (2013). Small and midsize business cloud trust study. US study result, Jun 2013.
[23]Mel, P. & Grance, T. (2009), ‘The nist definition of cloud computing. National institute of standards and technology’, Information Technology Laboratory, Version 15(10.07), 2009.
[24]Mualla, K. & Jenkins, D. (2015), ‘Evaluating cloud computing challenges for non-expert decision-makers’, IJDIWC p. 285.
[25]Singh, H. P., Bhisikar, A. & Singh, J. (2013), ‘Innovative ict through cloud computing’, IUP Journal of Computer Sciences 7(1), 37.
[26]Singh, J and Kumar, V (2013).Implementation of User-End Broker Policy to Improve the Reliability of Cloud Services. International Journal of Cloud Applications and Computing, 3(4), 13-27, October-December 2013.
[27]Singh, J. (2014). Cloud Computing for Beginner to researcher. New York: CS an Amazon company.
[28]Singh, J. (2014a). Comprehensive Solution to Mitigate the Cyber-attacks in Cloud Computing . International Journal of Cyber-Security and Digital Forensics (IJCSDF), , Vol. 3, issue 2, pp. 84-92.ISSN: 2305-0012 .
[29]Singh, J. (2014). Data structure simpliefied: Implementation using C++. New York: CS an Amazon company.
[30]Singh, J. (2014b). Study on the response time in cloud computing . International journal of information engineering and electronic business, , Vol. 5, 36-43(ISSN: 2074-9023 (Print), ISSN: 2074-9031.
[31]Singh, J., & Kumar, V. (2011). Assessment of security risk in cloud computing environment. Asia Pacific Business review, Vol 7, 180-190.
[32]Singh, J., & Kumar, V. (2014). Multi-disciplinary research issues in cloud computing . Journal of information technology and research, Vol 7, No. 3, pp. 32-53, DOI: 10.4018/jitr.2014070103.
[33]Takabi et al. 2010Takabi, H., Joshi, J. B. & Ahn, G.-J. (2010), ‘Security and privacy challenges in cloud computing environments’, IEEE Security & Privacy (6), 24–31.
[34]Wei & Blake 2010Wei, Y. & Blake, M. B. (2010), ‘Service-oriented computing and cloud computing: challenges and opportunities’, IEEE Internet Computing 14(6), 72.
[35]Wilcox, J. (2011). Gartner: Most cios have their head in the cloud. Retrieved from http://betanews.com/2011/01/24/ gartner-most-cios-have-their-heads-in-theclouds/.
[36]Yeo, C. S., Buyya, R., Assuncao, M. D., Yu, J.,Sulistio, A., Venugopal, S., &Placek, M. (2007).Utility computing on global grids. In H. Bidgoli (Ed.), Handbook of computer networks.Hoboken,NJ
[37]Oracle(2010),"Strategies for Solving the Datacenter Space,Power, and Cooling Crunch: Sun Server and Storage Optimization Techniques", An Oracle White Paper March 2010.