Cloud Computing: A Business and Economical Perspective

We present a Systematic Literature Review (SLR) on Cloud Computing that selected 51 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the economical perspective on Cloud Computing highlighting especially the business issues, cost/pricing models, and legal issues raised by the adoption of this new technological approach. Finally, it also spots emerging issues as a general lack of framework for security and service level management that respond to the peculiar profile of Cloud Computing.

[1]  Rajkumar Buyya,et al.  Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters , 2009, HPDC '09.

[2]  Geoffrey C. Fox,et al.  High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.

[3]  Ali Khajeh-Hosseini,et al.  Research Agenda in Cloud Technologies , 2010, ArXiv.

[4]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[5]  Markus Klems,et al.  Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing , 2008, WEB.

[6]  Christof Weinhardt,et al.  Business Models in the Service World , 2009, IT Professional.

[7]  Verena Kantere,et al.  An Economic Model for Self-Tuned Cloud Caching , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[8]  William Jeremy Robison,et al.  Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act , 2010 .

[9]  Ian Sommerville,et al.  Research Challenges for Enterprise Cloud Computing , 2010, ArXiv.

[10]  Aameek Singh,et al.  Server-storage virtualization: Integration and load balancing in data centers , 2008, 2008 SC - International Conference for High Performance Computing, Networking, Storage and Analysis.

[11]  G. Fenu,et al.  An approach to a Cloud Computing network , 2008, 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).

[12]  Mark Ryan,et al.  Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.

[13]  Chun-Jung Chen,et al.  Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[14]  Hsien-Hsin S. Lee,et al.  PROPHET: goal-oriented provisioning for highly tunable multicore processors in cloud computing , 2009, OPSR.

[15]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[16]  Bernd Freisleben,et al.  On-Demand Resource Provisioning for BPEL Workflows Using Amazon's Elastic Compute Cloud , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[17]  Bernd Carsten Stahl,et al.  The Ethics of Cloud Computing: A Conceptual Review , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[18]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[19]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..

[20]  Shilpashree Srinivasamurthy,et al.  Survey on Cloud Computing Security , 2010 .

[21]  Jimmy J. Lin,et al.  Where is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing , 2009, First Monday.

[22]  Jie Qiu,et al.  The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[23]  Gang Hu,et al.  White Cloud or Black Cloud: Opportunity and Challenge of Spectrum Sharing on Cloud Computing , 2012 .

[24]  Alexandru Iosup,et al.  A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing , 2009, CloudComp.

[25]  Edward Walker,et al.  The Real Cost of a CPU Hour , 2009, Computer.

[26]  Ali Sajedi Badashian,et al.  A Survey of Cloud Platforms and Their Future , 2009, ICCSA.

[27]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[28]  Mary Tate,et al.  Where are we at with Cloud Computing?: A Descriptive Literature Review , 2009 .

[29]  Keith O'Rourke,et al.  Introduction: Rationale, Potentials, and Promise of Systematic Reviews , 2008 .

[30]  G. Bruce Berriman,et al.  On the Use of Cloud Computing for Scientific Workflows , 2008, 2008 IEEE Fourth International Conference on eScience.

[31]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[32]  Scott Hazelhurst,et al.  Scientific computing using virtual high-performance computing: a case study using the Amazon elastic computing cloud , 2008, SAICSIT '08.

[33]  Eyal de Lara,et al.  SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.

[34]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[35]  Matt Bishop,et al.  Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[36]  Walid G. Aref,et al.  A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.

[37]  Eli Blevis,et al.  The cloud , 2011, INTR.

[38]  Ian Sommerville,et al.  Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[39]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[40]  Albert G. Greenberg,et al.  The cost of a cloud: research problems in data center networks , 2008, CCRV.

[41]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Autonomic Metered Pricing for a Utility Computing Service , 2022 .

[42]  Alexandru Iosup,et al.  C-Meter: A Framework for Performance Analysis of Computing Clouds , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[43]  Edwin Baker,et al.  Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..

[44]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[45]  Takuya Suzuki,et al.  Security Architectures for Cloud Computing , 2010 .

[46]  Paolo Bientinesi,et al.  Can cloud computing reach the top500? , 2009, UCHPC-MAW '09.