The impact of security and scalability of cloud service on supply chain performance

ABSTRACT Cloud computing introduces flexibility in the way an organization conducts its business. On the other hand, it is advisable for organizations to select cloud service partners based on how prepared they are owing to the uncertainties present in the cloud. This study is a conceptual research which investigates the impact of some of these uncertainties and flexibilities embellished in the cloud. First, we look at the assessment of security and how it can impact the supply chain operations using entropy as an assessment tool. Based on queuing theory, we look at how scalability can moderate the relationship between cloud service and the purported benefits. We aim to show that cloud service can only prove beneficial to supply partners under a highly secured, highly scalable computing environment and hope to lend credence to the need for system thinking as well as strategic thinking when making cloud service adoption decisions. Keywords: cloud service, security concerns, scalability, supply chain management (ProQuest: ... denotes formulae omitted.) 1. Introduction The internet has been employed in multidimensional and multifaceted ways in various supply chains. Lancioni et al [2003] found there to be an increase in the use of the internet by organizations to leverage supply chain management applications. The significance of the internet owes to its ubiquity and provisioning of real time communication. Irrespective of the type of supply chain, the internet has proven to be limitless in the purpose it can serve provided its use had been carefully or strategically planned [Wang et al., 2004]. Its use has ranged from communication information exchange to more operational related functions such as order filling, purchasing, production scheduling, customer service, human resource management etc. [Chen and Meixell, 2003]. Leveraging Information Technology (IT) can be costly and has deterred small to medium scale organizations from using it. This in part has led to the emergence and justification for the somewhat new IT concept called 'cloud computing'. Cloud services bring flexibility, configurability, cost effectiveness, low implementation cost to IT and by extension, Supply Chain Management (SCM). Many IT experts and academics have reported a plethora of benefits an organization stands to gain if and when they avail themselves to this opportunity. In the same vein there has been a series of counter argument about the purported benefits of joining the cloud. However, as is common to most IT initiatives, a careful analysis of how it will affect one's internal and external business environment must be undertaken before adopting the strategy, otherwise it can be the bane of a business existence. Top amongst these counter arguments are the issues of security [Subashini and Kavitha, 2011] and ability to scale up or down computing resources as needed without making service unavailable [Armbrust, 2010]. Most of these reports, although anecdotal, have been viewed from the cloud provider's perspective. There has been paucity of report on how these issues affect cloud users (in this case supply chain members), which have been mostly studied at an organization level. There is yet to be an academic research on how these issues affect the operations of an entire supply network. This study proposes an approach, which incorporates a system thinking perspective, to investigate how some of these issues, especially security and scalability, affect businesses at an organizational level and supply chain level. By looking at the impact of these variables on supply chain performance, the research posits that this will inform an appropriate cloud computing adoption strategy to suit the overall organization and supply chain management goal. Security is conceptualized as one of the uncertainties present in the cloud. It is defined here as the level of defence against IT threats as evidenced by the probability of breach occurrence. …

[1]  Oliver Prokein,et al.  Management of Security Risks – A Controlling Model for Banking Companies , 2008 .

[2]  Frank Wiengarten,et al.  Collaborative supply chain practices and performance: exploring the key role of information quality , 2010 .

[3]  David F. Pyke,et al.  Exploiting timely demand information to reduce inventories , 1996 .

[4]  Patricio Donoso,et al.  Assessing an ambulance service with queuing theory , 2008, Comput. Oper. Res..

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Taho Yang,et al.  Evaluation of robustness of supply chain information-sharing strategies using a hybrid Taguchi and multiple criteria decision-making method , 2011 .

[7]  Janet Efstathiou,et al.  An information‐theoretic methodology for measuring the operational complexity of supplier‐customer systems , 2002 .

[8]  Che-Wei Chang,et al.  THE LEVELS OF INFORMATION TECHNOLOGY ADOPTION, BUSINESS NETWORK, AND A STRATEGIC POSITION MODEL FOR EVALUATING SUPPLY CHAIN INTEGRATION , 2004 .

[9]  P. Burke The Output Process of a Stationary $M/M/s$ Queueing System , 1968 .

[10]  Jean Hitchings,et al.  Deficiencies of the traditional approach to information security and the requirements for a new methodology , 1995, Comput. Secur..

[11]  Jinxing Xie,et al.  Effects of inventory policy on supply chain performance: A simulation study of critical decision parameters , 2008, Comput. Ind. Eng..

[12]  Minder Chen,et al.  Web Services Enabled Procurement in the Extended Enterprise: An Architectural Design and Implementation , 2003, J. Electron. Commer. Res..

[13]  Edoardo M. Airoldi,et al.  An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..

[14]  Myoung-Ho Kim,et al.  An analysis of the optimal number of servers in distributed client/server environments , 2004, Decis. Support Syst..

[15]  Averill M. Law,et al.  Simulation modelling and analysis , 1991 .

[16]  Werner Jammernegg,et al.  Performance improvement of supply chain processes by coordinated inventory and capacity management , 2007 .

[17]  Hing Kai Chan,et al.  Effect of information sharing in supply chains with flexibility , 2009 .

[18]  Amir M. Sharif,et al.  It's written in the cloud: the hype and promise of cloud computing , 2010, J. Enterp. Inf. Manag..

[19]  Yves Dallery,et al.  Queueing models for full-flexible multi-class call centers with real-time anticipated delays , 2009 .

[20]  Michael F. Smith,et al.  Strategic Internet application trends in supply chain management , 2003 .

[21]  Jayashankar M. Swaminathan,et al.  Modeling Supply Chain Dynamics: A Multiagent Approach , 1998 .

[22]  Chun-Che Huang,et al.  Sharing knowledge in a supply chain using the semantic web , 2010, Expert Syst. Appl..

[23]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[24]  Yacov Y. Haimes,et al.  Risk modeling, assessment, and management , 1998 .

[25]  Won Kim,et al.  The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..

[26]  Roger Smith Computing Beyond the Firewall , 2010 .

[27]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[28]  Vineet Padmanabhan,et al.  Comments on "Information Distortion in a Supply Chain: The Bullwhip Effect" , 1997, Manag. Sci..

[29]  Ting Zhang,et al.  The impact of collaborative transportation management on supply chain performance , 2010, 2010 8th International Conference on Supply Chain Management and Information.

[30]  N. Gautam,et al.  Computing, Artificial Intelligence and Information Technology Performance analysis and optimization of web proxy servers and mirror sites , 2002 .

[31]  Mahesh S. Raisinghani,et al.  THE INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS SECURITY IMPERATIVE: IMPORTANT ISSUES AND DRIVERS , 2002 .

[32]  Scott R. Swenseth,et al.  Evaluating vendor-managed inventory (VMI) in non-traditional environments using simulation , 2008 .

[33]  Mahesh S. Raisinghani,et al.  The Information Technology and Telecommunications (or E-Business) Security Imperative: Important Issues and Drivers , 2002, J. Electron. Commer. Res..

[34]  Mark Ryan,et al.  Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.

[35]  F. Chan,et al.  Comparative study of adaptability and flexibility in distributed manufacturing supply chains , 2010, Decis. Support Syst..

[36]  Loren Paul Rees,et al.  Decision support for Cybersecurity risk planning , 2011, Decis. Support Syst..

[37]  J. Keynes A Treatise on Probability. , 1923 .

[38]  Kaushik Dutta,et al.  Cost-based decision-making in middleware virtualization environments , 2011, Eur. J. Oper. Res..

[39]  Michael D. Clements,et al.  Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma , 2008, J. Theor. Appl. Electron. Commer. Res..

[40]  O. M. Akanle,et al.  An agent-based approach for e-manufacturing and supply chain integration , 2006, Comput. Ind. Eng..

[41]  Brian W. Fitzpatrick,et al.  The Case Against Data Lock-in , 2010, ACM Queue.

[42]  Roger Smith,et al.  Computing in the Cloud , 2009 .

[43]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[44]  Ricki G. Ingalls,et al.  Introduction to simulation , 2001, 2008 Winter Simulation Conference.

[45]  Daniel E. Rivera,et al.  Simulation-based optimization of process control policies for inventory management in supply chains , 2006, Autom..

[46]  Dave Durkee,et al.  Why cloud computing will never be free , 2010, ACM Queue.

[47]  Rynson W. H. Lau,et al.  A performance study on multi-server DVE systems , 2003, Inf. Sci..

[48]  M. Shaw,et al.  A strategic analysis of inter organizational information sharing , 2006, Decis. Support Syst..

[49]  Subhas C. Misra,et al.  Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment , 2011, Math. Comput. Model..

[50]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[51]  M. Warren,et al.  Cyber attacks against supply chain management systems: A short note , 2000 .

[52]  Cynthia Lynn Bellefeuille Quantifying and managing the risk of information security breaches participants in a supply chain , 2005 .

[53]  César Martínez-Olvera,et al.  Entropy as an assessment tool of supply chain information sharing , 2008, Eur. J. Oper. Res..

[54]  T. Hennig-Thurau,et al.  The impact of customer satisfaction and relationship quality on customer retention: A critical reassessment and model development , 1997 .

[55]  George Q. Huang,et al.  Impact of information sharing on inventory replenishment in divergent supply chains , 2004 .

[56]  Huaiqing Wang,et al.  On-demand e-supply chain integration: A multi-agent constraint-based approach , 2008, Expert Syst. Appl..

[57]  Brian W. Fitzpatrick,et al.  The Case Against Data Lock-in , 2010, ACM Queue.

[58]  Di Jin,et al.  Modeling and simulation of performance analysis for a cluster-based Web server , 2006, Simul. Model. Pract. Theory.

[59]  G Frizelle,et al.  Measuring complexity as an aid to developing operational strategy , 1995 .

[60]  Robert E. Shannon,et al.  Introduction to the art and science of simulation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).

[61]  Susan M. Broniarczyk,et al.  Factors influencing the likelihood of customer defection: The role of consumer knowledge , 2003 .

[62]  George Q. Huang,et al.  Web‐based simulation portal for investigating impacts of sharing production information on supply chain dynamics from the perspective of inventory allocation , 2002 .

[63]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[64]  Michael A. Cusumano,et al.  Cloud computing and SaaS as new computing platforms , 2010, CACM.