Benefits and Challenges of the Adoption of Cloud Computing in Business

The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.

[1]  N Prabakaran,et al.  CHALLENGES AND ISSUES OF DEPLOYMENT ONCLOUD , 2014 .

[2]  R. Sridaran,et al.  An Analysis of Security Challenges in Cloud Computing , 2013 .

[3]  Y.Seetha Ramayya,et al.  A Study on Cloud Computing Disaster Recovery , 2013 .

[4]  Masudur Rahman,et al.  A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack , 2014 .

[5]  Mohammad Hammoudeh,et al.  Defence for Distributed Denial of Service Attacks in Cloud Computing , 2015 .

[6]  Wah M. Cheung,et al.  Analysis of Cloud Computing Vulnerabilities , 2014 .

[7]  Toshi Sharma,et al.  Cloud Computing-SPI Framework , Deployment Models , Challenges , 2014 .

[8]  Mathew Nicho,et al.  Dimensions Of Security Threats In Cloud Computing: A Case Study , 2013, BIS 2013.

[9]  Mohammed M. Alani Securing the Cloud: Threats, Attacks and Mitigation Techniques , 2014 .

[10]  Ashok V. Sutagundar,et al.  Security Aspects in Cloud Computing , 2017 .

[11]  . K.V.KMaheshKumar,et al.  SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING , 2014 .

[12]  Jiann-Min Yang,et al.  Analysis on Cloud-Based Security Vulnerability Assessment , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[13]  Sumit Goyal,et al.  Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .

[14]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[15]  Karuna C. Gull,et al.  Security Issues with Possible Solutions in Cloud Computing-A Survey , 2013 .

[16]  Nova Ahmed,et al.  Efficient and Reliable Hybrid Cloud Architechture for Big Data , 2013, CloudCom 2013.

[17]  Drasko Tomic,et al.  Economics of the cloud computing , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[18]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[19]  Chaitanyakumar Patel,et al.  Data Security in Cloud , 2014 .

[20]  Kashif Munir,et al.  SECURE CLOUD ARCHITECTURE , 2013 .

[21]  S. A. Edalatpanah,et al.  Comparison of Cloud and Grid Computing , 2014 .

[22]  Swarnpreet Singh,et al.  Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .

[23]  Sungyoung Lee,et al.  Adoption issues for cloud computing , 2009, iiWAS.

[24]  M. L. Dhore,et al.  CIDT: Detection of Malicious Code Injection Attacks on Web Application , 2012 .

[25]  Shikha Singh,et al.  Cloud Computing Attacks: A Discussion With Solutions , 2014, CloudCom 2014.

[26]  Imtiaz Ahmad,et al.  Cloud Computing Pricing Models: A Survey , 2013 .

[27]  Arnon Rosenthal,et al.  Methodological Review: Cloud computing: A new business paradigm for biomedical information sharing , 2010 .

[28]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[29]  Poonam Yadav,et al.  Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA , 2013, CloudCom 2013.

[30]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[31]  Tiago Oliveira,et al.  Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..

[32]  Siddharth Dutt Choubey,et al.  Study of data security and privacy preserving solutions in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[33]  Vidhya A Review of DOS Attacks in Cloud Computing , 2014 .

[34]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[35]  Rania Fahim El-Gazzar,et al.  A Literature Review on Cloud Computing Adoption Issues in Enterprises , 2014, TDIT.

[36]  Syed M. Rahman,et al.  An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.

[37]  Michelle Park Lazette State of Small Business , 2016 .

[38]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[39]  Yao Zheng,et al.  DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[40]  M. Avram,et al.  Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .

[41]  Shweta Tripathi,et al.  Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks , 2013 .

[42]  B.Sumitra,et al.  A Survey of Cloud Authentication Attacks andSolution Approaches , 2014 .

[43]  Tripat Deep Singh,et al.  Data Security in Cloud , 2015 .

[44]  Amol C. Adamuthe,et al.  Cloud Computing – A market Perspective and Research Directions , 2015 .

[45]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[46]  AL-Museelem Waleed,et al.  User Privacy and Security in Cloud Computing , 2016 .

[47]  Marin Litoiu,et al.  Feedback-based optimization of a private cloud , 2012, Future Gener. Comput. Syst..

[48]  Kailas Devadkar,et al.  Understanding DDoS Attack & its Effect in Cloud Environment , 2015 .

[49]  Nitasha Hasteer,et al.  Analyzing Security Solutions in Cloud Computing , 2013 .

[50]  Paula Kotzé,et al.  Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.

[51]  Abdulaziz Aljabre Cloud Computing for Increased Business Value , 2012 .

[52]  Susan V. Vrbsky Security Attacks and Solutions in Clouds Kazi Zunnurhain , 2010 .

[53]  Ahmed E. Youssef Exploring Cloud Computing Services and Applications , 2012 .

[54]  Lola Yorita Astri,et al.  A Study Literature of Critical Success Factors of Cloud Computing in Organizations , 2015 .

[55]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[56]  Imran Ashraf An Overview of Service Models of Cloud Computing , 2014 .

[57]  Angela Lin,et al.  Cloud computing as an innovation: Percepetion, attitude, and adoption , 2012, Int. J. Inf. Manag..

[58]  T Devi,et al.  Platform-as-a-Service (PaaS): Model and Security Issues , 2015 .

[59]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[60]  Alexander G. Chefranov,et al.  Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing , 2013, ArXiv.

[61]  S. Jamwal,et al.  Model To Prevent Websites From XSS Vulnerabilities , 2015 .

[62]  Manuel Castro,et al.  The Use of Cloud Computing in SMEs , 2016, ANT/SEIT.

[63]  George Suciu,et al.  Study on advantages and disadvantages of Cloud Computing – the advantages of Telemetry Applications in the Cloud , 2013 .

[65]  Sayyed Mohammad Sadegh Sajjadi,et al.  Study of SQL Injection Attacks and Countermeasures , 2013 .

[66]  Feng Tian,et al.  A Business Analysis of Cloud Computing: Data Security and Contract Lock-In Issues , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[67]  Hamisu Alhaji Ali Cloud Computing Security: An Investigation into the Security Issues and Challenges Associated with Cloud Computing, for both Data Storage and Virtual Applications , 2015 .

[68]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[69]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[70]  R. H. Goudar,et al.  Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey , 2012 .

[71]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[72]  Ritesh Sharma,et al.  Cloud Computing—Security, Issues, and Solutions , 2020 .

[73]  Nova Ahmed,et al.  EFFICIENT AND RELIABLE H YBRID CLOUD ARCHITECTURE FOR BIGDATABASE , 2013 .

[74]  Adel Alkhalil,et al.  Cloud Computing from SMEs Perspective: A Survey-based Investigation , 2013 .

[75]  Ian Sommerville,et al.  Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[76]  J. Hoover,et al.  Compliance in the Ether: Cloud Computing, Data Security and Business Regulation , 2013 .

[77]  Kevin Allan Johnston Prof,et al.  The Business Value of Cloud Computing in South Africa , 2016 .

[78]  Mojtaba Alizadeh,et al.  Identifying Benefits and risks associated with utilizing cloud computing , 2014, ArXiv.

[79]  Piotr Pazowski,et al.  Cloud Computing: A Case Study for the New Idea of the IS/IT Implementation , 2013 .

[80]  Fa-Chang Cheng,et al.  The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy , 2012 .

[81]  Mo Adam Mahmood,et al.  Impact of Cloud Computing Adoption on Firm Stock Price - An Empirical Research , 2014, AMCIS.

[82]  Mak Sharma,et al.  Cloud Computing: Adoption Considerations for Business and Education , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[83]  Paul Quinn,et al.  Heads in the cloud , 2014 .

[84]  C. Devasena IMPACT STUDY OF CLOUD COMPUTING ON BUSINESS DEVELOPMENT , 2014 .

[85]  G. Kulkarni,et al.  A security aspects in cloud computing , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering.