Ahmad Cloud Computing Definiton
Ahmad Cloud Computing Definiton
net/publication/314072571
CITATIONS READS
5 6,765
1 author:
Ishrat Ahmad
Cardiff Metropolitan University
2 PUBLICATIONS 10 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ishrat Ahmad on 20 September 2017.
Abstract—Cloud computing is an evolving technology that is consistently generating impact in IT industry and academia. It performs all
computational tasks over Internet by using virtualization techniques and remains isolated from intricate vast hardware and software infrastruc-
tures. The aim of this paper is to glance through the background and evolutions of cloud computing, its architecture and services to develop
cumulative knowledge for future research extension and evaluation.
Keywords: cloud characteristics, cloud computing, cloud deployment models, cloud services
—————————— ——————————
1 INTRODUCTION
ternet-accessible on-demand services. Applications built Platform as a Service and Software as a Service.
on Cloud Architectures are such that the underlying
computing infrastructure is used only when it is needed 2.1 Evolution of Cloud Computing Services
(for example to process a user request), draw the neces- Cloud computing is driven from modern technological
sary resources on-demand (like compute servers or stor- features in order to create a novel computing environ-
age), perform a specific job, then relinquish the unneeded ment that can serve various growing business require-
resources and often dispose themselves after the job is ment with greater flexibility, integrity and agility [15].
done. While in operation the application scales up or Various literatures relate cloud computing to prior para-
down elastically based on resource needs.” According to digms as Cluster Computing, Grid Computing, Virtual-
IBM, “The concept of cloud computing has developed ization, Utility Computing and Service Oriented Architec-
from earlier ideas such as grid and utility computing, and ture [2,16, 17, 18, 19, 20]. Others refer cloud computing as
aims to provide a completely Internet driven, dynamic a new paradigm and emerging technology [21]. Larry
and scalable service-oriented IT environment, which can Ellison, chief Executive of Oracle Corporation, said at a
be accessed from anywhere using any Web-capable de- financial analyst conference in 2008 that, “The interesting
vice” [8]. Microsoft defined as, “Cloud computing repre- thing about cloud computing is that we’ve redefined
sents the platform for the next generation of business. cloud computing to include everything we already do”
Cloud computing is driving the transformation of the IT [22]. The increased amount of data and high level of con-
industry across the entire stack: hardware model deliver- nectivity has made information technology providers to
ing incredibly powerful and efficient hardware at a frac- establish data centers that help for dynamic load balanc-
tion of the cost; application model allowing developers to ing, distributing and replicating data across servers on
rapidly create highly available secure cloud applications; demand [15].
operations model keeping cloud applications available Eric Schmidt, the executive chairman of Google, is
24X7 with 9-to-5 management” [9]. Sun views cloud as, “a probably the first person to introduce the concept of
set of services that are encapsulated, have an API, and are cloud computing “as a whole” in his talk at a conference
available over the network. This definition encompasses of Search Engine Strategies [23] cited by [24]. Prior to that,
using both compute and storage resources as services” the journey of cloud computing has started by Sales-
[10]. VMware finds cloud computing as, “is best under- force.com in 1999 with limited specific software packages
stood from the perspective of the consumer of services [22]. They later introduced integrated set of tools,
provided by such a computing approach. The following Force.com, which can be used by other organizations to
four attributes are core to cloud computing based serv- build their business applications and share the same in-
ices: radically improved economics through shared infra- frastructure that delivers the Salesforce CRM applications
structure; pricing based on consumption: You only pay [25]. From 2003 to 2006, Google has published some re-
for what you use; flexible access; a lightweight entry and search papers on Platform as a Service (PaaS) cloud com-
exit service acquisition model” [11]. Xiao and Xiao, senior puting and later launched its service to the public as
member of IEEE, defined cloud computing as, “A large- Google App Engine (GAE) in 2008 [24]. GAE provides
scale distributed computing paradigm that is driven by SaaS services as office productivity tools, including e-
economies of scale, in which a pool of abstracted, virtual- mail, calendar, and word processing and more in the area
ized, dynamically- scalable, managed computing power, of electronic corporate communications [25]. By the end
storage, platforms, and services are delivered on demand of 2013, Google has launched its on-demand Infrastruc-
to external customers over the Internet” [12]. They further ture as a Service as Google Compute Engine (GCE) and
mentioned that several literatures have given different distributed storage system as Bigtable. The GCE is hosted
definitions for cloud computing but none has been recog- on Google server and has an environment based on Py-
nized extensively. In another research by Voas and Zhang thon programming language. Cloud users access GCE
[13] stated that cloud computing is influencing significant platform to build and host web applications. During 2006
changes to the use of IT resources over Internet with a and 2007, Amazon has started offering a suite of several
standard interfaces. It is considered as a killer technology services under the name of Amazon Web Services (AWS)
that takes the best features from prior technologies and [24]. It includes cloud computing as Elastic Compute
trades them off to convert a new solution [14]. Cloud (EC2) [26] with no constraint on the programming
In general, a cloud comprises of memory, data centre, language type of software application [22], structure data
distributed storage, virtual machines, web applications, storage as SimpleDB [26], object storage service or Simple
processing and network. It has compatibility with loosely Storage Service (S3), a web service for content delivery as
coupled CPU clusters. According to the requirement of CloudFront, a hosted service for storing messages as
various organizational services, cloud can be deployed as Simple Queue Service [25] and more, in which, data stor-
any of the three main models, such as, Public clouds age are priced by the GB monthly and computing capac-
(available to general public), Private clouds (owned by ity by the CPU hour [28]. AWS is completely based on
one or groups of organizations) or combination of both as server virtualization technology and has made Google the
Hybrid clouds. The deployment can also be modeled as pioneer of Infrastructure as a Service (IaaS) provider [24].
Domain Specific clouds or Community clouds. The cloud At the end of 2008, Microsoft Azure was introduced to
architecture consists of abstract layers to provide three the public with services that includes BLOB object storage
different types of services as Infrastructure as a Service, and SQL services. It uses Window Azure Hypervisor
JOURNAL OF COMPUTING AND MANAGEMENT STUDIES VOLUME 1. ISSUE 1. 30TH JANUARY 2017
(WAH) as the core infrastructure with the capability of 3.4 Rapid Elasticity and Scalability:
server virtualization, and .Net as the application con- The scalability of the available resources appears to be
tainer with existing software and applications compatibil- unlimited at any time for better services. Nodes in the
ity [24]. In 2010, Windows Azure operating system PaaS network can be added or dropped with less alteration to
was launched to provide Azure services as Live, SQL, infrastructure setup. It is acquired and released automati-
SharePoint, .Net and Microsoft Dynamic CRM [25]. cally corresponding with the customers demand [29, 30,
In 2011, Apple released iCloud that act as an Internet 31].
repository. iCloud synchronizes all the data, files, appli-
cations and other items among user’s devices, like laptop, 3.5 Measured service or Utility-based pricing:
mobile etc. so that the devices can share the same data Resource usage can be monitored, controlled, metered
with no redundancy [27]. and reported in order to provide transparency for both
Since 2007 number of companies started walking the cloud service providers and users. The cloud services
through the journey. Cloud computing has become the are automatically measured at different level of abstrac-
key strategy of IT industries, ISP and telecom service pro- tion to the type of service layers (e.g., storage, memory,
viders. Following are the name of some cloud service servers, user applications, active accounts etc.) using ap-
providers: IBM Blue Cloud infrastructure, Joyent (Accel- propriate metering systems and are billed accordingly
erator), OpenNebula, Cisco UCS, Hadoop, Navajo SaaS, [29, 30]. The pricing scheme in cloud computing is like
GoGrid (Xen), Apache HBase, Verizon CaaS (VMware), pay-as-you-go and may vary from service to service. As
Heroku (Ruby), EMC Atmos, AT&T Synaptic (VMware) an example, a cloud customer can rent a virtual machine
[24,28]. Some of the key cloud computing technology on per-hour basis. Such utility based pricing model cuts
providers are Apache, Cisco and EMC. Example of serv- down service operating costs [21].
ice support providers are CapGemini, RigthScale and
Vordel [25].
3.6 Location Independence:
Usually, the cloud customer has no knowledge about the
exact geographical location of the rented resources from
3 CLOUD CHARACTERISTICS
service providers. In order to provide maximum service
Cloud computing has some key characteristics that depict utility and high network performances, many service
their features of similarity and differences from conven- providers set up their data centres at different regions
tional computing operations. The first five essential char- around the globe. And may specify the location to the
acteristics described below are defined by NIST [3] and customers only at higher level of abstraction, as in like,
CSA [29]. Other relevant studies have also identified a country or state [21, 29, 31].
number of salient features of cloud computing, and they
are summarized as follows:
3.7 Cost Effectiveness:
The cloud can be deployed near to economical power
3.1 On-demand Self-service: station and in inexpensive real estate [31].
The cloud users have control over computing resources
that can be allocated or de-allocated and customized ac-
3.8 Multi-tenancy:
cording to their needs at anytime from anywhere without The cloud service provider can rent out a single infra-
any intervention from cloud service provider. They are structure as a service to multiple customers by providing
empowered to manage the resources and have adminis- appropriate technical partitions [21, 32] named multi-
trative privileges to configure the parameters of comput- tenancy and location independence as a Shared Infra-
ing power, servers, storage and network. Such automated structure characteristic and has defined that the cloud
resource management provides greater flexibility and fast customers use physical services as virtualized software
response to rapid changes on service demand [3, 21, 29]. model in accordance to their demand.
4.1 Deployment Models attack or leak of information, as the security level in pub-
lic cloud lacks fine-grained control mechanisms [3, 17, 29,
4.1.1 Private Cloud 31, 36].
The private cloud infrastructure is configured solely for a
single organization or a third party by using virtualiza- 4.1.3 Virtual Private Cloud
tion and automated management technologies to ensure Virtual Private cloud is one of the emerging cloud infra-
highest degree of controls over security, reliability and structures that have started to gain popularity since its
performance. It is built, deployed, customized, managed, establishment in 2009 [21]. The model is configured to run
operated and used by either a single or group of organi- on public cloud but in a private way. It uses the comput-
zation as client and supervised by cloud service provider. ing resources in public cloud and allows connection with
It is not made available to the general public [33]. Figure 1 consumer’s computing resources by using virtual private
shows an example of a Private Cloud model. network (VPN) technology. Hence, better security set-
tings options that can virtualize not only the servers and
applications but also the underlying communication net-
work [21]. Google and Amazon provide services as Vir-
tual Private cloud (VPC), which is a virtual platform op-
erating on public cloud and is shared by different organi-
zations [17].
SNS, IBM Cast Iron or Informatica on-demand for inte- width, communication encryption, message delay and
gration and Cloud9 Analytics for business intelligence network monitoring.
[29, 39, 40, 41, 43].
4.2.5 Software Kernel Layer
4.2.3 Infrastructure as a Service (IaaS) Youseff, et al. [2] defined a kernel layer as a basic soft-
It is an on-demand service of an abstracted computing ware management for the physical servers that can be
infrastructure or a virtualization platform [39] that pro- implemented as OS kernel, hypervisor, VM monitor or
vides servers, operating systems, storage and network to cluster middleware.
develop, host and execute applications [29, 30]. Infrastruc-
ture layer, also known as the virtualization layer, is the 4.2.6 Hardware as a Service (HaaS)
most imperative aspect in cloud computing, as the physi- It provides almost similar services as IaaS, only hardware
cal resources are partitioned by virtualization technolo- and VMs are rented in respective services [41]. The HaaS
gies and are used more efficiently, for example, dynamic providers leased out physical resources, which forms the
resource assignment, Xen, KVM and VMware [21]. In- backbone of cloud computing, like computers, servers,
stead of purchasing expensive housing, processing switches, routers, firewalls, load-balancer, power or cool-
power, data-centre, software, complex hardware and ing systems [21]. The cloud users have full control over
network equipments, the cloud customers use the IaaS rented HaaS resources [41] and they perform mainte-
resources as virtualized objects that can be monitored nance include hardware configuration, fault tolerance,
through a service interface. Except basic underlying infra- traffic management, power and cooling resource man-
structure, the cloud customers are responsible for security agement, through the Internet. Typically, HaaS is put into
provisions of the entire setup of applications or the leased operation in a data centre which contains thousands of
infrastructure [39]. They manage and have control over servers in rows and that they are interconnected through
operating systems, storage, deployed applications, host- switches, routers etc. [21].
ing firewalls and possibly some limited network setup Example of HaaS service provider: NewServers [41],
configurations [29, 30, 31]. The cloud users install, config- IBM’s Managed Hosting service [40].
ure and operate the virtual machines rented from the
cloud providers, in which, they can install any operating According to NIST, cloud infrastructure can be divided in
system [41] and their own added services for external or five distinct conceptual layers as shown in Figure 5 be-
internal use [42]. However, the cloud users can also use low:
pre-installed and configured VMs as a base setup by the
IaaS providers [41]. In parallel to computational re-
sources, data storage is also offered as a service, Storage
as a Service, that provides cloud customers on-demand
remote access flexible storage capability. The service pro-
viders typically provide assurances for high availability,
data consistency, redundancy, performance and reliabil-
ity.
Examples are Amazon’s Elastice Block Storage (EBS)
or Simple Storage Service (S3) and Rackspace’s Cloud
Files. In addition, data are also provided as services. For
example Amazon provides human genome or US census
data sets for analytics services [40]. Organizations with
one-time data processing demands and very large data
storage use IaaS services [43]. Others can simply rent a
server time, memory or have an operating system run on
top with their own applications [42]. Fig. 5. Scopes and Control (NIST)
Example of IaaS service providers: Flexiscale, GoGrid,
Amazon Web ServicesTM, Kaavo for cloud broker, Ama-
zon CloudWatch or VPC for services management, Veri- NIST has illustrated the prospects of scope and control
zon CaaS, Rackspace Cloud Servers, Serve Path GoGrid between the cloud providers and customers over each
or Amazon EC2 for compute and Amazon S3 & EBS for layer of service models. Facility layer includes heating, air
storage, Amazon’s Elastic Compute Cloud, Enomalism cooler, ventilation, power, communications and related
Elastic Computing Infrastructure [21, 29, 37, 39, 40, 41, physical plant, while Hardware layer includes computers,
43]. network, storage and related physical computing infra-
structures. Facility and Hardware layers can be both
4.2.4 Communication as a Service (CaaS) termed as HaaS. The Virtualization Infrastructure layer or
Youseff, et al. [2] has also defined a new idea of serv- IaaS includes the logical elements to establish computing
ice as Communication as a Service (CaaS) that will ensure platform, such as, virtual machines, virtual storage and
quality communication services like network security, virtual network. The Platform layer or PaaS includes
virtual overlays for traffic isolation or dedicated band- compilers, libraries, middleware, utilities and other soft-
ware development and deployment tools. The Applica-
JOURNAL OF COMPUTING AND MANAGEMENT STUDIES VOLUME 1. ISSUE 1. 30TH JANUARY 2017
tion layer or SaaS provides the application for the end- disk, power and more. Business Support provides de-
user or other programs. Cloud computing encompasses ployment, configuration, scheduling, performance re-
with a service provider side and a client side. The left and view, monitoring, software lifecycle management, fault
the right arrows in the Figure 6 represent the range of and logging, user management, authentication, metering
scope and control over the service layers by the cloud and billing [12, 24, 29]. As innovation compels rapid
service provider and customer respectively. In general, standard product development, the cloud stakeholders
the higher the levels of service layers are consumed by will benefit from various ways of interacting service
the customer, the more scope and control the customer models for developing applications and interfaces. Such
has over the system. However, the cloud provider has full flexible capabilities allow cloud customers to customize
control over the two bottom physical layers [30]. the service models that work best for their business re-
Unlike conventional hosting service environments, the quirements.
cloud architecture is very much modular and the layers
are loosely coupled from one another to provide flexibil-
5 CONCLUSION
ity for advancement. Such modularity helps cloud com-
puting to comply with various APIs and thus cutting Cloud based business applications can be an inexpensive
down in management and maintenance expenses [21]. approach as it reduces the overall complexity and saves
Figure 6 shows a Cloud computing architecture in a costs from expensive real-estate, hardware, network
visual form with layers of service models. The figure has bandwidth, cooling equipment, electricity, operational
been visualized from the defined cloud architecture by costs, software licenses, physical security and human re-
different regulatory bodies and research works [2, 3, 12, sources. Cloud service providers bill for each instance,
21, 24, 29, 42, 44]. like pay-as-you-go, so better accountability and transpar-
ency of costs. Unlike traditional computing, it is scalable
and consumes less time to start up. General public can
access these hosted data or application from cloud servers
over Internet through their devices. It delivers quality
services at much lower costs that often discourage small
firms to invest in expensive computing resources. Instead,
they can concentrate more on customer requirements,
which in terms effect in competitive advantage, and pro-
duce solutions that can contribute to make new innova-
tions.
REFERENCES
[1] R. Wang, “Data Centre Best Practices: Managing data with
cloud computing,” InfoWorld, 2013.
[2] L. Youseff, M. Butrico, and D. Da Silva, “Toward a unified on-
tology of cloud computing,” IEEE, pp. 1–10, 2008.
[3] P. Mell and T. Grance, “NIST Definition of Cloud Computing,”
NIST Special Publication 800-145, 2011. [Online]. Available:
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-
145.pdf.
[4] OPC, “Introducing to Cloud Computing,” Office of the Privacy
Commissioner of Canada (OPC), 2011. [Online]. Available:
http://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf.
[5] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner,
“A break in the clouds: towards a cloud definition,” ACM SIG-
COMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2008.
[6] D. Gottfrid, “Self-Service, Prorated Supercomputing Fun!,” The
New York Times, 2007. [Online]. Available:
Fig. 6. Cloud Service Models and Business Support http://open.blogs.nytimes.com/2007/11/01/self-service-
prorated-super-computing-fun/.
[7] J. Varia, “Cloud Architectures,” Amazon Web Services, 2008.
[Online]. Available:
http://jineshvaria.s3.amazonaws.com/public/cloudarchitectur
Terminologies from Figure 6:
es-varia.pdf.
SaaS is built on top of PaaS stacks and provides presenta- [8] K. Swaminathan, “The value of cloud computing to outsourcers
tional platform and self-contained operating environment and their clients,” IBM Software Group, 2009. [Online]. Avail-
through applications and management capabilities. PaaS able:
ftp://ftp.software.ibm.com/software/uk/rational/cloud_com
resides above IaaS stacks and provides programming en- puting_white_paper.pdf.
vironment, system integration and virtualization mid- [9] D. Chappell, “Introducing the Windows Azure platform,”
dleware capabilities. IaaS provides entire infrastructure Microsoft, 2009.
[10] Sun Microsystems, “Introduction to cloud computing architec-
resource stacks and deliver physical and logical connec- ture,” Java.net, 2009. [Online]. Available:
tivity within these resources. Software kernel manages https://java.net/jira/secure/attachment/29265/CloudCompu
software integration over physical hardware. HaaS pro- ting.pdf.
[11] VMware, “The VMware vCloud Solution Enterprise-Class
vides basic physical resources CPUs, routers, memory, Cloud Computing for Any Application, Any Customer,”
JOURNAL OF COMPUTING AND MANAGEMENT STUDIES VOLUME 1. ISSUE 1. 30TH JANUARY 2017
VMware, 2008. [Online]. Available: [35] Aberdeen Group, “Aberdeen Group,” 2012. [Online]. Available:
http://www.vmware.com/files/pdf/cloud/vmware-cloud- http://www.aberdeen.com/Research/Research- Li-
white-paper.pdf. brary.aspx?search=private could.
[12] Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Comput- [36] H. Susanto, M. N. Almunawar, and C. C. Kang, “A Review of
ing,” IEEE Commun. Surv. Tutorials, vol. 15, no. 2, pp. 843–859, Cloud Computing Evolution Individual and Business Perspec-
Jan. 2013. tive,” Academia, 2012.
[13] J. Voas and J. Zhang, “Cloud Computing: New Wine or Just a [37] T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust Man-
New Bottle?,” IEEE Comput. Soc., vol. 11, no. 2, pp. 15–17, Mar. agement of Services in Cloud Environments : Obstacles and So-
2009. lutions,” vol. 46, no. 1, 2013.
[14] L. Mei, W. K. Chan, and T. H. Tse, “A Tale of Clouds: Paradigm [38] E. Aguiar, Y. Zhang, and M. Blanton, “An Overview of Issues
Comparisons and Some Thoughts on Research Issues,” in IEEE and Recent Developments in Cloud Computing and Storage
Asia-Pacific Services Computing Conference (APSCC 2008), 2008. Security,” in High Performance Cloud Auditing and Applications,
[15] Y. Y. Alshamaileh, “An empirical investigation of factors affect- Y. Choi, K. Han, and S. Song, Eds. Springer, 2014.
ing cloud computing adoption among SMEs in North Eng- [39] N. R. Putri and M. C. Mganga, “Enhancing Information Se-
land,” Newcastle University of Business School, 2013. curity in Cloud Computing Services using SLA Based Metrics,”
[16] K. Hwang, “Massively Distributed Systems : From Grids and Blekinge Institute of Technology, 2011.
P2P to Clouds,” in Advances in Grid and Pervasive Computing, [40] M. Böhm, S. Leimeister, C. Riedl, and H. Krcmar, “Cloud Com-
vol. 5036, Berlin, Heidelberg: Springer, 2008, p. p1. puting - Outsourcing 2.0,” 2009.
[17] G. Motta, N. Sfondrini, and N. Sacco, “Cloud Computing: An [41] P. Egwutuoha, D. Schragl, and R. Calvo, “A Brief Review of
architectural and technological overview,” IEEE Xplore, 2012. Cloud Computing, Challenges and Potential Solutions,” Parallel
[18] Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and grid Cloud Comput., vol. 2, no. 1, Jan. 2013.
computing 360-degree compared,” IEEE, 2008. [Online]. Avail- [42] S. Mewada, U. Singh, and P. Sharma, “Security Enhancement in
able: Cloud Computing,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 1, no.
https://scholar.google.com/citations?view_op=view_citation& 1, 2013.
hl=en&user=jE73HYAAAAAJ&citation_for_view=jE73HYAAA [43] W. L. Hsu, “Conceptual Framework of Cloud Computing Gov-
AAJ:u5HHmVD_uO8C. ernance Model – An Education Perspective,” IEEE Technol. Eng.
[19] R. Buyya and S. Venugopal, “A Gentle Introduction to Grid Educ., vol. 7, no. 2, pp. 12–16, 2012.
computing and technology,” Computer Soceity of India, 2005. [44] X. Chen, G. B. Wills, L. Gilbert, and D. Bacigalupo, “Using
[Online]. Available: Cloud for research: A Technical Review,” TechiRes, 2010. [On-
http://www.cloudbus.org/papers/GridIntro-CSI2005.pdf line]. Available:
[20] K. Hashizume, “A reference architecture for cloud computing http://tecires.ecs.soton.ac.uk/docs/TeciRes_Technical_Report.
and its security applications,” Florida Atlantic University, 2013. pdf
[21] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-
of-the-art and research challenges,” Brazilian Comput. Soc., pp.
7–18, 2010.
[22] S. Gadia, “Cloud Computing : An Auditor’s Perspective,” Ishrat Ahmad, PhD candidate at London School of Commerce/Cardiff
ISACA J., vol. 6, pp. 1–5, 2009. Metropolitan University, UK. Email: [email protected]
[23] E. Schmidt, “Conversation with Eric Schmidt hosted by Danny
Sullivan,” Search Engine Strategies Conference, 2006. [Online]. Dr. Humayun Bakht, Director of Studies at London School of Com-
Available: merce/Cardiff Metropolitan University and Principal Examiner Professional
http://www.google.com/press/podium/ses2006.html Issues in IT (PITT) at NCC Education. Email: [email protected]
[24] L. Qian, Z. Luo, Y. Du, and L. Guo, “Cloud Computing : An
Overview,” pp. 626–631, 2009. Dr. Uma Mohan, Supervisor and Senior Programme Leader at London
[25] Z. Enslin, “Cloud computing : COBIT-mapped benefits, risks School of Commerce, UK. Email: [email protected]
and controls for consumer enterprises,” Stellenbosch : Stellen-
bosch University, 2012.
[26] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi,
“Cloud Computing - The business perspective,” Decision sup-
port systems, 2011. [Online]. Available:
http://www.acc.ncku.edu.tw/chinese/faculty/shulc/courses/
IT_Competitive_Advantage/assignments/2012-fall/cloud-
computing-business-perspective.pdf
[27] J. Hiner, “Apple cloud vs. Google cloud: The philosophical
differences - TechRepublic,” Techrepublic, 2011. [Online]. Avail-
able: http://www.techrepublic.com/blog/tech-sanity-
check/apple-cloud-vs-google-cloud-the-philosophical-
differences/?tag=nl.e098
[28] B. Hayes, “Cloud Computing,” Communications of the ACM, vol.
51, no. 7, 2008.
[29] J. Archer, D. Cullinane, N. Puhlman, A. Boehme, P. Kurtz, and
J. Reavis, “Cloud Security Alliance Top Threats V1.0,” 2010.
[30] W. Jansen and T. Grance, “NIST Guidelines on Security and
Privacy in Public Cloud Computing,” 2011.
[31] D. Zissis and D. Lekkas, “Addressing cloud computing security
issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592,
Mar. 2012.
[32] Omotunde, O. Awodele, O. Kuyoro, and C. Ajaegbu, “Survey
of Cloud Computing Issues at Implementation Level,” CIS J.,
vol. 4, pp. 91–96, 2013.
[33] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “A
View of Cloud Computing.,” Communications of the ACM, vol.
53, no. 4, pp. 50–58, 2010.
[34] T. Dillon, E. Chang, and C. Wu, “Cloud computing: Issues and
challenges,” in 24th IEEE International Conference on Advanced In-
formation Networking and Applications (AINA ’10), 2010, pp. 27–
33.