User Concerns in Cloud Computing Environment
User Concerns in Cloud Computing Environment
[email protected]
[email protected]
[email protected]
Abstract
The acceptance and migration to Cloud computing as an inexpensive utility service has taken
over the industry and market by storm. Especially during recent pandemic, once the online e-
commerce and industry has been capitalized by giants like Amazon, Ali Baba and other online
grocers, the utility of the cloud has become exponential. With multiple delivery and service
model, users are conveniently attracting to the cloud-based businesses and thus a vast growth of
data has also been seen. Despite acquired benefits, there are reservations, challenges and risks
especially security and privacy related to cloud paradigm. Furthermore, there are expert
management, governance, interoperability, migration and performance issues affecting the cloud
services. In this paper, shortcomings and user concerns related to the cloud-based applications
have been discussed in detail.
Section I.
Introduction
Rapid growing IT industry has been seen with advent of emerging and cutting-edge technologies
like advance processors, storage, encryption, hyper automation, distributed cloud and AI
governance, distributed network and connectivity. The interest of users increased manifold
during recent pandemic where online learning and working have become a mandatory option.
The on-demand services increase has strained supply of unlimited storage and services alike for
users and entrepreneur. The volume of data generated is around 2.5 quintillion bytes per day
reaching 40 zettabytes of data in cloud-based applications and expected to reach 181 zettabytes
by year 2025 [1]. Although percentage of unique data is not ascertained yet this growth [2] of
data has attracted vendors for provision of storage and backup facilities estimated $76 billion of
investment in storage by 2021 [3].
Despite acquired benefits, there are reservation, challenges and risks involved in cloud
environment specially security and privacy related to cloud paradigm. Furthermore, there are
expert management, governance, interoperability, migration and performance issues. In this
paper, shortcomings and user concerns related to cloud-based applications have been discussed
in detail.
Section II
Cloud Computing Risks & Shortcomings
Cloud computing challenges have been broadly classified into six main categories: Resource
Management & Utilization, Privacy & Security, Load Balancing & Distribution, Availability and
useability, Inter-cloud operability & Migrations and Contractual & Legal issues. Each of these
issues are affecting the efficacy of cloud environment and their impact on users.
A. Resource Management & Utilization
The most significant challenge for CSPs and users is resource management and utilization.
The cloud data centers have large resources and equally large demands. This enhances the
need for establishment of data centers with significant power, infrastructure, cooling,
network resources for optimal provision and cost. Every clock cycle and bit count and
therefore, optimization of resources for cost reduction and optimal provision is the hallmark
of today’s cloud environment. Areas need focus and user concerns are: -
Geographical selection of area for maximum coverage
Availability of space for building large infrastructure
Power arrangements for round the clock energy needs
Cooling units for sustenance of hardware heating issues
Energy efficient systems
Cost effective utilization of resources
B. Privacy & Security
Often taken as same entity yet the terms privacy and security may be treated as separate.
Privacy deals with the amount and extend to which an owner is willing to share that
information with other users. Security on the other hand deals with value of information,
threats and risks to the availability, confidentiality and integrity of information system and
information itself. It is one of the major concerns that users have specially business and
banking related organization due to business secrets and associated monetary transactions.
The security issues to each cloud deployment model are different. SaaS model issues are
related to confidentiality of data and access mechanisms because SaaS customer is
responsible for the safety of it. Customer has to understand what data is being published or
shared on cloud, who will share it and what level of safety is required to safeguard this
information.
Another aspect is the role of SaaS service provider. Hackers assess the value of the SaaS
providers and the value of services they provide. Additionally, they also recognize the
development procedures and processes thus this vulnerability is largely exploited by the
potentials hackers to attack large assets. This is evident by the development of ransomwares
like XcodeGhost [4] and GoldenEye [5] which are targeting users using SaaS security
vulnerabilities. Customers usually don’t scrutinize security policies of CSPs and similarly
third-party auditing is not be done hence security risks and breach of confidentiality are
evident.
References
[1] “Total data volume worldwide 2010-2025 | Statista.”
https://www.statista.com/statistics/871513/worldwide-data-created/ (accessed May 25, 2022).
[2] “Percent of corporate data stored in the cloud 2022 | Statista.”
https://www.statista.com/statistics/1062879/worldwide-cloud-storage-of-corporate-data/
#statisticContainer (accessed May 25, 2022).
[3] “26 Cloud Computing Statistics, Facts & Trends for 2022.” https://www.cloudwards.net/cloud-
computing-statistics/#Sources (accessed May 25, 2022).
[4] X. Gui, J. Liu, M. Chi, C. Li, and Z. Lei, “Analysis of malware application based on massive network
traffic,” China Communications, vol. 13, no. 8, pp. 209–221, Aug. 2016, doi: 10.1109/CC.2016.7563724.
[5] Z. Xu, J. Zhang, G. Gu, and Z. Lin, “GoldenEye: Efficiently and Effectively Unveiling Malware’s
Targeted Environment,” 2014, pp. 22–45. doi: 10.1007/978-3-319-11379-1_2.
[6] “Top 25 Security Issues in Cloud Computing | Skyhigh Security.” https://www.skyhighsecurity.com/en-
us/cybersecurity-defined/cloud-computing-security-issues.html (accessed May 25, 2022).
[7] M. Walterbusch, A. Fietz, and F. Teuteberg, “Missing cloud security awareness: investigating risk
exposure in shadow IT,” Journal of Enterprise Information Management, vol. 30, no. 4, pp. 644–665, Jul.
2017, doi: 10.1108/JEIM-07-2015-0066.
[8] J. D. K. Waguia and A. Menshchikov, “Threats and Security Issues in Cloud Storage and Content
Delivery Networks: Analysis,” in 2021 28th Conference of Open Innovations Association (FRUCT), Jan.
2021, pp. 194–199. doi: 10.23919/FRUCT50888.2021.9347609.
[9] S. K. Mishra, B. Sahoo, and P. P. Parida, “Load balancing in cloud computing: A big picture,” Journal of
King Saud University - Computer and Information Sciences, vol. 32, no. 2, pp. 149–158, Feb. 2020, doi:
10.1016/j.jksuci.2018.01.003.
[10] M. Masdari and M. Jalali, “A survey and taxonomy of DoS attacks in cloud computing,” Security and
Communication Networks, vol. 9, no. 16, pp. 3724–3751, Nov. 2016, doi: 10.1002/sec.1539.
[11] G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, “DDoS attacks in cloud computing: Issues,
taxonomy, and future directions,” Computer Communications, vol. 107, pp. 30–48, Jul. 2017, doi:
10.1016/j.comcom.2017.03.010.
[12] G. Digkas, A. Ampatzoglou, A. Chatzigeorgiou, P. Avgeriou, O. Matei, and R. Heb, “The Risk of
Generating Technical Debt Interest: A Case Study,” SN Computer Science, vol. 2, no. 1, p. 12, Feb. 2021,
doi: 10.1007/s42979-020-00406-6.
[13] “Cloud Migration Strategy - The Ultimate Guide to the 6 R’s.” https://www.simform.com/blog/cloud-
migration-strategy/ (accessed Jun. 04, 2022).
[14] “ISO - ISO/IEC 19941:2017 - Information technology — Cloud computing — Interoperability and
portability.” https://www.iso.org/standard/66639.html (accessed Jun. 04, 2022).
[15] “Interoperability and Portability for Cloud Computing: A Guide | Object Management Group.”
https://www.omg.org/cloud/deliverables/interoperability-and-portability-for-cloud-computing-a-
guide.htm (accessed Jun. 04, 2022).
[16] B. S. Rajeshwari, M. Dakshayini, and H. S. Guruprasad, “Workload Balancing in a Multi-Cloud
Environment: Challenges and Research Directions,” 2022, pp. 129–144. doi: 10.1007/978-3-030-74402-
1_7.
[17] R. Ramos De Oliveira, R. M. Martins, and A. da Silva Simao, “Impact of the Vendor Lock-in Problem on
Testing as a Service (TaaS),” in 2017 IEEE International Conference on Cloud Engineering (IC2E), Apr.
2017, pp. 190–196. doi: 10.1109/IC2E.2017.30.
[18] H. AlJahdali, A. Albatli, P. Garraghan, P. Townend, L. Lau, and J. Xu, “Multi-tenancy in Cloud
Computing,” in 2014 IEEE 8th International Symposium on Service Oriented System Engineering, Apr.
2014, pp. 344–351. doi: 10.1109/SOSE.2014.50.