Challenges in the adoption of hybrid cloud: an exploratory study using systematic literature review
- Author(s): Siffat Ullah Khan 1 and Naeem Ullah 1
-
-
View affiliations
-
Affiliations:
1:
Department of Computer Science and Information Technology , University of Malakand , Chakdara Lower DIR, Khyber Pakhtunkhwa , Pakistan
-
Affiliations:
1:
Department of Computer Science and Information Technology , University of Malakand , Chakdara Lower DIR, Khyber Pakhtunkhwa , Pakistan
- Source:
Volume 2016, Issue 5,
May
2016,
p.
107 – 118
DOI: 10.1049/joe.2016.0089 , Online ISSN 2051-3305
Cloud computing is a growing computing paradigm that provides Internet-based computer services on-demand basis. Adoption of cloud infrastructure promises enterprises numerous benefits. In particular, hybrid cloud, a combination of both public and private clouds, offers benefits of both the public and private clouds. The objective of this study is to identify the critical challenges, faced by client organisations in the adoption of hybrid cloud computing. The authors have reviewed the literature through systematic literature review (SLR) process. We have followed all the SLR steps by developing SLR protocol first which was then validated and implemented. We have identified a list of ten challenges, by extracting data from a sample of 120 papers, in the adoption of hybrid cloud. The identified challenges include three critical challenges such as: ‘public cloud security concern’, ‘efficient management issue’, and ‘integration complexity’. We have further analysed the identified challenges with respect to time and study strategy. Clients should address all the identified challenges in general and the critical challenges in particular. Our next phase of the study is validation of the identified challenges through industry practitioners and to find solutions/practices for addressing these challenges, which will be published in future.
Inspec keywords: DP management; security of data; cloud computing
Other keywords: public clouds; time-and-study strategy; private clouds; Internet-based computer services; SLR protocol; integration complexity; efficient-management issue; client organisations; systematic literature review; hybrid cloud computing adoption; public cloud security concern
Subjects: Data security; Computing/EDP management; Internet software; Information networks
References
-
-
1)
-
20. Ali, N.B., Petersen, K., Wohlin, C.: ‘A systematic literature review on the industrial use of software process simulation’, J. Syst. Softw., 2014, 97, pp. 65–85 (doi: 10.1016/j.jss.2014.06.059).
-
-
2)
-
35. Jiang, W.Z., Sheng, Z.Q.: ‘A new task scheduling algorithm in hybrid cloud’. Int. Conf. on Cloud Computing and Service Computing, 2012.
-
-
3)
-
18. Zhang, H., Babar, M.A., Tell, P.: ‘Identifying relevant studies in software engineering’, Inf. Softw. Technol., 2011, 53, pp. 625–637 (doi: 10.1016/j.infsof.2010.12.010).
-
-
4)
-
28. Oktay, K.Y., Khadilkar, V., Hore, B., et al: ‘Risk-aware workload distribution in hybrid clouds’. IEEE Fifth Int. Conf. on Cloud Computing, 2012.
-
-
5)
-
29. Khan, S.U., Niazi, M., Ahmad, R.: ‘Factors influencing clients in the selection of offshore software outsourcing vendors: an exploratory study using a systematic literature review’, J. Syst. Softw., 2011, 84, (4), pp. 686–699 (doi: 10.1016/j.jss.2010.12.010).
-
-
6)
-
8. Ullah, N., Khan, S.U.: ‘Challenges in the adoption of hybrid cloud: preliminary results from a systematic literature review’. 21st Asia-Pacific Software Engineering Conf., Jeju Island, Korea, 2014.
-
-
7)
-
22. Khan, R.U., Khan, S.U., Khan, R.A., et al: ‘Motivators in green IT-outsourcing from vendors perspective: a systematic literature review’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 345–360.
-
-
8)
-
39. Bunch, C., Chohan, N., Krintz, C.: ‘Supporting placement and data consistency strategies using hybrid clouds’. IEEE 2012 Aerospace Conference, 3–10 March 2012, pp. 1–8.
-
-
9)
-
11. Rajan, S., Jairath, A.: ‘Cloud computing: the fifth generation of computing’. Communication Systems and Network Technologies (CSNT), 2011.
-
-
10)
-
27. Wang, J.K., Jia, X.: ‘Data security and authentication in hybrid cloud computing model’. IEEE Global High Tech Congress on Electronics, 2012.
-
-
11)
-
45. Niazi, M., et al: ‘Establishing trust in offshore software outsourcing relationships: an exploratory study using a systematic literature review’, IET Softw., 2013, 7, (5), pp. 283–293 (doi: 10.1049/iet-sen.2012.0136).
-
-
12)
-
10. Emilija, R., Gecevska, V., Pa, Z.: ‘Hybrid cloud computing model and its mid market utilization’. Proc. MTM, 2012.
-
-
13)
-
48. Khan, S.U., Azeem, M.I.: ‘Intercultural challenges in offshore software development outsourcing relationship: an empirical study’, J. Proc. Pak. Acad. Sci. A, Phys. Comput. Sci., 2016, 53, (1), pp. 75–88.
-
-
14)
-
31. Yan, S., Chen, C., Zhao, G., et al: ‘Cloud service recommendation and selection for enterprises’. Network and Service Management (CNSM) 18th Int. Conf. and Workshop on Systems Virtualiztion Management, 2012.
-
-
15)
-
34. Benmerzoug, D.: ‘An agent-based approach for hybrid multi-cloud applications’, Scalable Comput., Pract. Exp., 2013, 14, (2), pp. 95–109.
-
-
16)
-
2. Mithila, S., Kumar, P.P.: ‘Data security through confidentiality in cloud computing environment’, Int. J. Comput. Sci. Inf. Technol., 2011, 2, (5), pp. 1836–1840.
-
-
17)
-
16. Khan, S.U., Niazi, M., Rashid, A.: ‘Barriers in the selection of offshore software development outsourcing vendors: an exploratory study using a systematic literature review’, J. Inf. Softw. Technol., 2011, 53, (7), pp. 693–706 (doi: 10.1016/j.infsof.2010.08.003).
-
-
18)
-
50. Khan, A.W., Khan, S.U.: ‘Solutions for critical challenges in offshore software outsourcing contract’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 331–344.
-
-
19)
-
23. Staples, M., Niazi, M.: ‘Experiences using systematic review guidelines’, J. Syst. Softw., 2007, 80, (9), pp. 1425–1437 (doi: 10.1016/j.jss.2006.09.046).
-
-
20)
-
38. Noor, T.H., Sheng, Q.Z., Zeadally, S., et al: ‘Trust management of services in cloud environments: obstacles and solutions’, ACM Comput. Surv. (CSUR), 2013, 46, (1) (doi: 10.1145/2522968.2522980).
-
-
21)
-
40. Chopra, N., Singh, S.: ‘Deadline and cost based workflow scheduling in hybrid cloud’. Int. Conf. on Advances in Computing, Communications and Informatics (ICACCI), 2013.
-
-
22)
-
29. Balasubramanian, R., Aramudhan, M.: ‘Security issues: public vs. private vs. hybrid cloud computing’, Int. J. Comput. Appl., 2012, 55, (13), pp. 0975–8887.
-
-
23)
-
36. Bittencourt, L.F., Senna, C.R., Madeira, E.R.M.: ‘Scheduling service workflows for cost optimization in hybrid clouds’. Int. Conf. on Network and Service Management (CNSM), 2010.
-
-
24)
-
5. Leavitt, N.: ‘Hybrid clouds move to the forefront’ (IEEE Computer Society Press, Los Alamitos, CA, USA, 2013).
-
-
25)
-
17. Barbara, K.: ‘Guidelines for performing systematic literature reviews in software engineering’ (Keele University, UK, 2007).
-
-
26)
-
12. Ristova, E., Gecevska, V., Panov, Z.: ‘Hybrid cloud computing challenges and mass customization’. Fifth Int. Conf. on Mass Customization and Personalization, Europe, 2012.
-
-
27)
-
29. Khan, S.U., Azeem, M.I.: ‘Intercultural challenges in offshore software development outsourcing relationships: an exploratory study using a systematic literature review’, IET Softw., 2014, 8, pp. 161–173 (doi: 10.1049/iet-sen.2013.0012).
-
-
28)
-
16. Weinman, J.: ‘Hybrid cloud economics’, IEEE Cloud Comput., 2016, 3, (1), pp. 18–22 (doi: 10.1109/MCC.2016.27).
-
-
29)
-
30. Bennani1, N., Bennani, N., Ghedira, C., et al: ‘Towards a trust-manager service for hybrid clouds’. WISE 2011 and 2012 Combined Workshops, 2013, 2013, pp. 70–76.
-
-
30)
-
37. Abawajy, J.: ‘Establishing trust in hybrid cloud computing environments’. IEEE Tenth Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, pp. 118–125.
-
-
31)
-
43. Li, J., Chen, X., Jia, C., et al: ‘Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud’, in (EDs.): ‘Network and system security’ (Springer Verlag, Berlin & Heidelberg, 2012), pp. 490–502.
-
-
32)
-
6. Khadilkar, V., Kantarcioglu, M., Thu, B.: ‘Secure data processing in a hybrid cloud’, arXiv preprint arXiv, 2011, pp. 1105–1982.
-
-
33)
-
4. Mell, P., Grance, T.: ‘The NIST definition of cloud computing’ (NIST Special Publication, Gaithersburg, MD, USA, 2011).
-
-
34)
-
42. Garrison, G., Wakefield, R.L., Kim, S.: ‘The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations’, Int. J. Inf. Manage., 2015, 35, (4), pp. 377–393 (doi: 10.1016/j.ijinfomgt.2015.03.001).
-
-
35)
-
13. Heckel, P.C.: ‘Hybrid clouds: comparing cloud toolkits’. Seminar Paper Business Informatics, University of Mannheim, 2010.
-
-
36)
-
14. Nepal, S., Friedrich, C., Henry, L., Chen, S.: ‘A secure storage service in the hybrid cloud’. Fourth IEEE Int. Conf. on Utility and Cloud Computing, 2011.
-
-
37)
-
49. Khan, S.U., Ali, S.: ‘Empirical investigation of success factors for establishing software outsourcing partnership from vendor's perspective’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 315–328.
-
-
38)
-
15. Javadi, B., Abawajy, J., Buyya, R.: ‘Failure-aware resource provisioning for hybrid cloud infrastructure’, J. Parallel Distrib. Comput., 2012, pp. 1318–1331 (doi: 10.1016/j.jpdc.2012.06.012).
-
-
39)
-
8. Niazi, M., Wilson, D., Zowghi, D.: ‘A maturity model for the implementation of SPI’, J. Syst. Softw., 2003, 74, (2), pp. 155–172 (doi: 10.1016/j.jss.2003.10.017).
-
-
40)
-
27. Niazi, M.: ‘Do systematic literature reviews outperform informal literature reviews in the software engineering domain? An initial case study’, Arab. J. Sci. Eng., 2015, 40, pp. 612–643 (doi: 10.1007/s13369-015-1586-0).
-
-
41)
-
33. Khan, S.U., Niazi, M., Ahmed, R.: ‘Empirical investigation of success factors for offshore software development outsourcing vendors’, IET Softw., 2012, 6, (1), pp. 1–15 (doi: 10.1049/iet-sen.2010.0038).
-
-
42)
-
9. Savolainen and Eeva: ‘Cloud service models’. Seminar on Cloud Computing and Web Services, Department of Computer Science, University of Helsinki, Helsinki, 2012.
-
-
43)
-
7. Amrohi, A.H., Kumar, A.: ‘Benefits of hybrid hosting over conventional hosting’, Int. J. Comput. Sci. Netw. Secur., 2013, 13, (2), pp. 101–104.
-
-
44)
-
41. Qiu, X., Yeow, W.L., Wu, C., et al: ‘Cost-minimizing preemptive scheduling of map reduce workloads on hybrid clouds’. IEEE/ACM 21st Int. Symp. on Quality of Service (IWQoS), 2013.
-
-
45)
-
1. Buyyaa, R., Yeoa, C.S., Venu, S.: ‘Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility’, Fut. Generation Comput. Syst., 2009, pp. 599–616 (doi: 10.1016/j.future.2008.12.001).
-
-
46)
-
32. Bhadauria, R., Sanyal, S.: ‘Survey on security issues in cloud computing and associated mitigation techniques’, Int. J. Comput. Appl., 2012, 47, (18), pp. 0975–888.
-
-
47)
-
3. Carroll, M., Merwe, A.V.D., Kotzé, P.: ‘Secure cloud computing benefits, risks and controls’. Information Security South Africa (ISSA), 2011.
-
-
1)