Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Challenges in the adoption of hybrid cloud: an exploratory study using systematic literature review

Cloud computing is a growing computing paradigm that provides Internet-based computer services on-demand basis. Adoption of cloud infrastructure promises enterprises numerous benefits. In particular, hybrid cloud, a combination of both public and private clouds, offers benefits of both the public and private clouds. The objective of this study is to identify the critical challenges, faced by client organisations in the adoption of hybrid cloud computing. The authors have reviewed the literature through systematic literature review (SLR) process. We have followed all the SLR steps by developing SLR protocol first which was then validated and implemented. We have identified a list of ten challenges, by extracting data from a sample of 120 papers, in the adoption of hybrid cloud. The identified challenges include three critical challenges such as: ‘public cloud security concern’, ‘efficient management issue’, and ‘integration complexity’. We have further analysed the identified challenges with respect to time and study strategy. Clients should address all the identified challenges in general and the critical challenges in particular. Our next phase of the study is validation of the identified challenges through industry practitioners and to find solutions/practices for addressing these challenges, which will be published in future.

References

    1. 1)
    2. 2)
      • 35. Jiang, W.Z., Sheng, Z.Q.: ‘A new task scheduling algorithm in hybrid cloud’. Int. Conf. on Cloud Computing and Service Computing, 2012.
    3. 3)
    4. 4)
      • 28. Oktay, K.Y., Khadilkar, V., Hore, B., et al: ‘Risk-aware workload distribution in hybrid clouds’. IEEE Fifth Int. Conf. on Cloud Computing, 2012.
    5. 5)
    6. 6)
      • 8. Ullah, N., Khan, S.U.: ‘Challenges in the adoption of hybrid cloud: preliminary results from a systematic literature review’. 21st Asia-Pacific Software Engineering Conf., Jeju Island, Korea, 2014.
    7. 7)
      • 22. Khan, R.U., Khan, S.U., Khan, R.A., et al: ‘Motivators in green IT-outsourcing from vendors perspective: a systematic literature review’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 345360.
    8. 8)
      • 39. Bunch, C., Chohan, N., Krintz, C.: ‘Supporting placement and data consistency strategies using hybrid clouds’. IEEE 2012 Aerospace Conference, 3–10 March 2012, pp. 18.
    9. 9)
      • 11. Rajan, S., Jairath, A.: ‘Cloud computing: the fifth generation of computing’. Communication Systems and Network Technologies (CSNT), 2011.
    10. 10)
      • 27. Wang, J.K., Jia, X.: ‘Data security and authentication in hybrid cloud computing model’. IEEE Global High Tech Congress on Electronics, 2012.
    11. 11)
    12. 12)
      • 10. Emilija, R., Gecevska, V., Pa, Z.: ‘Hybrid cloud computing model and its mid market utilization’. Proc. MTM, 2012.
    13. 13)
      • 48. Khan, S.U., Azeem, M.I.: ‘Intercultural challenges in offshore software development outsourcing relationship: an empirical study’, J. Proc. Pak. Acad. Sci. A, Phys. Comput. Sci., 2016, 53, (1), pp. 7588.
    14. 14)
      • 31. Yan, S., Chen, C., Zhao, G., et al: ‘Cloud service recommendation and selection for enterprises’. Network and Service Management (CNSM) 18th Int. Conf. and Workshop on Systems Virtualiztion Management, 2012.
    15. 15)
      • 34. Benmerzoug, D.: ‘An agent-based approach for hybrid multi-cloud applications’, Scalable Comput., Pract. Exp., 2013, 14, (2), pp. 95109.
    16. 16)
      • 2. Mithila, S., Kumar, P.P.: ‘Data security through confidentiality in cloud computing environment’, Int. J. Comput. Sci. Inf. Technol., 2011, 2, (5), pp. 18361840.
    17. 17)
    18. 18)
      • 50. Khan, A.W., Khan, S.U.: ‘Solutions for critical challenges in offshore software outsourcing contract’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 331344.
    19. 19)
    20. 20)
    21. 21)
      • 40. Chopra, N., Singh, S.: ‘Deadline and cost based workflow scheduling in hybrid cloud’. Int. Conf. on Advances in Computing, Communications and Informatics (ICACCI), 2013.
    22. 22)
      • 29. Balasubramanian, R., Aramudhan, M.: ‘Security issues: public vs. private vs. hybrid cloud computing’, Int. J. Comput. Appl., 2012, 55, (13), pp. 09758887.
    23. 23)
      • 36. Bittencourt, L.F., Senna, C.R., Madeira, E.R.M.: ‘Scheduling service workflows for cost optimization in hybrid clouds’. Int. Conf. on Network and Service Management (CNSM), 2010.
    24. 24)
      • 5. Leavitt, N.: ‘Hybrid clouds move to the forefront’ (IEEE Computer Society Press, Los Alamitos, CA, USA, 2013).
    25. 25)
      • 17. Barbara, K.: ‘Guidelines for performing systematic literature reviews in software engineering’ (Keele University, UK, 2007).
    26. 26)
      • 12. Ristova, E., Gecevska, V., Panov, Z.: ‘Hybrid cloud computing challenges and mass customization’. Fifth Int. Conf. on Mass Customization and Personalization, Europe, 2012.
    27. 27)
    28. 28)
    29. 29)
      • 30. Bennani1, N., Bennani, N., Ghedira, C., et al: ‘Towards a trust-manager service for hybrid clouds’. WISE 2011 and 2012 Combined Workshops, 2013, 2013, pp. 7076.
    30. 30)
      • 37. Abawajy, J.: ‘Establishing trust in hybrid cloud computing environments’. IEEE Tenth Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, pp. 118125.
    31. 31)
      • 43. Li, J., Chen, X., Jia, C., et al: ‘Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud’, in (EDs.): ‘Network and system security’ (Springer Verlag, Berlin & Heidelberg, 2012), pp. 490502.
    32. 32)
      • 6. Khadilkar, V., Kantarcioglu, M., Thu, B.: ‘Secure data processing in a hybrid cloud’, arXiv preprint arXiv, 2011, pp. 11051982.
    33. 33)
      • 4. Mell, P., Grance, T.: ‘The NIST definition of cloud computing’ (NIST Special Publication, Gaithersburg, MD, USA, 2011).
    34. 34)
    35. 35)
      • 13. Heckel, P.C.: ‘Hybrid clouds: comparing cloud toolkits’. Seminar Paper Business Informatics, University of Mannheim, 2010.
    36. 36)
      • 14. Nepal, S., Friedrich, C., Henry, L., Chen, S.: ‘A secure storage service in the hybrid cloud’. Fourth IEEE Int. Conf. on Utility and Cloud Computing, 2011.
    37. 37)
      • 49. Khan, S.U., Ali, S.: ‘Empirical investigation of success factors for establishing software outsourcing partnership from vendor's perspective’, Proc. Pak. Acad. Sci. J., 2015, 52, (4), pp. 315328.
    38. 38)
    39. 39)
    40. 40)
    41. 41)
    42. 42)
      • 9. Savolainen and Eeva: ‘Cloud service models’. Seminar on Cloud Computing and Web Services, Department of Computer Science, University of Helsinki, Helsinki, 2012.
    43. 43)
      • 7. Amrohi, A.H., Kumar, A.: ‘Benefits of hybrid hosting over conventional hosting’, Int. J. Comput. Sci. Netw. Secur., 2013, 13, (2), pp. 101104.
    44. 44)
      • 41. Qiu, X., Yeow, W.L., Wu, C., et al: ‘Cost-minimizing preemptive scheduling of map reduce workloads on hybrid clouds’. IEEE/ACM 21st Int. Symp. on Quality of Service (IWQoS), 2013.
    45. 45)
    46. 46)
      • 32. Bhadauria, R., Sanyal, S.: ‘Survey on security issues in cloud computing and associated mitigation techniques’, Int. J. Comput. Appl., 2012, 47, (18), pp. 0975888.
    47. 47)
      • 3. Carroll, M., Merwe, A.V.D., Kotzé, P.: ‘Secure cloud computing benefits, risks and controls’. Information Security South Africa (ISSA), 2011.
http://iet.metastore.ingenta.com/content/journals/10.1049/joe.2016.0089
Loading

Related content

content/journals/10.1049/joe.2016.0089
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address