Abstract
Cloud computing is very much accepted and acknowledged worldwide as a promising computing paradigm. On-demand provisioning based on a pay-per-use business model helps reduce costs through sharing computing and storage resources. Although cloud computing has become popular, some business and government organizations are still lagging behind in adopting cloud computing. This study reports the status of cloud utilization among business and government organizations, and the concerns of organizations regarding the adoption of cloud computing. The study shows that some government agencies are lagging behind in cloud computing use, while others are leading the way. Security is identified as the major reason for delay in adopting cloud computing. The outcomes of the data analysis process prove that some security measures such as encryption, access authentication, antivirus protection, firewall, and service availability are required by clients for adoption of cloud computing in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anthes, G.: Security in the cloud. Communications of the ACM 53(11), 16–18 (2010)
Krogstie, J.: Model-Based Development and Evolution of Information Systems: A Quality Approach. Springer (2012)
Hsu, D.F., Marinucci, D.: Advances in Cyber Security: Technology, Operations, and Experiences. Fordham University Press (2013)
Rimal, B.P., Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC, NCM 2009, pp. 44–51. IEEE Computer Society, Washington, DC (2009)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications 1(1), 7–18 (2010)
Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., Li, Q.: Comparison of several cloud computing platforms. In: Second International Symposium on Information Science and Engineering (ISISE), pp. 23–27 (2009)
Sempolinski, P., Thain, D.: A comparison and critique of eucalyptus, opennebula and nimbus. In: IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 417–426 (2010)
Ogrizovic, D., Svilic, B., Tijan, E.: Open source science clouds. In: Proceedings of the 33rd International Convention (MIPRO), pp. 1189–1192 (2010)
Brunette, G., Mogull, R.: Security Guidance for critical areas of focus in Cloud Computing V2.1. CSA (Cloud Security Alliance), USA, vol. 1 (2009), http://www.cloudsecurityalliance.org/guidance/csaguide.pdf (last visit on June 9, 2014)
Krutz, R., Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley (2010)
Hill, R., Hirsch, L., Lake, P., Moshiri, S.: Guide to Cloud Computing: Principles and Practice. Computer Communications and Networks. Springer (2012)
Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Communications of the ACM 56(2), 64–73 (2013)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft), p. 7. National Institute of Standards and Technology (2010)
Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8(6), 24–31 (2010)
Dillon, T., Wu, C., Chang, E.: Cloud computing: Issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27–33 (2010)
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Security & Privacy 9(2), 50–57 (2011)
Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier Science (2011)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583–592 (2012)
Aceto, G., Botta, A., de Donato, W., Pescapé, A.: Cloud monitoring: A survey. Computer Networks 57(9), 2093–2115 (2013)
Wood, T., Cecchet, E., Ramakrishnan, K.K., Shenoy, P., van der Merwe, J., Venkataramani, A.: Disaster recovery as a cloud service: Economic benefits & deployment challenges. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, HotCloud 2010, p. 8. USENIX Association, Berkeley (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Communications of the ACM 53(4), 50–58 (2010)
Kim, W., Kim, S.D., Lee, E., Lee, S.: Adoption issues for cloud computing. In: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2009, pp. 2–5. ACM, New York (2009)
Hoque, N., Bhuyan, M.H., Baishya, R., Bhattacharyya, D., Kalita, J.: Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications 40, 307–324 (2014)
Saunders, M., Lewis, P., Thornhill, A.: Research methods for business students. Prentice Hall (2009)
Muijs, D.: Doing Quantitative Research in Education with SPSS. SAGE Publications (2010)
Dawson, C.: Practical Research Methods: A User-friendly Guide to Mastering Research Techniques and Projects. How to books. How To Books (2002)
Creswell, J.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications (2012)
Louise Barriball, K., While, A.: Collecting data using a semi-structured interview: A discussion paper. Journal of Advanced Nursing 19(2), 328–335 (1994)
Richardson, S., Dohrenwend, B., Klein, D.: Interviewing: Its forms and functions. Basic Books (1965)
Gorden, R.: Interviewing: Strategy, Techniques, and Tactics. Dorsey Press (1987)
Price, J., Chamberlayne, D.W.: Descriptive and multivariate statistics. In: Gwinn, S.L., Bruce, C., Cooper, J.P., Hick, S. (eds.) Exploring Crime Analysis: Readings On Essential Skills, 2nd edn., pp. 179–183. BookSurge (2008)
Burnard, P.: A method of analysing interview transcripts in qualitative research. Nurse Education Today 11(6), 461–466 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Charif, B., Awad, A.I. (2014). Business and Government Organizations’ Adoption of Cloud Computing. In: Corchado, E., Lozano, J.A., Quintián, H., Yin, H. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2014. IDEAL 2014. Lecture Notes in Computer Science, vol 8669. Springer, Cham. https://doi.org/10.1007/978-3-319-10840-7_59
Download citation
DOI: https://doi.org/10.1007/978-3-319-10840-7_59
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10839-1
Online ISBN: 978-3-319-10840-7
eBook Packages: Computer ScienceComputer Science (R0)