Business and Government Organizations’ Adoption of Cloud Computing | SpringerLink
Skip to main content

Business and Government Organizations’ Adoption of Cloud Computing

  • Conference paper
Intelligent Data Engineering and Automated Learning – IDEAL 2014 (IDEAL 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8669))

Abstract

Cloud computing is very much accepted and acknowledged worldwide as a promising computing paradigm. On-demand provisioning based on a pay-per-use business model helps reduce costs through sharing computing and storage resources. Although cloud computing has become popular, some business and government organizations are still lagging behind in adopting cloud computing. This study reports the status of cloud utilization among business and government organizations, and the concerns of organizations regarding the adoption of cloud computing. The study shows that some government agencies are lagging behind in cloud computing use, while others are leading the way. Security is identified as the major reason for delay in adopting cloud computing. The outcomes of the data analysis process prove that some security measures such as encryption, access authentication, antivirus protection, firewall, and service availability are required by clients for adoption of cloud computing in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anthes, G.: Security in the cloud. Communications of the ACM 53(11), 16–18 (2010)

    Article  Google Scholar 

  2. Krogstie, J.: Model-Based Development and Evolution of Information Systems: A Quality Approach. Springer (2012)

    Google Scholar 

  3. Hsu, D.F., Marinucci, D.: Advances in Cyber Security: Technology, Operations, and Experiences. Fordham University Press (2013)

    Google Scholar 

  4. Rimal, B.P., Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: Proceedings of the Fifth International Joint Conference on INC, IMS and IDC, NCM 2009, pp. 44–51. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  5. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications 1(1), 7–18 (2010)

    Article  Google Scholar 

  6. Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., Li, Q.: Comparison of several cloud computing platforms. In: Second International Symposium on Information Science and Engineering (ISISE), pp. 23–27 (2009)

    Google Scholar 

  7. Sempolinski, P., Thain, D.: A comparison and critique of eucalyptus, opennebula and nimbus. In: IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 417–426 (2010)

    Google Scholar 

  8. Ogrizovic, D., Svilic, B., Tijan, E.: Open source science clouds. In: Proceedings of the 33rd International Convention (MIPRO), pp. 1189–1192 (2010)

    Google Scholar 

  9. Brunette, G., Mogull, R.: Security Guidance for critical areas of focus in Cloud Computing V2.1. CSA (Cloud Security Alliance), USA, vol. 1 (2009), http://www.cloudsecurityalliance.org/guidance/csaguide.pdf (last visit on June 9, 2014)

  10. Krutz, R., Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley (2010)

    Google Scholar 

  11. Hill, R., Hirsch, L., Lake, P., Moshiri, S.: Guide to Cloud Computing: Principles and Practice. Computer Communications and Networks. Springer (2012)

    Google Scholar 

  12. Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Communications of the ACM 56(2), 64–73 (2013)

    Article  Google Scholar 

  13. Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft), p. 7. National Institute of Standards and Technology (2010)

    Google Scholar 

  14. Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

  15. Dillon, T., Wu, C., Chang, E.: Cloud computing: Issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27–33 (2010)

    Google Scholar 

  16. Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Security & Privacy 9(2), 50–57 (2011)

    Article  Google Scholar 

  17. Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier Science (2011)

    Google Scholar 

  18. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583–592 (2012)

    Article  Google Scholar 

  19. Aceto, G., Botta, A., de Donato, W., Pescapé, A.: Cloud monitoring: A survey. Computer Networks 57(9), 2093–2115 (2013)

    Article  Google Scholar 

  20. Wood, T., Cecchet, E., Ramakrishnan, K.K., Shenoy, P., van der Merwe, J., Venkataramani, A.: Disaster recovery as a cloud service: Economic benefits & deployment challenges. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, HotCloud 2010, p. 8. USENIX Association, Berkeley (2010)

    Google Scholar 

  21. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)

    Article  Google Scholar 

  22. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Communications of the ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  23. Kim, W., Kim, S.D., Lee, E., Lee, S.: Adoption issues for cloud computing. In: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2009, pp. 2–5. ACM, New York (2009)

    Google Scholar 

  24. Hoque, N., Bhuyan, M.H., Baishya, R., Bhattacharyya, D., Kalita, J.: Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications 40, 307–324 (2014)

    Article  Google Scholar 

  25. Saunders, M., Lewis, P., Thornhill, A.: Research methods for business students. Prentice Hall (2009)

    Google Scholar 

  26. Muijs, D.: Doing Quantitative Research in Education with SPSS. SAGE Publications (2010)

    Google Scholar 

  27. Dawson, C.: Practical Research Methods: A User-friendly Guide to Mastering Research Techniques and Projects. How to books. How To Books (2002)

    Google Scholar 

  28. Creswell, J.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications (2012)

    Google Scholar 

  29. Louise Barriball, K., While, A.: Collecting data using a semi-structured interview: A discussion paper. Journal of Advanced Nursing 19(2), 328–335 (1994)

    Article  Google Scholar 

  30. Richardson, S., Dohrenwend, B., Klein, D.: Interviewing: Its forms and functions. Basic Books (1965)

    Google Scholar 

  31. Gorden, R.: Interviewing: Strategy, Techniques, and Tactics. Dorsey Press (1987)

    Google Scholar 

  32. Price, J., Chamberlayne, D.W.: Descriptive and multivariate statistics. In: Gwinn, S.L., Bruce, C., Cooper, J.P., Hick, S. (eds.) Exploring Crime Analysis: Readings On Essential Skills, 2nd edn., pp. 179–183. BookSurge (2008)

    Google Scholar 

  33. Burnard, P.: A method of analysing interview transcripts in qualitative research. Nurse Education Today 11(6), 461–466 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Charif, B., Awad, A.I. (2014). Business and Government Organizations’ Adoption of Cloud Computing. In: Corchado, E., Lozano, J.A., Quintián, H., Yin, H. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2014. IDEAL 2014. Lecture Notes in Computer Science, vol 8669. Springer, Cham. https://doi.org/10.1007/978-3-319-10840-7_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10840-7_59

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10839-1

  • Online ISBN: 978-3-319-10840-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics