Organization Background
Cloud computing can be defined as the delivery of various computing services, storages, servers, networking, database, analytics, software, intelligence and many more with the help of internet (Judson, McGrath and Peuchen 2017). Cloud computing offers faster innovation, economies of scale and avails flexible resources. The organizations pay for the number of services utilized by them. This helps in reducing the operating costs incurred in the process (Malawski, Juve and Deelman 2015). This also helps the organizations to run their infrastructure even more effectively as well as scale it according to the changes required by the This paper is about the usage of cloud computing in organizations
In this part of the paper, the background of the selected university will be discussed. The first selected organization is the Notre Dame University and the second organization is the Central Queensland University.
The first selected organization is the Notre Dame University which is an educational institute based in the United States (Malawski, Juve and Deelman 2015). This institute founded in the year of the 1842 and it was established by Father Edward Sorin. The head campus of the university is located in the states of Indiana near the South Bend city in the United States (Tommaso, Floden and Chatzou 2017). To gather more information about the selected university, in this case, the president of the university is interviewed who is the John I. Jenkins. John I. Jenkins selected as a president of the university on April 30, 2004, by the Notre Dame Board of Trustees (Dingler and Bui 2018). The IT department of the Notre Dame University is huge. Various types of services are given by the University of the Notre Dame. This IT related services include accounts and identity, technologies for audio and the video, file storage technology, digital media, networking solutions, management of university website and campus portal, smart class technology, security, enterprise content management and many more (Dingler and Bui 2018). In the following section the URL of the organization will be provided, and with that, the name and the title of the interviewed person will be shared.
The Central Queensland University established in the year 1967 (Zhang, Zheng and Wang 2017). This is also like the Notre Dame University which is an educational institute. This Central Queensland University is based on the Queensland, Australia. This university is a dual sector university of Australia (Zhang, Zheng and Wang 2017).The main headquarters or the campus is located in the Norman Gardens in the Rockhampton. With the main campus in the Rockhampton city, the other campuses of the Central Queensland University are available at the Adelaide, Melbourne, Sydney, Gladstone and in many more other cities of Australia (Schonberger, Radenovic and Chum 2015). In this case of the Central Queensland University to gather more information about the university the vice-chancellor of the university is interviewed who is the Scott Bowman (Tommaso, Floden and Chatzou 2017). The location of the Scott Bowman is currently now in Australia. The IT department size of the university is huge (Wei and Blake 2016). This IT department is used for providing technical solutions to the whole activity of the teaching, learning and research. The IT technology of the university is combined with the professional expertise to support the growing application of knowledge (Cong, Zhou and Wei 2018). Also, the university uses the IT services to continuously review and benchmark the performance of them to improve the planning, service delivery and customer engagement. In the following section, the website of the selected institute will be shared, and the name and the title of the interviewed person will be shared (Juve and Da Silva 2015).
Issues Studied
Utilization of cloud computing in organizations has been very common nowadays (Balis, Figiela and Jopek 2017). Along with numerous advantages, cloud computing also provides various disadvantages which can prove dangerous for the organizations. The issues studied in this paper are security issues, the issues regarding costs, issues of data privacy and issues of service provider reliability (Nahar, Kumar and Prasad 2016).
Security issues refer to the issues faced in securing the data that has been saved in the cloud (Wen, Chakareski and Frossard 2017). These issues are considered as major because they can prove to be dangerous for the organizations. If the data is not secured well, they might get in the hands of hackers or people who can misuse the data (Wibowo and Deng 2016). The issue regarding costs can be referred to as the cost that is invested in implementing cloud computing or to migrate the business in cloud computing platform (Wibowo, Grandhi and Wells 2016). Though migrating to cloud proves to be cost effective but the overall process has numerous hidden costs that are very expensive. Some hidden costs include perennial costs, not being flexible enough, migration cost and many more (Wen, Chakareski and Frossard 2017). Data privacy issues are the ones faced for securing the data. Confidential or sensitive data should be saved in a private place in order to keep it safe from unauthorized users (Tommaso, Floden and Chatzou 2017). The data regarding operations and personal details of staffs are very confidential; they should be saved in a private place. Service provider reliability is one of the major concerns of organizations (Malawski, Juve and Deelman 2015). Organizations must carry out proper research on the service providers before hiring cloud computing services. The reliability of cloud service providers is an important factor which can help the organization to keep their data safe (McGrath, Short and Ennis 2016). Every service provider ensures that they would keep the organizational data safer that the organization itself, but if there is any loss in the data, the organization will suffer the most as a result before hiring cloud services from any provider, an organization should assure that the provider has a good history regarding its services provided to other organizations (Fox, Ishakian and Muthusamy 2017). The issues are described below in details along with their individual literature analysis and the issues faced by both the organizations.
From the issue that has been discussed in this part of the paper, it can be said that the security issue faced by these organizations that uses cloud computing as a vital part of their business (Sanabria, Benedetto and Neyem 2018). Cloud computing allows access to the resources of data storage and computing which can be used in order to meet the unique requirements of the clients (Blanton 2016). The increasing need of computing, as well as storage accounts in order to maintain steady growth, has led the matter of security in a serious mode Di (Tommaso, Floden and Chatzou 2017). The data saved in the cloud might be at risk because hackers would look for single mistake or loophole in the system in order to steal the data and use it for ill purposes.
Organization 1
The University of Notre Dame has implemented cloud computing for numerous reasons. This implementation has helped them in various operations, but there have been some problems faced by the organization due to security issues in cloud computing (Wang, Lee and Chen 2015). This university has helped students and researchers to create their own login account and get access to the resources available for their academic purposes (Tommaso, Floden and Chatzou 2017). The organization faces this issue because there are more than 2,000 students and staffs, all of them have their own accounts along with their personal details saved in it (Meng and Thain 2015). These details whether professional or personal are saved in the cloud. There are high chances that they might get stolen by hackers with bad intentions.
Organization 2
CQ University has also enjoyed the services of cloud computing, but the security issue in this environment has been a barrier to the success of the organization (Ahmad and Ranka 2016). According to a survey it has been found that more than 70% of students and staffs said that they do not intend to use cloud computing in order to save their data because of the security issues (Alwabel, Walters and Wills 2015). One more reason for users to not use cloud computing is the increasing number of security breaches that had occurred in previous years (Aguiar, Zhang and Blanton 2014). The issues like protection of data from hackers, preventing data loss while transferring data, ensuring that the data is accessible to the members have prevented people to agree on using cloud computing (Sempolinski, Thain and Kareem 2015).
Comparative analysis
In the first organization, the members have been using cloud computing services for decreasing the workloads and saving their data (Ghouila, Siwo and Entfellner 2018). They do not need to use any storage devices in order to keep their data regarding all the operations and students as well as staffs safe. They have utilized these services by undertaking some measures for the better security of the data (Ko?odziej, Pop and Dobre 2018). They have a backup plan for their data so that in case the information in the cloud is affected. The organization would not suffer. In the second organization, they did implement cloud computing, but the members do not agree with relying on its services (Nwanganga, Saebi and Madey 2017). This is because of the privacy and security issues to the data saved in the cloud. The first organization has been more confident in using cloud computing than CQ University. The University of Notre Dame has utilized cloud computing to save their academic data as well as data related to the details of students and staff and many more reasons (Peng 2018). Cloud computing has actually been useful for the organization and helped them in maintaining the quality of services provided to the students. It also decreases their workloads because they do not need to concentrate on securing their data and can make strategies to make the organization grow more (Rathod, Rathod and Sheregar 2016).
Every organization irrespective of small or big owns a huge amount of data. This requires a large number of storage devices, and it makes the organizations spend a lot in it (Gesing, Wilkins-Diehr and Barker 2015). The migration of the entire system, as well as its infrastructure to a cloud environment, save the overall cost incurred in storage devices (Spjuth, Capuccini and Carone 2018). Though storing data in the cloud environment saves the overall cost but the initial process requires a lump sum amount of cost to be invested (Cui, Thompson and Taniguchi 2016). Migration of the business from its traditional environment to a cloud environment is quite a tough task which gives a cost-effective outcome. Growing or struggling organizations might have to face difficulty in migrating their business to the cloud environment because the initial cost of the implementation would be more than expected (Tommaso, Floden and Chatzou 2017). This is because; the process has numerous hidden costs such as charges for installing the process, software requirements for it and many more.
According to various researches, it has been found that there are several fields where an organization has to invest in the process of installing cloud computing services (Tommaso, Floden and Chatzou 2017).But moving to the cloud can also mean added costs, some of which are unexpected, according to IT executives whose organizations have implemented or are considering cloud services.
Organization 1
The first organization has invested enough on the processes that are required for installing cloud computing services; they have invested in this because they have planned to save the overall cost (Tommaso, Floden and Chatzou 2017). This has resulted in them to cost much more than expected and it created an issue for the organization (Tommaso, Floden and Chatzou 2017). They had to incur cost in various processes like moving as well as storing data.
Organization 2
The organization did spend the initial costs required to implement cloud computing services (Tommaso, Floden and Chatzou 2017). They did not succeed in this because most of the users did not agree with using the services due to the fear of security and privacy issues. The organization had to implement cloud computing services in order to save their data in a secured place but investing a lump sum of money just to secure data is not worth it (Tommaso, Floden and Chatzou 2017). As a result, the organization faced an issue due to this.
Comparative analysis
In case of both the organizations, the first organization investigated in cloud computing services and was successful because students as well as staffs used the services to its fullest but still the organization felt that the money invested in the process was more than it was needed (Tommaso, Floden and Chatzou 2017). The second organization also spent a lot of money on implementing cloud computing, but they did not find it worth it because they could use it only for saving a part of their data.
Issue 3- Data Privacy
Literature analysis
The entire business management setup will process the data which ought to be present in the database of the association, and this will assist in the better projection of the statistics organization (Ali, Khan and Vasilakos 2015). This makes the information that is existing in the database of the project will be achieved with the assistance of the poaching of statistics that are kept in the database of the organization (Tommaso, Floden and Chatzou 2017). The openness of the database will guarantee the fact that the management of the data access can be accessed by anyone (Avram 2014). This is the leading cause that the updating of the processing system is necessary. This indicates the terminology that the information that is deposited in the database will not be performed with the efficient propagation of the data management (Bettig 2018). This ensures that the projection of the statistics that are deposited in the database of the Central Queensland University. After the prognosis of the information that are stored induces the fact that the data will stay protected, and the imposters cannot harm the projection of data and this is the foremost prospect of the data organization and this is the main reason that the projection of the statistics commencement of the data management is processed in a positive way (Bettig 2018).
Organization 1
The main issue that is existing in the processing of the university regarding the statistics organization will include the fact that the data management of the processing of the data administration of the whole University of Notre Dame is not very high (Chen 2015). This is because the entire website that is present includes the fact that it is not concerned with the storage of data (Dan, International project management 2015). This incurs the fact that the statistics administration of the university is not achieved with maximum robustness. This ensures the datum that it gets easy for the frauds to gain access to the data case of the organization and fetch data from the dispensation of the data centre (Draho 2016). The datum that the data will be stored in the database is not of much use for the hackers. It gets less activation in the processing of the data center, and this is the central processing of the data prosecution. This ensures the terminology that the interest of imposters on the statistics that are present in the database is low, and this provides the terminology that the figures managing of the complete business processing get easier (Etro 2015). The accessing system of the database is set as public this is the main reason that the projection of the data management will lead to improved transcription of the information administration system
Organization 2
In case of the Central Queensland University, the main probation that is present is that the figures that are extant in the database of the organization is not public in nature and the records that are kept in the database are protected from the outsiders (He, Yan and Da Xu 2014). The data that are stored in the database of the Central Queensland University includes information that is private in nature (Laukkanen 2015). Personal details of the employees are also stored in the database of the Central Queensland University. This is what makes the database of Central Queensland University feel the urgency of proper protection from the imposters (Lee and Lee 2015). In case the imposters want to gain data they can crack the code of conduct of the Central Queensland University (Lian, Yen and Wang 2014). This is the primary purpose that the projection of the business viability can be proclaimed with the assistance of the records prosecution, and this is the solitary motive that the processing of the data administration can be achieved with the aid of the different techniques that are contemporary in the curse of hacking of the database system (Madakam, Ramaswamy and Tripathi 2015). The data about the meting out of the data management in terms of the prosecution of the projection of the entire website of the orga1nization is stated in this case the prediction of the figures supervision is affected as the propagation of the data is terminated in terms of the screening of the data packaging (Oliveira, Thomas and Espadanal 2014). The statistics that are deposited in the database of the organization are affected negatively. The screening of the data that are present in the database includes the processing of the data that are present in the database (Porterfield 2015). The primary technique that is implemented in the processing of the database includes the updating of the, and this is the objective in the projection of the data management is not very robust in nature.
Comparative analysis
From the above report, it can be stated that the prognostication of the documents that are existent in the database of the Notre Dame University is single of the main motive that projects the statistics organization (Raisch 2016). The fact that the platform that is used by the Notre Dame University can be processed in general terms. In case the projection of the terminology insists the fact that the data considering of the commenced database that will be performed with the help of the procurement of the analysis that has been performed with the help of the gathered information (Rittinghouse J.W. and Ransome 2016). This ensures that the functioning of the data security is not very high and these lefts to the detail that the figures that are existing in the database of the organization can be functioned with the help of the database which will affect the data management of the data transaction (Sen 2014). The imposters can easily get the data that are present in the database. In case the terminology that is selected in the projection of the data (Sookhak, Gani and Khan 2017). In case of the Central Queensland University, information that is saved in the database is protected .This is the only reason that affects the functioning during the projection of the saving of the statistics in the database. In case the data that are stored in the database of the Central Queensland University is targeted, the data will ensure the fact that the processing of the data management can be personified with the help of data management (Wu, Garg and Buyya 2015). This is the main motive behind the proper storage of the organization will be prosecuted with utmost efficiency am this leads to the fact that the data stays e protected and this helps in understanding the projection of the data that are in process. For getting the data that are stored in the platform of the database, the main prosecution that is to be performed is that the imposters need to crack the security wall of the database (Martin-Flatin 2014). This ensures the terminology that accessing the data that are important for the commencing business in an efficient will not be an easy way out. After the completion of the data analysis, business processing can be achieved with the help of the data projection that ensures that the data that are present in the database stayed safe and secured (Zhang, Yao and Guan 2017). After completion of the entire analysis, it can be stated that the imposters cannot use the data that are present in the database. This is the reason that the data protection will be performed with the highest integrity and the security of the data that are present in the database can be accomplished with ease (Rittinghouse and Ransom 2016). In case the terminology that is used in the process of data storage is maintained with the highest security, and this is the primary process by which the data security is achieved.
Issue 4- Service provider reliability
Literature analysis
The main fact that the data will get modulated will lose the destination address, and the data will not reach to its destination, and this affects the processing of the data procurement in a negative way (Chinneck, Litoiu and Woodside 2014). The main aspiring fact that is taken in the projection of the data correlation will lead to transcription of data management system, and this will create problems for the users as the data that are to be transacted gets unsuccessful and the users of the data-centric organization will be affected the most (Elster, Tzovaras and Petcu 2016). This is the reason that the functioning of the Amazon web services for the University of Notre Dame is very important. This includes the terminology regarding the processing of data in the functioning of the business organization includes that no data will reach to the clients (Martin-Flatin 2014). The Central Queensland University has an additional segment. Keeping a back up of the data is considered as one of the major reason for the data manipulation of the data prosecution (Zhang, Yao and Guan 2017). This is one of the most compelling circumstances that will procure the availability of data despite the processing of the data poaching. Even though the data that is stored in the database is accessed by the imposter, it can be stated that the Central Queensland University will have a separate set of data as the management of the data will be performed with high accuracy
Organization 1
The Notre Dame University uses the platform of the Amazon web services. This includes the element that the projection of the data controlling can be procured with the benefit of infrastructure that is created by Amazon (Rittinghouse and Ransome 2016). The brand loyalty of the Amazon web services has been increasing, and this helps in trusting the data procurement will be performed with the assistance of the platform of could computing. This helps in understanding the fact that the projection of the data center will be performed with the highest efficiency (Schonberger, Radenovic and Chum 2015). In case the terminology that is processed in the terminology will be performed with the benefit of the obtaining of the data security. In case the implementation of the Amazon web services, the data that are processed with the help of the data management can be achieved with the help of the data transaction (Schonberger, Radenovic and Chum 2015). In case the proposition of the data, that is to be transferred through this platform ensures that the projection of the data terminology. This is the main reason that the projection of the data projection can be proclaimed and the transaction of the data will be done successfully. This will affect the functioning of the University in a better way. This proposed the fact that better and proficient functioning can be performed with the highest data projection (Wen, Chakareski and Frossard 2017). This is one of the main reasons that the projection of the data transfer will be performed with the highest priority. The data that is to be sent by the University of Notre Dame will be performed with the help of the data prosecution. In case the data that is being sent by the University of Notre Dame is not well modulated, the main problem that it will face is that the projection of the data handling cannot be performed with high efficiency (Wen, Chakareski and Frossard 2017). The imposters can use the processing of the data that are being sent as the data manipulation. In case the platforms of the data that are being transacted are accessed by the imposters they can change the data that are being transacted.
Organization 2
The webs service that is used by the Central Queensland University takes into consideration the terminology of the supervision of data transcription is performed by the AARNET Cloud store (Wen, Chakareski and Frossard 2017). This acts as a vital reason that the prognosis of the data management will be achieved with the help of proper modulating technology. In case the data that is being transferred the information in it is kept protected with the help of the data modulation (Wen, Chakareski and Frossard 2017). The data that is to be deposited in the database of the association will embrace the fact that the prediction of the data scheme of data commencement will be achieved with the utmost effectiveness. In the instance, the terminology that is present in the projection of data structuring as the data that is sent in the processing of the modulation technique is hampered and the imposters cannot gain access to the data.
Comparative analysis
The projection of the data that is to be compiled will take into consideration the data that are stored in the database of the Central Queensland University. It is having better security and reliance as the data are provided with proper backup and this information to the instance that the data that are administered with the prediction of the data will be performed with the highest vocabulary (Wen, Chakareski and Frossard 2017). In the case of Notre Dame University, proper security is provided by the platform, but no proper backup system is present in the projection of the data commencement.
Organizations have numerous members, and every member has their own user login id and password (Wen, Chakareski and Frossard 2017). This log in id and passwords should be kept secure and strong. A strong password is a must while creating a good profile.
Organization 1
The first organization has educated people on ways to create a strong password and maintaining it (Wen, Chakareski and Frossard 2017). The user id might have the name of the user, but the password must not contain any name, date of births and credentials that are easy to guess (Wen, Chakareski and Frossard 2017). The students, as well as staffs, follow the rules or steps that are necessary to create a strong profile. The users are told to update or change their passwords once in a while.
Organization 2
The second organization used cloud computing services and also assured that the users create their account as well as maintain it regularly (Wen, Chakareski and Frossard 2017). The users who did not agree in using cloud computing services were practically shown through examples that a secured profile could be kept safe room unauthorized users and hackers. They were convinced on the fact that the usage of cloud computing does not always create security or privacy issues, they can be avoided to a great extent with the help of some effort taken by the users (Wen, Chakareski and Frossard 2017).
Many times, people share their personal data through online transactions or other ways like social media (Wen, Chakareski and Frossard 2017). The users should be educated on the fact that the organizational data such as information regarding operations of the organization, their strategies and many more are very confidential and should be secured on highest priority (Wen, Chakareski and Frossard 2017). The users must not share this data with anyone by any means. Most of the times, users’ share it with someone close or through social media by posting them in such platform. This might prove to be very dangerous for the organization because unauthorized users or hackers wait for these situations and attack the website when they get access to some important data (Wen, Chakareski and Frossard 2017).
Organization 1
The University of Notre Dame have implemented cloud computing services and provided proper training to students as well as staffs regarding the ways by which they can keep their data safe and prevent them from getting in the hands of hackers (Sanabria, Benedetto and Neyem 2018). They are educated about the fact that any data regarding the organization or their personal data should not be shared with anyone through social media or conversation.
Organization 2
CQ University has provided knowledge to the students and staffs regarding the fact that the data should not be shared with anyone (Sanabria, Benedetto and Neyem 2018). They are taught various ways by which they can secure their data from getting into unsafe who can use it for ill purposes.
Data regarding the students and employees should not be allowed access to everyone (Sanabria, Benedetto and Neyem 2018). The data related to whereabouts if the staffs should not be accessed by the students because this might cause internal threat where students might use the data for wrong intentions (Sanabria, Benedetto and Neyem 2018). For example, if a student gets to know where a professor keeps their test papers, he might have the wrong intention to steal question paper before the tests and do well without working hard. These sorts of thoughts are very common among students.
Organization 1
This organization makes sure that students or teachers are not allowed to access each other’s profile or id (Sanabria, Benedetto and Neyem 2018). The passwords staffs’ id is kept secret, and no one other than the staff members know their passwords. This keeps the data secret and prevents any wrong plans to be executed. The organization has also created different portals for students and staffs which leaves no chances for anyone to peek into others’ portal and enter assumed passwords in order to get access to the data (Sanabria, Benedetto and Neyem 2018).
Organization 2
This organization helps the students as well as staffs to keep their data secured by using a strong password (Sanabria, Benedetto and Neyem 2018). They provide proper training to staffs and students individually regarding the ways by which they can prevent their data from getting accessed by others (Sanabria, Benedetto and Neyem 2018). They are also suggested not to share their passwords with any other students or staffs.
Updating the system is one of the most important parts of securing data in the database and preventing the hackers or cybercriminals to get access to the data (Tommaso, Floden and Chatzou 2017). The updating of the operating system improves the security policies of the system and helps the user to make their profile more secured.
Organization 1
The first organization has trained the students as well as staffs to update their systems as well as portals regularly (Tommaso, Floden and Chatzou 2017). The updating of systems provides better security to the system, and when the portal is updated, it provides added features to the portal along with better security.
Organization 2
The second organization did not work much in updating the system (Tommaso, Floden and Chatzou 2017). This is because most of the members do not use the services of cloud computing. They do update the systems used by students as well as staffs (Tommaso, Floden and Chatzou 2017). They also make changes in the services of cloud computing and help them in encouraging using cloud computing services.
Conclusion
From the analysis, it can be concluded that as two of the organization has a different organizational principle, they have different viewpoints towards integrating technology with the organizational working principle and improving the organizational workflow. While the first organization wants to integrate the technology to inspire students to deal with technology integration in work environment, while the other organization wants the students to experience the technology and improve their knowledge about latest technology. As part of the organization policy both the organization has considered the cloud computing as it is one of the trending technology in the IT sector. The organization might have different viewpoints about the technologies; however, in both of the cases, the primary motivation for considering cloud computing is to increase the efficiency of the organizational database to store various students’ related data and that too with proper security. Cloud computing helps to scale the database as per the need the data and also comes with improved security tools like data backup, data retrieval, data encryption and other advanced security features as well. However, the efficiency of the service depends on the service provider as well as the pricing.
Although the primary motivation for the choice of cloud computing is the same for both the organization, due to different work policy both the organization is having different evaluation about the issues of cloud computing. This is evident in the approach taken by two organizations for choosing the service. The first organization thinks that in order to ensure that the chosen service is secure all it needs is to decide proper service provider with appropriate research. It is true that the service provider is responsible for ensuring that the service offered to the customer is secure and efficient; it is not the only criteria. Apart from that, the organization itself has some responsibilities, and this view is supported by the second university as they have their data backup plan apart from what comes with the service. It is, however, a better approach than to completely depend on the service provider and expect them to treat the organizational assets with the highest priority, just like the organization itself would have done. Hence depending completely on the external service provider for internal data security is not a wise choice if the security of the data is considered as the most valuable assets for the organization.
Instead of a different view about the data security and service provider reliability, both the organization is having the same view about the cost factor involved in deploying the internal data server in the cloud framework. According to the CEO of both the organization, one of the main reason why the cloud computing increase the cost for the service integration is that have some additional features that are not described in details in the policy document due to technical complexity and hence charge for those features always makes the customer feels that those costs should have been properly described to improve the transparency of the service. However, it can be concluded that cloud computing increases organizational efficiency instead of the initial cost for integrating the cloud server with the local data server. However, the investment is of worth as it improves the organizational efficiency as well as the data security which is of the highest importance to any organization.
References
Aguiar, E., Zhang, Y. and Blanton, M., 2014. An overview of issues and recent developments in cloud computing and storage security. In High Performance Cloud Auditing and Applications (pp. 3-33). Springer, New York, NY.
Ahmad, I. and Ranka, S. eds., 2016. Handbook of Energy-Aware and Green Computing-Two Volume Set. CRC Press.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges. Information sciences, 305, pp.357-383.
Alwabel, A., Walters, R.J. and Wills, G., 2015. DesktopCloudSim: simulation of node failures in the cloud.
Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.
Balis, B., Figiela, K., Jopek, K., Malawski, M. and Pawlik, M., 2017. Porting HPC applications to the cloud: A multi-frontal solver case study. Journal of Computational Science, 18, pp.106-116.
Bettig, R.V., 2018. Cloud computing: The political economy of intellectual property. Routledge.
Blanton, M., 2016. A Comprehensive Toolset for General-Purpose Private Computing and Outsourcing. University of Notre Dame Du Lac Notre Dame United States
Chen, X., 2015. Decentralized computation offloading game for mobile cloud computing. IEEE Transactions on Parallel and Distributed Systems, 26(4), pp.974-983.
Chinneck, J., Litoiu, M. and Woodside, M., 2014, March. Real-time multi-cloud management needs application awareness. In Proceedings of the 5th ACM/SPEC international conference on Performance engineering (pp. 293-296). ACM.
Cong, P., Li, L., Zhou, J., Wei, T., Chen, M. and Hu, S., 2018. Profit-Driven Dynamic Cloud Pricing for Multiserver Systems Considering User Perceived Value. IEEE Transactions on Parallel and Distributed Systems.
Cui, S., Thompson, J.S., Taniguchi, T., Ladid, L., Li, J., Eckford, A. and Wong, V.W., 2016. Guest Editorial Emerging Technologies. IEEE Journal on Selected Areas in Communications, 34(3), pp.457-459.
Dan, A., International project management, 2015. Method and apparatus for leading effective project execution for new business.
Di Tommaso, P., Floden, E., Chatzou, M. and Notredame, C., 2017. Using the Nextflow framework for reproducible in-silico omics analyses across clusters and clouds. PeerJ Preprints, 5, p.e2796v1.
Dingler, A. and Bui, P., 2018. Using workqueue to teach distributed computing. Journal of Computing Sciences in Colleges, 34(1), pp.192-194.
Dingler, A. and Bui, P., 2018. Using workqueue to teach distributed computing. Journal of Computing Sciences in Colleges, 34(1), pp.192-194.
Drahos, P., 2016. A philosophy of cloud computing. Routledge.
Elster, A.C., Tzovaras, D., Petcu, D. and Morrison, J.P., 2016. CLOUDLIGHTNING: A Framework for a Self-organising and Self-managing Heterogeneous Cloud.
Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts, Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Fox, G.C., Ishakian, V., Muthusamy, V. and Slominski, A., 2017. Status of serverless computing and function-as-a-service (faas) in industry and research. arXiv preprint arXiv:1708.08028.
Gesing, S., Wilkins-Diehr, N., Barker, M. and Pierantoni, G., 2016. Science Gateway Workshops 2015 Special Issue Conference Publications. Journal of Grid Computing, 14(4), pp.495-498.
Ghouila, A., Siwo, G.H., Entfellner, J.B.D., Panji, S., Button-Simons, K.A., Davis, S.Z., Fadlelmola, F.M., Ferdig, M.T., Mulder, N., Bensellak, T. and Ghansah, A., 2018. Hackathons as a means of accelerating scientific discoveries and knowledge transfer. Genome research, 28(5), pp.759-765.
Gide, E. and Sandu, R., 2015, October. A Study to Explore the Key Factors Impacting on Cloud Based Service Adoption in Indian SMEs. In e-Business Engineering (ICEBE), 2015 IEEE 12th International Conference on (pp. 387-392). IEEE.
He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), pp.1587-1595.
Judson, B., McGrath, G., Peuchen, E.H., Champion, M.M. and Brenner, P., 2017, June. Cloud IaaS for Mass Spectrometry and Proteomics: On-Demand Coupling of Cloud Computing to Experimental Facilities. In Proceedings of the 8th Workshop on Scientific Cloud Computing (pp. 17-24). ACM.
Juve, G., Tovar, B., Da Silva, R.F., Król, D., Thain, D., Deelman, E., Allcock, W. and Livny, M., 2015, September. Practical resource monitoring for robust high throughput computing. In Cluster Computing (CLUSTER), 2015 IEEE International Conference on (pp. 650-657). IEEE.
Ko?odziej, J., Pop, F. and Dobre, C. eds., 2018. Modeling and Simulation in HPC and Cloud Systems (Vol. 36). Springer.
Laukkanen, T., 2015. The definition and scope of the cloud computing. Industrial Marketing Management, 42, pp.35-46.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Lian, J.W., Yen, D.C. and Wang, Y.T., 2014. An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), pp.28-36.
Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of Things (IoT): A literature review. Journal of Computer and Communications, 3(05), p.164.
Malawski, M., Juve, G., Deelman, E. and Nabrzyski, J., 2015. Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds. Future Generation Computer Systems, 48, pp.1-18.
Martin-Flatin, J.P., 2014. Challenges in Cloud Management. IEEE Cloud Computing, 1(1), pp.66-70.
McGrath, G., Short, J., Ennis, S., Judson, B. and Brenner, P., 2016, June. Cloud event programming paradigms: Applications and analysis. In Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on (pp. 400-406). IEEE.
Meng, H. and Thain, D., 2015, June. Umbrella: A portable environment creator for reproducible computing on clusters, clouds, and grids. In Proceedings of the 8th International Workshop on Virtualization Technologies in Distributed Computing (pp. 23-30). ACM.
Nahar, J., Kumar, K., Prasad, A., Sharma, N., Khan, A., Singh, S., Shania, S., Kumar, A., Singh, J. and Imam, T., 2016, December. Potentials of Data Mining and Cloud Computing in the Fish Poisoning and Relevant Economic Contexts: A Conceptual Review. In Computer Science and Engineering (APWC on CSE), 2016 3rd Asia-Pacific World Congress on (pp. 250-257). IEEE.
Nwanganga, F., Saebi, M., Madey, G. and Chawla, N., 2017, June. A Minimum-Cost Flow Model for Workload Optimization on Cloud Infrastructure. In Cloud Computing (CLOUD), 2017 IEEE 10th International Conference on (pp. 480-487). IEEE.
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), pp.497-510.
Peng, G., 2018. The Application of Right of Information Network Dissemination in SaaS Mode of Cloud Computing.
Porterfield, T.E., 2015.project management: an empirical investigation of cloud computing scope and success. International Journal of information Management, 40(6), pp.435-455.
Raisch, W., 2016. Towards a sufficiency-driven business model: Experiences and opportunities. Definition of effective project management for cloud service, 18, pp.41-61.
Rathod, N., Rathod, P., Sheregar, R. and Gourshete, G., 2016. Mobile Based Cloud Data Retrieval System.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Sanabria, P., Benedetto, J.I., Neyem, A., Navon, J. and Poellabauer, C., 2018, May. Code offloading solutions for audio processing in mobile healthcare applications: a case study. In Proceedings of the 5th International Conference on Mobile Software Engineering and Systems (pp. 117-121). ACM.
Schonberger, J.L., Radenovic, F., Chum, O. and Frahm, J.M., 2015. From single image query to detailed 3d reconstruction. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 5126-5134).
Sempolinski, P., Thain, D., Wei, Z. and Kareem, A., 2015. Adapting collaborative software development techniques to structural engineering. Computing in Science & Engineering, 17(5), pp.27-34.
Sen, J., 2014. Security and privacy issues in cloud computing. In Architectures and protocols for secure information technology infrastructures (pp. 1-45). IGI Global.
Sookhak, M., Gani, A., Khan, M.K. and Buyya, R., 2017. Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, pp.101-116.
Spjuth, O., Capuccini, M., Carone, M., Larsson, A., Schaal, W., Novella, J., Di Tommaso, P., Notredame, C., Moreno, P., Khoonsari, P.E. and Herman, S., 2018. Approaches for containerized scientific workflows in cloud environments with applications in life science (No. e27141v1). PeerJ Preprints.
Wang, W., Lee, C.H., Chen, L., Yu, F.R. and Su, H.J., 2015. Ieee access special section editorial: Emerging cloud-based wireless communications and networks. IEEE Access, 3, pp.3122-3124.
Wei, Y. and Blake, M.B., 2016. Proactive virtualized resource management for service workflows in the cloud. Computing, 98(5), pp.523-538.
Wen, Y., Chakareski, J., Frossard, P., Wu, D. and Zeng, W., 2017. Guest Editorial Special Issue on Visual Computing in the Cloud: Mobile Computing. IEEE Transactions on Circuits and Systems for Video Technology, 27(1), pp.1-5.
Wibowo, S. and Deng, H., 2016, July. Evaluating the performance of Cloud services: A fuzzy multicriteria group decision making approach. In Computer, Consumer and Control (IS3C), 2016 International Symposium on (pp. 327-332). IEEE.
Wibowo, S., Grandhi, S., Wells, M. and Balasooriya, P., 2016, August. A multicriteria group decision making procedure for selecting cloud based ERP system providers. In Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International Conference on (pp. 1071-1076). IEEE.
Wu, L., Garg, S.K. and Buyya, R., 2015, December. Service level agreement (SLA) based SaaS cloud management system. In Parallel and Distributed Systems (ICPADS), 2015 IEEE 21st International Conference on (pp. 440-447). IEEE.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Zhang, D.Y., Zheng, C., Wang, D., Thain, D., Mu, X., Madey, G. and Huang, C., 2017, June. Towards scalable and dynamic social sensing using a distributed computing framework. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on (pp. 966-976). IEEE.
Zhang, Y., Yao, J. and Guan, H., 2017. Intelligent cloud resource management with deep reinforcement learning. IEEE Cloud Computing, 4(6), pp.60-69.