Skip to main content

Challenges of Enterprise Cloud Services1

  • Chapter
  • First Online:
  • 1596 Accesses

Abstract

In traditional IT organizations, the operator has complete control of and visibility into their service offering and infrastructure. All components are accessible and can be measured by the enterprise’s set of well known tools. Whether complex or simple, all components are used to analyze the measured metrics and tune their systems to their optimal performance. However, an enterprise no longer has control of or visibility into the components of the service when using Cloud services. Without this visibility, the service-level warrantee is no longer straightforward. Additionally, attempts at isolating problems between an enterprise and its vendor has become more commonplace and deal with more complex issues. Thus, the relationship between Cloud vendors and enterprises must evolve.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chappell, C.: Preparing for Cloud Computing: the managed services revolution. CA. Nov 2008. http://ca.com/files/whitepapers/ca_Cloud_computing_en_us_1108.pdf

  2. The seven elements of Cloud Computing values. MWD Advisors. 2009–2010. http://itredux.com/wp-content/uploads/2009/10/Cloud-Computing-Values.png

  3. Knorr, E., Gruman, G.: What Cloud Computing really means. InfoWorld. http://www.infoworld.com/d/Cloud-computing/what-Cloud-computing-really-means-031?page=0,2

  4. Golden, B.: The case against Cloud Computing, Part: II. CIO. http://www.cio.com/article/478419/The_Case_Against_Cloud_Computing_Part_Two?source=home_ts (2009). 29 Jan 2009

  5. Puhlmann, N.: NCOIC Federal Cloud storefront workshop. CSA. 21 Sept 2009, p. 188

    Google Scholar 

  6. Cloud Computing’s other Achilles’ heel: software licensing. f5 Dev Central. Jan 2009. http://devcentral.f5.com/weblogs/macvittie/archive/2009/01/27/Cloud-computings-other-achilles-heel-software-licensing.aspx

  7. Kaplan, J.M.: 6 key challenges facing Cloud Computing in 2010 and beyond. Seeking Alpha. Jan 2010. http://seekingalpha.com/article/180606-6-key-challenges-facing-Cloud-computing-in-2010-and-beyond

  8. Unharnessing collective intelligence: a business model for privacy on mobile devices based on k-anonymity. Dec 2008. http://opengardensblog.futuretext.com/archives/2008/12/unharnessing_co.html

  9. Linthicum, D: The data interoperability challenge for Cloud Computing. Info World. Jan 2010. http://www.infoworld.com/d/Cloud-computing/data-interoperability-challenge-Cloud-computing-259

  10. Golden, B.: The case against Cloud Computing, Part: I. CIO. Jan 2009. http://www.cio.com/article/477473/The_Case_Against_Cloud_Computing_Part_One

  11. Chong, F., Miguel, A., et al.: Design considerations for S+S and Cloud Computing. Microsoft Arch. J. (Sept 2009). http://msdn.microsoft.com/en-us/architecture/aa699439.aspx

  12. Ness, G.: Bringing Cloud Computing down to earth. Sys.Com. April 2009. http://gregness.sys-con.com/node/896594

  13. Fraser, J.: Cloud Camp Milan, stories from the trenches. RightScale Inc. Sept 2009. http://www.slideshare.net/gabriele_bozzi/Cloud-camp-milan-rightscale-stories-from-the-trenches

  14. Fellows, R.: How real is Cloud computing/storage? Info Store. Sept 2009. http://www.infostor.com/index/articles/display/8822717913/articles/infostor/backup-and_recovery/Cloud-storage/how-real_is_Cloud.html

  15. Safety in numbers: a Cloud-based immune system for computers. Science Daily. Jan 2010. http://www.sciencedaily.com/releases/2010/01/100127085540.htm

  16. Bachega, L.R.: Statistical approaches for finding bugs in large-scale parallel systems. www.cs.purdue.edu/homes/xyzhang/readinggroup/leonardo.ppt

  17. Gao, Q., Qin, F., Panda, D.K.: DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements. The Ohio State University (2007). http://sc07.supercomputing.org/schedule/pdf/pap351.pdf

  18. Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented Cloud Computing: vision, hype, and reality for delivering IT services as computing utilities. The University of Melbourne, Manjrasoft Pty Ltd. http://www.buyya.com/papers/hpcc2008_keynote_Cloudcomputing.pdf

  19. Khosla, P.: Information security for the next century—why we need an information-centric approach to data protection. Carnegie Mellon CyLab

    Google Scholar 

  20. Gartner, J.B.: Seven Cloud-Computing security risks. Info World. July 2008. http://www.infoworld.com/d/security-central/gartner-seven-Cloud-computing-security-risks-853?page=0,0

  21. Scofield, M.: Issues of data ownership. Information Management. Nov 1998. http://www.information-management.com/issues/19981101/296-1.html

  22. DATA CENTER FABRIC: Data-at-Rest encryption scenarios. Brocade. Sept 2008. http://www.brocade.com/downloads/documents/technical_briefs/Encryption_Scenarios_GA-TB-100-01.pdf

  23. Data at rest, data in transit, data in use. Pat’s Daily Grind. http://padraic2112.wordpress.com/2007/07/26/data-at-rest-data-in-transit-data-in-use/ (2007). 26 July 2007

  24. Sweeney, L.: k-anonymity: a model for protecting privacy. School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA. http://privacy.cs.cmu.edu/people/sweeney/kanonymity.pdf

  25. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: privacy beyond k-anonymity. Department of Computer Science, Cornell University. http://www.cs.cornell.edu/~vmuthu/research/ldiversity.pdf

  26. Johnson, K.: Courion to lead webinar on managing secure access for Cloud Computing environments. Courion. Jan 2010. http://www.courion.com/company/press_release.html?id=560

  27. Melcon, C., Avoyan, H., et al.: Secure access to SaaS applications: signify extends 2FA hosted service to Apps like Salesforce.com and Google Apps, Cloud Expo: Blog Feed Post. http://Cloudcomputing.sys-con.com/node/1201472 (2009). 25 Nov 2009

  28. Data-leak protection. Network World. Jan 2008. http://www.networkworld.com/community/node/23754

  29. Data leakage prevention—overview. Pune Tech. June 2008. http://punetech.com/data-leakage-prevention-overview/

  30. Bias, R.: Managing storage in the Cloud: challenges in embracing Cloud Storage. GoGrid/ServePath. Jan 2009. http://www.slideshare.net/randybias/challenges-embracing-Cloud-storage-presentation

  31. Dynamic infrastructure: building the Cloud. Blade Network Technologies. http://www.bladenetwork.net/userfiles/image/Dynamic%20Infrastructure%20-%20Building%20the%20Cloud.png

  32. Andrei, T.: Cloud Computing challenges and related security issues. Washington University, April 2009. http://www.cs.wustl.edu/~jain/cse571-09/ftp/Cloud/index.html#partnership

  33. Golden, B.: The case against Cloud Computing, Part: III. CIO. Feb 2009. http://www.cio.com/article/479103/The_Case_Against_Cloud_Computing_Part_Three

  34. Open Cloud Manifesto. Spring. 2009. http://www.scribd.com/doc/19708804/Open-Cloud-Manifesto

  35. Hils, A.: Key issues for network, messaging, mobile security and security services infrastructure protection. Gartner. 2009. http://www.gartner.com/it/content/787500/787512/key_issues_for_network_messa.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Chang, W.Y., Abu-Amara, H., Sanford, J.F. (2011). Challenges of Enterprise Cloud Services1 . In: Transforming Enterprise Cloud Services. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9846-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-9846-7_4

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-9845-0

  • Online ISBN: 978-90-481-9846-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics