Abstract
In traditional IT organizations, the operator has complete control of and visibility into their service offering and infrastructure. All components are accessible and can be measured by the enterprise’s set of well known tools. Whether complex or simple, all components are used to analyze the measured metrics and tune their systems to their optimal performance. However, an enterprise no longer has control of or visibility into the components of the service when using Cloud services. Without this visibility, the service-level warrantee is no longer straightforward. Additionally, attempts at isolating problems between an enterprise and its vendor has become more commonplace and deal with more complex issues. Thus, the relationship between Cloud vendors and enterprises must evolve.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chappell, C.: Preparing for Cloud Computing: the managed services revolution. CA. Nov 2008. http://ca.com/files/whitepapers/ca_Cloud_computing_en_us_1108.pdf
The seven elements of Cloud Computing values. MWD Advisors. 2009–2010. http://itredux.com/wp-content/uploads/2009/10/Cloud-Computing-Values.png
Knorr, E., Gruman, G.: What Cloud Computing really means. InfoWorld. http://www.infoworld.com/d/Cloud-computing/what-Cloud-computing-really-means-031?page=0,2
Golden, B.: The case against Cloud Computing, Part: II. CIO. http://www.cio.com/article/478419/The_Case_Against_Cloud_Computing_Part_Two?source=home_ts (2009). 29 Jan 2009
Puhlmann, N.: NCOIC Federal Cloud storefront workshop. CSA. 21 Sept 2009, p. 188
Cloud Computing’s other Achilles’ heel: software licensing. f5 Dev Central. Jan 2009. http://devcentral.f5.com/weblogs/macvittie/archive/2009/01/27/Cloud-computings-other-achilles-heel-software-licensing.aspx
Kaplan, J.M.: 6 key challenges facing Cloud Computing in 2010 and beyond. Seeking Alpha. Jan 2010. http://seekingalpha.com/article/180606-6-key-challenges-facing-Cloud-computing-in-2010-and-beyond
Unharnessing collective intelligence: a business model for privacy on mobile devices based on k-anonymity. Dec 2008. http://opengardensblog.futuretext.com/archives/2008/12/unharnessing_co.html
Linthicum, D: The data interoperability challenge for Cloud Computing. Info World. Jan 2010. http://www.infoworld.com/d/Cloud-computing/data-interoperability-challenge-Cloud-computing-259
Golden, B.: The case against Cloud Computing, Part: I. CIO. Jan 2009. http://www.cio.com/article/477473/The_Case_Against_Cloud_Computing_Part_One
Chong, F., Miguel, A., et al.: Design considerations for S+S and Cloud Computing. Microsoft Arch. J. (Sept 2009). http://msdn.microsoft.com/en-us/architecture/aa699439.aspx
Ness, G.: Bringing Cloud Computing down to earth. Sys.Com. April 2009. http://gregness.sys-con.com/node/896594
Fraser, J.: Cloud Camp Milan, stories from the trenches. RightScale Inc. Sept 2009. http://www.slideshare.net/gabriele_bozzi/Cloud-camp-milan-rightscale-stories-from-the-trenches
Fellows, R.: How real is Cloud computing/storage? Info Store. Sept 2009. http://www.infostor.com/index/articles/display/8822717913/articles/infostor/backup-and_recovery/Cloud-storage/how-real_is_Cloud.html
Safety in numbers: a Cloud-based immune system for computers. Science Daily. Jan 2010. http://www.sciencedaily.com/releases/2010/01/100127085540.htm
Bachega, L.R.: Statistical approaches for finding bugs in large-scale parallel systems. www.cs.purdue.edu/homes/xyzhang/readinggroup/leonardo.ppt
Gao, Q., Qin, F., Panda, D.K.: DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements. The Ohio State University (2007). http://sc07.supercomputing.org/schedule/pdf/pap351.pdf
Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented Cloud Computing: vision, hype, and reality for delivering IT services as computing utilities. The University of Melbourne, Manjrasoft Pty Ltd. http://www.buyya.com/papers/hpcc2008_keynote_Cloudcomputing.pdf
Khosla, P.: Information security for the next century—why we need an information-centric approach to data protection. Carnegie Mellon CyLab
Gartner, J.B.: Seven Cloud-Computing security risks. Info World. July 2008. http://www.infoworld.com/d/security-central/gartner-seven-Cloud-computing-security-risks-853?page=0,0
Scofield, M.: Issues of data ownership. Information Management. Nov 1998. http://www.information-management.com/issues/19981101/296-1.html
DATA CENTER FABRIC: Data-at-Rest encryption scenarios. Brocade. Sept 2008. http://www.brocade.com/downloads/documents/technical_briefs/Encryption_Scenarios_GA-TB-100-01.pdf
Data at rest, data in transit, data in use. Pat’s Daily Grind. http://padraic2112.wordpress.com/2007/07/26/data-at-rest-data-in-transit-data-in-use/ (2007). 26 July 2007
Sweeney, L.: k-anonymity: a model for protecting privacy. School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA. http://privacy.cs.cmu.edu/people/sweeney/kanonymity.pdf
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: privacy beyond k-anonymity. Department of Computer Science, Cornell University. http://www.cs.cornell.edu/~vmuthu/research/ldiversity.pdf
Johnson, K.: Courion to lead webinar on managing secure access for Cloud Computing environments. Courion. Jan 2010. http://www.courion.com/company/press_release.html?id=560
Melcon, C., Avoyan, H., et al.: Secure access to SaaS applications: signify extends 2FA hosted service to Apps like Salesforce.com and Google Apps, Cloud Expo: Blog Feed Post. http://Cloudcomputing.sys-con.com/node/1201472 (2009). 25 Nov 2009
Data-leak protection. Network World. Jan 2008. http://www.networkworld.com/community/node/23754
Data leakage prevention—overview. Pune Tech. June 2008. http://punetech.com/data-leakage-prevention-overview/
Bias, R.: Managing storage in the Cloud: challenges in embracing Cloud Storage. GoGrid/ServePath. Jan 2009. http://www.slideshare.net/randybias/challenges-embracing-Cloud-storage-presentation
Dynamic infrastructure: building the Cloud. Blade Network Technologies. http://www.bladenetwork.net/userfiles/image/Dynamic%20Infrastructure%20-%20Building%20the%20Cloud.png
Andrei, T.: Cloud Computing challenges and related security issues. Washington University, April 2009. http://www.cs.wustl.edu/~jain/cse571-09/ftp/Cloud/index.html#partnership
Golden, B.: The case against Cloud Computing, Part: III. CIO. Feb 2009. http://www.cio.com/article/479103/The_Case_Against_Cloud_Computing_Part_Three
Open Cloud Manifesto. Spring. 2009. http://www.scribd.com/doc/19708804/Open-Cloud-Manifesto
Hils, A.: Key issues for network, messaging, mobile security and security services infrastructure protection. Gartner. 2009. http://www.gartner.com/it/content/787500/787512/key_issues_for_network_messa.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Chang, W.Y., Abu-Amara, H., Sanford, J.F. (2011). Challenges of Enterprise Cloud Services1 . In: Transforming Enterprise Cloud Services. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9846-7_4
Download citation
DOI: https://doi.org/10.1007/978-90-481-9846-7_4
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-9845-0
Online ISBN: 978-90-481-9846-7
eBook Packages: Computer ScienceComputer Science (R0)