LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Opara-Martins, J.; Sahandi, Reza; Tian, Feng (2014)
Publisher: IEEE
Languages: English
Types: Unknown
Subjects:
Cloud computing offers an innovative business model\ud for organizations to adopt IT services at a reduced cost with increased reliability and scalability. However organizations are slow in adopting the cloud model due to the prevalent vendor lock-in issue and challenges associated with it. While the existing cloud solutions for public and private companies are vendor locked-in by design, their existence is subject to limited possibility\ud to interoperate with other cloud systems. In this paper we have presented a critical review of pertinent business, technical and legal issues associated with vendor lock-in, and how it impacts on the widespread adoption of cloud computing. The paper attempts to reflect on the issues associated with interoperability and portability, but with a focus on vendor lock-in. Moreover, the paper demonstrates the importance of interoperability, portability and standards applicable to cloud computing environments along with highlighting other corporate concerns due to the lock-in problem. The outcome of this paper provides a\ud foundation for future analysis and review regarding the impact of vendor neutrality for corporate cloud computing application and services.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] D. Sitaram, and G. Manjunath, “Moving To the Cloud: Developing Apps in the New World of Cloud Computing” Elsevier, USA 2012.
    • M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, pp. 50 - 58, 2010.
    • [3] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6, pp. 599-616, 2009.
    • [4] V. Andrikopoulos, T. Binz, F. Leymann and S. Strauch, "How to Adapt Applications for the Cloud Environment: Challenges and Solutions in Migrating Applications to the Cloud," Computing, vol. 95, no. 6, pp. 493-535, 2013.
    • [5] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud Migration Research: A Systematic Review” IEEE Transactions on Cloud Computing 2013. Available from: http://doras.dcu.ie/19636/1/TCC-AcceptedVersion.pdf [Accessed on the 5th March 2014].
    • [6] A. N. Toosi, R. N. Calheiros, and R. Buyya, “Interconnected Cloud Computing Environments: Challenges, Taxonomy and Survey,” ACM Computing. Survey. Vol. 5, Article A, 2013.
    • [7] X. Liu, and H. Ye, “A Sustainable Service-Oriented B2C Framework for Small Businesses” 4th IEEE International Symposium on ServiceOriented Systems Engineering (SOSE'08), Taiwan, Dec 2008.
    • [8] D. Petcu. “Portability and Interoperability between Clouds: Challenges and Case Study,” In Towards a Service-Based Internet. Vol. 6994. Springer Berlin Heidelberg, 62-74, 2011.
    • [9] R. Wang, “Adopting Cloud Computing: Seeing the Forest for the Trees” 2013 [online]. Available from: http://www.forbes.com/sites/oracle/2013/09/20/adopting-cloudcomputing-seeing-the-forest-for-the-trees/ [Accessed on 12th February 2014].
    • [10] J. Miranda, J. Guillen, and J. Murillo, “Identifying Adaptation Needs to Avoid the Vendor Lock-in Effect in the Depolyment of Cloud ServiceBased Applications (SBAs)” 2012.
    • [11] M. Toivonen, "Cloud Provider Interoperability and Customer Lock-in" Dept. of Computer Science, University of Helsinki, Research Paper 2013.
    • [12] K. Stravoskoufos, A. Preventis, S. Sotiriadis, and E.G.M. Petrakis, "A Survey on Approaches for Interoperability and Portability of Cloud Computing Services" 2013.
    • [13] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” in University of California, Berkeley, Technical Report No. UCB/EECS-2009-28. 2009.
    • [14] Pearson, S. and A. Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing, in IEEE CloudCom, 2010. p. 693-702.
    • [15] S. M. Razavian, H. Khani, and N. Yazdani, "An Analysis of Vendor Lock-in Problem in Cloud Storage" 3rd International Conference on Computer Knowledge Engineering (ICCKE), 2013.
    • [16] K. Bhavya, K. Yamini and V. Sreenivas, "Cloud Services Portability for Secure Migration" International Journal of Computer Trends and Technology (IJCTT), Vol 4, Issue 4, 2013.
    • [17] C. Pahl, L. Zhang, and F. Fowley, "A Look at Cloud Architecture Interoperability through Standards" 2013.
    • [18] A. Govindarajan, and L. Lakshmanan, "Overview of Cloud Standards in Cloud Computing" London: Springer London, 2010 pp. 77 -89.
    • [19] A. Panhelainen, “Interoperable and Portable Cloud Services” Aalto University School of Chemical Technology, Spring 2012
    • [20] B. W. Fitzpatrick and JJ. Lueck, “The Case Against Data Lock -in,” ACM Queue, 2010.
    • [21] J. Bozman, “Cloud Computing: The Need for Portability Interoperability,” 2010 [online]. Available http://delimiter.com.au/wp-content/uploads/2010/10/The-need-forportability-and-interoperability-IDC.pdf [Accessed on 6th March 2014].
    • [22] K. X. Zhu and Z. Z. Zhou, "Lock-in Strategy in Software Competition: Open-Source Software vs. Proprietary Software," Information Systems Research, 2011
    • [23] P. David, and S.M. Greenstein, "The Economics of Compatibility Standards: An Introduction to Recent Research," Economics of Innovation and New Technology, Vol. 1, 1990, pp. 1-29.
    • [24] A. Sheth and A. Ranabahu, "Semantic Modeling for Cloud Computing, Part I & II," IEEE Internet Computing Magazine, vol. 14, pp. 81-83, 2010.
    • [25] J. Pooyan, A. Aakash and P. Claus, "Cloud Migrattion Research: A Systematic Review," IEEE Transactions on Cloud Computing, [online] 2013.Available from: http://doras.dcu.ie/19636/
    • [26] World Economic Forum (WEF), "Advancing Cloud Computing: What to do now?" Priorities for Industry and Governments, WEF in Partnership with Accenture, 2011.
    • [27] P. Mell, and T. Grance, "The NIST Definition of Cloud Computing." Technical report, 2009.
    • [28] T. Dillion, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," Advanced Information Networking and Application (AINA), 24th 2014 Conference, pp. 752-757, 2010.
    • [29] JISC Legal Information, "Report on Cloud Computing and the Law for UK FE and HE (An Overview)," 2011.
    • [30] G. A. Lewis, "Role of Standards in Cloud-Computing Interoperability," IEEE, 46th Hawaii International Conference on Systsem Sciences, pp. 1652-1661, 2012.
    • [31] Cloud Security Alliance (CSA), "Security Guidance For Critical Areas of Focus in Cloud Computing," V3.0, 2011.
    • [32] R. R. Wang, “The Enterprise Cloud Buyer's Bill of Rights: SaaS Applications,” How to maximize your investment an d avoid potential Vendor lock-in, Best Practices Report, 2012.
    • [33] Ahronovitz, Miha, et al. for the Cloud Computing Use Cases Discussion Group. Cloud Computing Use Cases White Paper (Version 4.0) [online].
    • [34] G. S. Machado, D. Hausheer, and B. Stiller,“Considerations on the Interoperability of and between Cloud Computing Standards,” [online]. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.51, 2010 (Accessed on 17th May 2014).
    • [35] C. S. Yoo, “Cloud Computing: Architectural and Policy Implications," [online]. Available from: http://techpolicyinstitute.org/files/yoo%20architectural_and_policy_impl ications.pdf, 2010 (Accessed on 27th April 2014).
    • [36] Cisco, "Planning the Migration of Enterprise Applications to the Cloud," A Guide to your migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices, 2010.M. Kavis, “Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS),” John Wiley & Sons, 2014.
    • [37] R. Buyya, R. Ranjan, and R. N. Calheiros. “InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services.” In Proceedings of the 10th InternationalConference on Algorithms and Architectures for Parallel Processing (ICA3PP '10), Vol. 6081 Busan, South Korea, 13-31. 2010.
    • [38] A. V. Parameswaran and A. Chaddha, "Cloud Interoperablility and Standardization," Infosys, 2013.
    • [39] M. Kavis, “Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS),” John Wiley & Sons, 2014.
    • [40] D. Linthicum, “The API Is Everything for Cloud Computing.” InfoWorld [online] Available from: http://www.infoworld.com/d/cloudcomputing/the-api-everything-cloud-computing481?source=IFWNLE_nlt_cloud_2010-06-07 (2010). [Accessed on 6th April 2014]
    • [41] Information Systems Audit and Control Association (ISACA), "Cloud Computing Market Maturity," Study Results, 2012. Available from: https://downloads.cloudsecurityalliance.org/initiatives/collaborate/isaca/ 2012-Cloud-Computing-Market-Maturity-Study-Results.pdf [Accessed 19th May 2014].
    • [42] M. G. Avram, “Advantages and challenges of adopting cloud computing from an enterprise perspective,” The 7th International Conference Interdisciplinarity in Engineering (INTER-ENG 2013).
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article