THE IMPLEMENTATION OF CLOUD COMPUTING AS STRATEGIC TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT USING REGRESSION ANALYSIS
Keywords:
Cloud Computing, Sustainable development, Perceived valued, Regression analysisAbstract
As information technology has advanced, there has been a shift toward relying more and more on online cloud storage and computing services. There is no getting around the fact that recent times have seen a meteoric rise in interest in cloud computing. This technology is used by many different organisations as the central component of their information technology infrastructure. The use of cloud computing results in increased data processing efficiency across a variety of computer and storage systems that are available over the internet. The approaches have advanced as a direct result of the cutting-edge and forward-thinking computer procedures that are the foundation of the internet's core database and network architecture. In the 1990s, a new sort of cutting-edge computing known as grid computing came into being. 2005 saw the birth of two new computing paradigms: cloud computing and utility computing. Consolidating several virtual computing components into a single physical platform is one of the most distinguishing features of cloud computing services and infrastructure. These components include the central processing unit (CPU), the network, storage, and memory. A piece of software known as a hypervisor is responsible for isolating each virtual machine (VM) (used by Virtual box and VMware, for example). Using this strategy, one virtual disc or machine may be prevented from directly accessing the memory and programmes of another inside the same environment. This can be accomplished by using a firewall. Through the use of hardware abstraction, it is feasible to conceal the complexity of operating physical computer systems, while at the same time efficiently boosting the systems' processing capacity. Utilizing virtualization technology in the cloud comes with a number of benefits, including scalability and the capacity to support many tenants (one software programme serving many users at once). These properties are essential to cloud computing because they make sharing and pooling resources possible. Sharing and pooling resources provides a number of benefits, some of which include increased business value, more flexibility, and cost savings.
When it comes to the process of moving assets from cloud providers to cloud virtualization users, provisioning is an extremely important step. In order to fulfil the requirements of its clientele, the cloud service provider must create an acceptable number of virtual machines and make available sufficient amounts of resources. This may be accomplished by any one of the following three methods: advanced provisioning, dynamic provisioning, or user self-provisioning. The mechanism by which cloud services and resources are made available, known as dynamic provisioning, faces a number of challenges. These challenges include the correct configuration of virtual machines (VMs) and technological constraints such as disc space, processing power, memory, and network throughput. It's possible that the scalability of virtual machines, the setup of cloud systems, and other aspects of virtualization's deployment might provide some difficulties.
Downloads
References
R. Rezaei, T. K. Chiew, S. P. Lee, and Z. Shams Aliee, “A semantic interoperability framework for software as a service systems in cloud computing environments,” Expert Systems with Applications, vol. 41, no. 13, pp. 5751–5770, 2014.
W. L. Shiau and P. Y. K. Chau, “Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach,” Information Management, vol. 53, pp. 355–365, 2016.
T. Dillon, C. Wu, and E. Chang, “Cloud computing: issues and challenges,” in Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA '10), pp. 27–33, Perth, Australia, April 2010.
M. Fan, S. Kumar, and A. B. Whinston, “Short-term and long-term competition between providers of shrink-wrap software and software as a service,” European Journal of Operational Research, vol. 196, no. 2, pp. 661–671, 2009.
N. A. Sultan, “Reaching for the "cloud": How SMEs can manage,” International Journal of Information Management, vol. 31, no. 3, pp. 272–278, 2011.
M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
S. U. R. Malik, S. U. Khan, S. J. Ewen et al., “Performance analysis of data intensive cloud systems based on data management and replication: a survey,” Distributed and Parallel Databases, vol. 34, no. 2, pp. 179–215, 2016.
S. Haag and A. Eckhardt, “Organizational cloud service adoption: a scientometric and content- based literature analysis,” Journal of Business Economics, vol. 84, no. 3, pp. 407–440, 2014.
Benlian, M. Koufaris, and T. Hess, “Service quality in software-as-a-service: Developing the SaaS-Qual measure and examining its role in usage continuance,” Journal of Management Information Systems, vol. 28, no. 3, pp. 85–126, 2011.
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009.
T. Oliveira, M. Thomas, and M. Espadanal, “Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors,” Information and Management, vol. 51, no. 5, pp. 497–510, 2014.
V. Ratten, “Continuance use intention of cloud computing: Innovativeness and creativity perspectives,” Journal of Business Research, vol. 69, no. 5, pp. 1737–1740, 2016.
G. Garrison, S. Kim, and R. L. Wakefield, “Success factors for deploying cloud computing,” Communications of the ACM, vol. 55, no. 9, pp. 62–68, 2012.
Duncan, S. Creese, and M. Goldsmith, “An overview of insider attacks in cloud computing,” Concurrency Computation, vol. 27, no. 12, pp. 2964–2981, 2015.
M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: opportunities and challenges,” Information Sciences. An International Journal, vol. 305, pp. 357–383, 2015.
J. M. Del Alamo, R. Trapero, Y. S. Martin, J. C. Yelmo, and N. Suri, “Assessing privacy capabilities of cloud service providers,” IEEE Latin America Transactions, vol. 13, no. 11, pp. 3634–3641, 2015.
C. W. Autry, S. J. Grawe, P. J. Daugherty, and R. G. Richey, “The effects of technological turbulence and breadth on supply chain technology acceptance and adoption,” Journal of Operations Management, vol. 28, no. 6, pp. 522–536, 2010.
N. Phaphoom, X. Wang, S. Samuel, S. Helmer, and P. Abrahamsson, “A survey study on major technical barriers affecting the decision to adopt cloud services,” Journal of Systems and Software, vol. 103, pp. 167–181, 2015.
Abdollahzadehgan, M. M. Gohary, A. R. C. Hussin, and M. Amini, “The organizational critical success factors for adopting cloud computing in SMEs,” Journal of Information Systems Research and Innovation, vol. 4, no. 1, pp. 67–74, 2013.
T. Brandt, Y. Tian, M. Hedwig, and D. Neumann, “Autonomic management of Software as a Service systems with multiple quality of service classes,” in Proceedings of the 20th European Conference on Information Systems, (ECIS'12), Barcelona, Spain, June 2012.
J. Li, B. Li, T. Wo et al., “Cyber Guarder: a virtualization security assurance architecture for green cloud computing,” Future Generation Computer Systems, vol. 28, no. 2, pp. 379–390, 2012.
J. Spillner, G. Bombach, S. Matthischke, J. Müller, R. Tzschichholz, and A. Schill, “Information dispersion over redundant arrays of optimal cloud storage for desktop users,” in Proceedings of the 4th IEEE/ACM International Conference on Cloud and Utility Computing, (UCC'11), pp. 1–8, Melbourne, Australia, December 2011.
Q.-A. Wang, C. Wang, K. Ren, W.-J. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.
C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.