CFP last date
20 December 2024
Reseach Article

Migration to Cloud Computing: A Risk Homeostasis Methodology

by Hamse Yuusuf, Christopher Tubb
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 7
Year of Publication: 2013
Authors: Hamse Yuusuf, Christopher Tubb
10.5120/13404-1056

Hamse Yuusuf, Christopher Tubb . Migration to Cloud Computing: A Risk Homeostasis Methodology. International Journal of Computer Applications. 77, 7 ( September 2013), 5-9. DOI=10.5120/13404-1056

@article{ 10.5120/13404-1056,
author = { Hamse Yuusuf, Christopher Tubb },
title = { Migration to Cloud Computing: A Risk Homeostasis Methodology },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 7 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number7/13404-1056/ },
doi = { 10.5120/13404-1056 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:37.714635+05:30
%A Hamse Yuusuf
%A Christopher Tubb
%T Migration to Cloud Computing: A Risk Homeostasis Methodology
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 7
%P 5-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years virtualization has gained significant momentum. Organisations are looking at this technology seriously because of potential savings and of scalability advantage. According to Gartner's survey in early 2010 [1] of 1600 CIOs around the world, virtualization and cloud computing was on top of their IT investment list. This interest has also resulted in slew of products and services from existing IT players as well as new comers which promise to offer many solutions to pave the path towards migrating to virtual environment. As organizations start investing in virtualization, they look towards their current IT setup and in an attempt to identify the best way they can take advantage of what cloud has to offer. For a given enterprises, getting on to cloud might be a complete new start from scratch; a limited deployment of new applications or migration of part of existing applications integrating backwards with on-premise applications. To take advantage of the virtualization, enterprise will need to define their short and long term cloud strategy. There is a need to consider factors specific to their businesses and determine their requirements, risks and benefits. Proper investigation by the enterprise will give insight in to the benefits and specific strategy they need to follow to gain the said benefits from cloud computing. This paper analyses cloud benefits, risks and proposes specific migration methodology which enterprises can adopt to make sure the migration and integration between on- premise and cloud happens with minimal disruption to business and results in maximum sustainable cost benefit.

References
  1. Cearley, D. W. Cloud Computing Key Initiative Overview. Gartner Research (2010).
  2. David S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise. Addison-Wesley Information Technology Series, 2010
  3. Janis Stirna, Anne Persson. Ten Years Plus with EKD: Reflections from Using an Enterprise Modeling Method in Practice. http://ceur-ws. org/Vol-365/paper10. pdf
  4. Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, Volume 25, Issue 6, June 2009, Pages 599-616, ISSN 0167 739X,10. 1016/j. future. 2008. 12. 001.
  5. Fehling, Christoph; Ewald, Thilo; Leymann, Frank; Pauly, Michael; Rtschlin, Jochen; Schumm, David, Capturing Cloud Computing Knowledge and Experience in Patterns, http://www. iaas. unistuttgart. de/institut/mitarbeiter/fehling/INPROC-2012-104
  6. Luis, M. V. , Luis, R,-M. , et al. (2008) A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev. , 39, 50-55.
  7. Cattedddu, D. and Hogben, G. (2009): Cloud Computing: Benefits, risks and recomendations for information security; European Network and Information Security Agency ENISA;
  8. jeffrey, k. and neidecker-lutz, b. (2009): the future of cloud computing: opportunities for European cloud computing beyond 2010; 66
  9. CHOW, R. , GOLLE, P. , et al. (2009) Cloud Computing: Outsourcing Computation Without Outsourcing Control. 1st ACM Cloud Comptuting Security Workshop. ACM
  10. JENSEN, M. and SCHWENK, J. (2009) On Technical Security Issues in Cloud Computing. 2009 IEEE Conference on Cloud Computing. IEEE Computer Society
  11. Michael Armbrust, Armando Fox. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report, February 10, 2009
  12. Dr Achrin Luhn , Michael Jaekel. Cloud Computing Business Models, Value Creation Dynamics and Advantages for Customers Dr Achrin Luhn , Michael Jaekel. Cloud Computing Business Models, Value Creation Dynamics and Advantages for Customers
  13. Microsoft Research, Securing Microsoft's Cloud Infrastructure," White Paper, 2009, http://www. globalfoundationservices. com/security/documents/SecuringtheMSCloudMay09. pdf
  14. Gary Anthesm, Security in the Cloud (2010) Communication of the ACM Vol. 53 No. 11
  15. Ronald L. Krutz and Russell Dean Vines, Cloud Security, A comprehensive guide to Secure Computing
  16. Youseff, L. , Butrico, M. and Da Silva, D. 2008. Toward a Unified Ontology of Cloud Computing. In Grid Computing Environments Workshop (GCE '08), Austin, Texas, USA, November 2008, 1-10.
  17. Sun Microsystems. 2009. Introduction to Cloud Computing architecture. Whitepaper. Sun Microsystems.
  18. Luis Vaquero, Luis Rodero-Merino, Juan Caceres, et al, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2009.
  19. Gary Anthesm, Security in the Cloud (2010) Communication of the ACM Vol. 53 No. 11
  20. Virtualization from the Datacenter to the Desktop. (2007). White paper, Microsoft virtualization Resources.
  21. The Cloud :Changing the business ecosystem,2011 www. kpmg. com
  22. Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. Security guidance for critical areas of focus in cloud computing, v2. 1. Cloud Security Alliance, 2009, 76p
  23. NIST, NIST Definition of cloud omputing v15, NIST, Editor. 2009, National Institute of Standards and Technology: Gaithersburg, MD (2009).
  24. A. Khajeh-Hosseini, I. Sommerville, and D. Greenwood, Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS Submitted to 1st ACM Symposium on Cloud Computing (SOCC 2010), 2010
  25. Sotto, L. J. , Treacy, B. C. , et al, Privacy and Data Security Risks in Cloud Computing; The National Bureau of National Affairs, Inc; 15 ECLR 186. (2010)
  26. LSE, Castro, D, Grous, A , Karrberg, P, Modelling the Cloud - Employment effects in two exemplary sectors in The United States, the United Kingdom, Germany and Italy, January 2012
  27. Redshift Research, Adoption, Approaches and Attitudes:The Future of Cloud Computing in the Public and Private Sectors, 2011.
  28. D. C. Wyld, Moving to the cloud: An introduction to cloud computing in government. Washington, DC: IBM Center for the Business of Government, November 2009.
  29. Hustinx, P. , Data Protection and Cloud Computing under EU law, Third European Cyber Security Awareness Day, BSA,European Parliament 2010.
  30. Xuan Zhang Wuwong, N. Hao Li Xuejie Zhang , Information Security Risk Management Framework for the Cloud Computing Environments in 2010 IEEE 10th The International Conference Computer and Information Technology (CIT), 2010,pp. 1328 1334.
  31. Pearson, S. and Azzedine Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing in 2010 IEEE Second International Conference Cloud Computing Technology and Science (CloudCom),Nov 30-Dec 3,2010, page(s): 693- 702.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Migration Cloud Risks.