An Examination of Cloud Computing Benefits and Challenges
Cloud computing is one of the more recent developments in the field of technology. There is some consensus in current literature as to what the term denotes: fundamentally, it is suggested that cloud computing is the realisation of the ability to provide computing as a service. Armbrust et al. (2009) suggest that it is the ability to provide computing as a utility, software as a service. Buyya et al. (2008) compare the provision of computer utilities with the electricity and telephone utilities that are available today. Buyya et al. (2010) define it as ‘on demand delivery of infrastructure, applications, and business processes in a security-rich, shared, scalable computer environment over the Internet for a fee’. Armbrust et al. (2009) suggest that there are three new hardware aspects in cloud computing, namely:
- The illusion that there are infinite computing resources available on demand, which removes the need for provisioning.
- The elimination of up-front costs by cloud users. This allows the cloud service providers to begin with a small amount of hardware and increase it only when there is a corresponding need.
- The ability to pay for use of computing resources on a short-term basis such as by the hour or by the day. This facilitates efficient use of resources.
The rapid adoption of cloud computing has been spurred on by the many benefits that it bestows on users. However, the technology is not without its unique drawbacks. We examine both the benefits and drawbacks in an attempt to present a balanced view.
Benefits of Cloud Computing
Zhang et al. (2010) and Antonopoulos and Gillam (2010) list the following benefits of adopting cloud computing for business owners:
- No upfront investment cost – cloud service providers tend to use a pay-as-you-go pricing model, which means users can rent only what they need. The service providers themselves can add hardware as their demands increase.
- Lower operating cost – resources in the cloud can be allocated and reallocated on demand. This means that there is no need to provide for extra resources in anticipation of peak load.
- Scalable or elastic – the service providers are able to pool resources and expand their capacity to cater for surges in demand. Users are able to scale up on demand.
- Easy access – cloud services tend to be available over the Internet on a variety of devices, from desktop computers to mobile phones. This also has the added benefit of allowing the cloud users to be mobile. Cloud computing therefore is a practical solution for teleworkers and a mobile workforce.
- Reduced risk – business risks such as hardware failures are shifted to the service provider because the service infrastructure is outsourced. These service providers tend to be better at maintaining the service infrastructure on account of specialisation, which means costs and risks are reduced.
Mell and Grance (2011) explain that because cloud systems automatically control and optimise the resources that are used, resource usage is monitored, controlled and reported effectively. This helps to reduce costs as well as provide transparency to the user. They also explain that different types of clouds exist, such as private clouds (for the exclusive use of a single organisation), community clouds (used by a specific community of users), public clouds (open for use to the general public) and hybrid clouds. The availability of these different types gives users greater choice in choosing clouds that have the right level of access and security.
Mulesoft (n.d.) suggests that data and service integration is one of the main reasons people choose to adopt cloud computing. Cloud computing service providers are able to provide a range of software as a service (Saas) solution such that users may only need one login for all their software requirements.
Security is often considered to be one of the drawbacks in cloud computing; however, Chee and Franklin Jr (2010) point out that there are security benefits to the cloud computing architecture. For example, traffic can be stopped at the provider’s network, which prevents large amounts of bad data entering the enterprise network. Furthermore, they suggest that as security needs change, the cloud service provider is able to swap security services in and out, in response to happenings in real time, thus allowing for appropriate security services to be provided at all times.
The impressive list of benefits of cloud computing notwithstanding, there are still drawbacks associated with the use of cloud computing which adopters should be aware of. Cloud computing services are relatively easy to secure and this may lead to increased fragmentation of data. Reeve (2013) explains that as users have adopted more and more different cloud services, their data has become spread across these various repositories. However, data is more important than ever today with the advances in data mining. There is also the potential to gain knowledge from big data arising from more and more data routinely being collected in automated and other processes (Agrawal et al., 2011). However, integrating data across different cloud computing services is not an easy task; data integration itself is an additional cost and can lead to higher rates of data transmission, which can choke the network and slow down the entire service. Data integration could also slow down cloud computing services as the data would not be located near the place computation takes place (Dillon and Chang, 2010).
Security is a major problem in cloud computing. Cloud services mean that the users relinquish physical and logical control over the day-to-day operation of the infrastructure that provides for the computing services. Wang et al. (2010) are of the opinion that the loss of control means users now need additional audit processes to ensure the security and dependability of the data and services provided. The fact that there is an additional entity, the cloud service provider, that handles data in a cloud computing environment compared with a traditional in-house infrastructure can introduce additional vulnerabilities to data security. For example, confidential data may need additional handling measures such as ensuring anonymity which can increase overheads. Subashini and Kavitha (2011) provide a detailed overview of the various security issues in cloud computing.
Data lock-in is another problem that cloud users are likely to face; if they use the cloud computing services of one service provider their data is likely to be locked in the format of that vendor. This will create data migration problems if and when they decide to change their cloud service provider (Armbrust et al., 2009).
Armbrust et al. (2010) list the following main obstacles to the further growth of cloud computing:
- Availability/business continuity – there is a single point of failure, particularly in the case of infrastructure as a service (Iaas). This can be overcome by using multiple cloud service providers.
- Data transfer bottlenecks – the large amounts of data to be transferred can mean that the entire system is slowed down by data transfer bottlenecks.
- Performance unpredictability – in spite of the advances in cloud computing technology, performance is still not entirely predictable. This can mean outages at crucial periods.
- Bugs in large distribution systems – these can be difficult to identify and fix.
- Reputation fate sharing – if one of the users in the cloud environment is unscrupulous (for example a spammer), all the users sharing the same cloud can become tarred by the same brush. For example other servers could start blocking traffic from the shared IP addresses in the cloud with the spammer, which means legitimate users in the cloud may find their traffic blocked.
Overall, cloud computing currently has many benefits for its users. This is the main reason for its popularity. However it does have its drawbacks and therefore users will have to weigh up the benefits and drawbacks of adopting cloud computing in their specific situations in order to make a considered decision about using it. Armburst et al. (2009) suggest that for every obstacle in cloud computing there is an opportunity or solution. However, cloud users should be aware of changes that take place in the technology over time which can change the particular benefits and drawbacks that they enjoy.
Agrawal, Divyakant, Sudipto Das, and Amr El Abbadi. “Big Data and Cloud Computing: Current State and Future Opportunities” in Proceedings of the 14th International Conference on Extending Database Technology, 530–533. ACM, 2011. http://dl.acm.org/citation.cfm?id=1951432.
Antonopoulos, Nikos, and Lee Gillam. Cloud Computing: Principles, Systems and Applications. Springer Science & Business Media, 2010.
Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, and Gunho Lee. “Above the Clouds: A Berkeley View of Cloud Computing”, 2009. http://home.cse.ust.hk/~weiwa/teaching/Fall15-COMP6611B/reading_list/AboveTheClouds.pdf.
Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, and Gunho Lee. “A View of Cloud Computing.” Communications of the ACM 53, no. 4 (2010): 50–58.
Buyya, Rajkumar, James Broberg, and Andrzej M. Goscinski. Cloud Computing: Principles and Paradigms. John Wiley & Sons, 2010.
Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering It Services as Computing Utilities.” In High Performance Computing and Communications, 2008. HPCC’08. 10th IEEE International Conference on, 5–13. Ieee, 2008. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4637675.
Buyya, Rajkumar, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility.” Future Generation Computer Systems 25, no. 6 (2009): 599–616.
Chee, Brian J. S., and Curtis Franklin Franklin Jr. Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. CRC Press, 2010.
ComPUtING, CloUD. “Cloud Computing Privacy Concerns on Our Doorstep.” Communications of the ACM 54, no. 1 (2011): 36–38.
Mell, Peter, and Tim Grance. “The NIST Definition of Cloud Computing,” 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf.
Reeve, April. “Managing Data in Motion: Data Integration Best Practice Techniques and Technologies,” 2013. https://books.google.co.uk/books?id=2VLP8bjDzv0C&printsec=frontcover&dq=managing+data+in+motion&hl=en&sa=X&redir_esc=y#v=onepage&q=managing%20data%20in%20motion&f=false.
Rimal, Bhaskar Prasad, Eunmi Choi, and Ian Lumb. “A Taxonomy and Survey of Cloud Computing Systems.” INC, IMS and IDC, 2009, 44–51.
Subashini, Subashini, and Veeraruna Kavitha. “A Survey on Security Issues in Service Delivery Models of Cloud Computing.” Journal of Network and Computer Applications 34, no. 1 (2011): 1–11.
Wang, Cong, Kui Ren, Wenjing Lou, and Jin Li. “Toward Publicly Auditable Secure Cloud Data Storage Services.” IEEE Network 24, no. 4 (2010): 19–24.
Yu, Wei. Accounting-Based Earnings Management and Real Activities Manipulation. ProQuest, 2008.
Zhang, Qi, Lu Cheng, and Raouf Boutaba. “Cloud Computing: State-of-the-Art and Research Challenges.” Journal of Internet Services and Applications 1, no. 1 (2010): 7–18.