Towards a quantitative model of cloud computing risks and benefits
Vestnik Ûžno-Uralʹskogo gosudarstvennogo universiteta. Seriâ Vyčislitelʹnaâ matematika i informatika, Tome 5 (2016) no. 2, pp. 68-83 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

Migrating to the cloud is the main direction of enterprise IT optimization today. Many research papers confirm that cloud computing provides economic benefits, because it enhances flexibility and reduces costs. In other studies, cloud-specific risks are identified and their impact on the customer business is evaluated. However, most often, benefits and risks are considered separately. Model that allows simultaneously evaluate these factors is proposed here. Key factors of tangible and intangible benefits and risks are identified that allows to estimate joint impact of costs and risks on cloud adoption. Simple rules that help to quantify these factors and compute consistent pairwise comparison matrices are also proposed. Usage of proposed method is demonstrated with simple example.
Keywords: cloud computing, cloud computing risks, cloud computing benefits, multi criteria decision making.
@article{VYURV_2016_5_2_a5,
     author = {Y. A. Zelenkov},
     title = {Towards a quantitative model of cloud computing risks and benefits},
     journal = {Vestnik \^U\v{z}no-Uralʹskogo gosudarstvennogo universiteta. Seri\^a Vy\v{c}islitelʹna\^a matematika i informatika},
     pages = {68--83},
     year = {2016},
     volume = {5},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/VYURV_2016_5_2_a5/}
}
TY  - JOUR
AU  - Y. A. Zelenkov
TI  - Towards a quantitative model of cloud computing risks and benefits
JO  - Vestnik Ûžno-Uralʹskogo gosudarstvennogo universiteta. Seriâ Vyčislitelʹnaâ matematika i informatika
PY  - 2016
SP  - 68
EP  - 83
VL  - 5
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/VYURV_2016_5_2_a5/
LA  - en
ID  - VYURV_2016_5_2_a5
ER  - 
%0 Journal Article
%A Y. A. Zelenkov
%T Towards a quantitative model of cloud computing risks and benefits
%J Vestnik Ûžno-Uralʹskogo gosudarstvennogo universiteta. Seriâ Vyčislitelʹnaâ matematika i informatika
%D 2016
%P 68-83
%V 5
%N 2
%U http://geodesic.mathdoc.fr/item/VYURV_2016_5_2_a5/
%G en
%F VYURV_2016_5_2_a5
Y. A. Zelenkov. Towards a quantitative model of cloud computing risks and benefits. Vestnik Ûžno-Uralʹskogo gosudarstvennogo universiteta. Seriâ Vyčislitelʹnaâ matematika i informatika, Tome 5 (2016) no. 2, pp. 68-83. http://geodesic.mathdoc.fr/item/VYURV_2016_5_2_a5/

[1] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, A. Ghalsasi, “Cloud Computing: The Business Perspective”, Decision Support Systems, 51:1 (2011), 176–189

[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, “A View of Cloud Computing”, Communications of the ACM, 53:4 (2010), 50–58

[3] S. Karunakaran, V. Krishnaswamy, R.P. Sundarraj, “Business View of Cloud: Decisions, Models and Opportunities – a Classification and Review of Research”, Management Research Review, 38:6 (2015), 582–604

[4] E. Triantaphyllou, Multi-Criteria Decision Making: A Comparative Study, Kluwer, 2000, 320 pp.

[5] H. Yang, M. Tate, “A Descriptive Literature Review and Classification of Cloud Computing Research”, Communications of the Association for Information Systems, 31:1 (2012), 35–60

[6] B.C. Tak, B. Urgaonkar, A. Sivasubramaniam, “To Move or not to Move: The Economics of Cloud Computing”, Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing., 2011, 5–5

[7] A. Khajeh-Hosseini, D. Greenwood, J.W. Smith, I. Sommerville, “The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise”, Software: Practice and Experience, 42:4 (2012), 447–465

[8] B. Williams, “The Economics of Cloud Computing”, Cisco Press, 2012, 150 pp.

[9] S.C. Misra, A. Mondal, “Identification of A Company’s Suitability for The Adoption of Cloud Computing and Modelling Its Corresponding Return on Investment”, Mathematical and Computer Modelling, 53:3 (2011), 504–521

[10] Marešová P., “Cost Benefit Analysis Approach for Cloud Computing. Advanced Computer and Communication Engineering Technology”, Advanced Computer and Communication Engineering Technology of the series Lecture Notes in Electrical Engineering, 362 (2016), 913–923, Springer

[11] S.K. Garg, S. Versteeg, R. Buyya, “A Framework for Ranking of Cloud Computing Services”, Future Generation Computer Systems, 29:4 (2013), 1012–1023

[12] R.P. Sundarraj, S. Venkatraman, “On Integrating an IS Success Model and Multicriteria Preference Analysis into a System for Cloud-Computing Investment Decisions”, Outlooks and Insights on Group Decision and Negotiation, Springer, 2015, 357–368

[13] W.H. Delone, E.R. McLean, “The Delone and Mclean Model of Information Systems Success: A Ten-Year Update”, Journal of Management Information Systems, 19:4 (2003), 9–30

[14] H. Takabi, J.B. Joshi, G.J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments”, IEEE Security Privacy, 2010, no. 6, 24–31

[15] D. Catteddu, G. Hogben, , ENISA, 2009 (data obrascheniya: 07.02.2016) http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport

[16] S. Subashini, V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of Network and Computer Applications, 34:1 (2011), 1–11

[17] K. Hashizume, D.G. Rosado, E. Fernández-Medina, E.B. Fernandez, “An Analysis of Security Issues for Cloud Computing”, Journal of Internet Services and Applications, 4:1 (2013), 1–13

[18] S. Angeles, , Business News Daily, 2013 (data obrascheniya: 07.02.2016) http://www.businessnewsdaily.com/5215-dangers-cloud-computing.html

[19] R. Grimes, , InfoWorld, 2013 (data obrascheniya: 07.02.2016) http://www.infoworld.com/article/2614369/security/the-5-cloud-risks-you-have-to-stopignoring.html

[20] B. Martens, F. Teuteberg, “Decision-Making in Cloud Computing Environments: A Cost and Risk Based Approach”, Information Systems Frontiers, 14:4 (2012), 871–893

[21] M. Kantarcioglu, A. Bensoussan, S. Hoe, “Impact of Security Risks On Cloud Computing Adoption”, 49th Annual Allerton Conference on Communication, Control, and Computing, IEEE, 2011, 670–674

[22] P. Saripalli, G. Pingali, “MADMAC: Multiple Attribute Decision Methodology for Adoption of Clouds”, 2011 IEEE International Conference on Cloud Computing, IEEE, 2011, 316–323

[23] S.L. Savage, The Flaw of Averages: Why We Underestimate Risk in The Face of Uncertainty, John Wiley Sons, 2009, 416 pp.

[24] T.L. Saaty, “Axiomatic Foundation of the Analytic Hierarchy Process”, Management Sciences, 1986, no. 32, 841–855

[25] S.A. Aivazyan, I.S. Yenyukov, L.D. Meshalkin, Applied Statistics. Bases of Modeling and Initial Data Processing, Financy i statisitca, 1983, 471 pp.

[26] S.S. Bonham, Actionable Strategies Through Integrated Performance, Process, Project, And Risk Management, Artech House, 2008, 261 pp.

[27] R. Hackathorn, , Data Administration Newsletter, 2004 (data obrascheniya: 07.02.2016) http://www.tdan.com/i025fe04.htm

[28] Y. Zelenkov, “Components of Enterprise IT Strategy: Decision-Making Model and Efficiency Measurement”, International Journal of Information Systems and Change Management, 7:2 (2014), 150–166

[29] Y. Zelenkov, “Business and IT Alignment in Turbulent Business Environment”, Business Information Systems Workshops, Lecture Notes in Business Information Processing (LNBIP), 228, Springer, 2015, 101–112

[30] C. Ciborra, The Labyrinths of Information: Challenging the Wisdom of System, Oxford University Press, 2002, 214 pp.

[31] C. Maurer, D. Goodhue, AMCIS 2010 Proceedings, 2010, 231 pp.

[32] J. Luftman, R. Kempaiah, “An Update on Business-IT Alignment: “A Line” Has Been Drawn”, MIS Quarterly Executive, 6:3 (2007), 165–177

[33] S. Murer, B. Bonati, F.J. Furrer, Managed Evolution: A Strategy for Very Large Information Systems, Springer, 2011, 264 pp.

[34] L.A. Gordon, M.P. Loeb, “The Economics of Information Security Investment”, Transactions on Information and System Security, 5:4 (2002), 438–457, ACM

[35] K. Matsuura, “Productivity Space of Information Security in an Extension of the GordonLoeb’s Investment Model”, Managing Information Risk and the Economics of Security, ed. M.E. Johnson, Springer, 2009, 99–119