{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:40:59Z","timestamp":1654116059109},"reference-count":58,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,1]]},"abstract":"<p>This paper takes a systematic review methodology to unearth the reason for a slow adoption of cloud computing by businesses, despite the user interests and cloud advancements gained recently. The key finding is that the IT industry has taken different modelling approaches to engineer and deliver the cloud services based on the goals of different key cloud players, thereby raising various adoption challenges and concerns. In this context, there is a need for rethinking Software Engineering concepts. This motivates us to question whether the existing Software Engineering theories and modelling principles are sufficient for the new cloud computing paradigm. Due to the paucity of a comprehensive review in literature, the main aim of this review article is to identify such research gaps and insufficiencies in Software Engineering, and to provide recommendations for bridging these gaps. In this work, the systemic review of the state of the art of cloud computing has resulted in identifying four major cloud modelling gaps that require prime attention. The paper discusses these gaps and identifies the key Software Engineering challenges prevalent in addressing each of these gaps. Finally, the author proposes five topmost research recommendations specifically designed for overcoming these gaps\/challenges in order to facilitate a sustainable cloud adoption. Overall, the author\u2019s findings have established the need to rethink Software Engineering theories for arriving at a multilateral or distributed cloud modelling approach. With such rethinking, the proposed cloud design automatically incorporates cloud user-roles, interoperability, intelligent automation and trusted cloud infrastructure strategies for achieving a sustainable cloud framework of the future.<\/p>","DOI":"10.4018\/jitr.2013010101","type":"journal-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T16:41:26Z","timestamp":1376498486000},"page":"1-19","source":"Crossref","is-referenced-by-count":1,"title":["Software Engineering Research Gaps in the Cloud"],"prefix":"10.4018","volume":"6","author":[{"given":"Sitalakshmi","family":"Venkatraman","sequence":"first","affiliation":[{"name":"Department of Higher Education-Business, Northern Melbourne Institute of TAFE, VIC, Australia"}]}],"member":"2432","reference":[{"key":"jitr.2013010101-0","doi-asserted-by":"crossref","unstructured":"Almorsy, M., Grundy, J. C., & Ibrahim, A. (2013). Automated software architecture security risk analysis using formalized signatures. In Proceedings of the IEEE\/ACM International Conference on Software Engineering (ICSE 2013), IEEE CS Press.","DOI":"10.1109\/ICSE.2013.6606612"},{"key":"jitr.2013010101-1","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. UC Berkeley Technical Report.","DOI":"10.1145\/1721654.1721672"},{"key":"jitr.2013010101-2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.111"},{"key":"jitr.2013010101-3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.443"},{"key":"jitr.2013010101-4","unstructured":"Belmans, W., & Lambrette, U. (2012). The cloud value chain exposed - key takeaways for network service providers. CISCO White Paper, USA: CISCO IBSG."},{"key":"jitr.2013010101-5","unstructured":"Benson, T., Sahu, S., Akella, A., & Shaikh, A. (2010, June 22\u201325). A first look at problems in the cloud. In Proceedings of the 2010 USENIX Federated Conferences Week (HotCloud '10), Boston, MA."},{"key":"jitr.2013010101-6","doi-asserted-by":"crossref","unstructured":"Bisong, A., & Rahman, S. M. (2011). An overview of the security concerns in enterprise cloud computing. International Journal of Network Security & its Applications, 3(1), 30-45.","DOI":"10.5121\/ijnsa.2011.3103"},{"key":"jitr.2013010101-7","author":"R.Buyya","year":"2013","journal-title":"Mastering cloud computing. McGraw Hill (I)"},{"key":"jitr.2013010101-8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6524-0_15"},{"key":"jitr.2013010101-9","author":"P. B.Checkland","year":"1981","journal-title":"Systems thinking, systems practice"},{"key":"jitr.2013010101-10","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713257"},{"key":"jitr.2013010101-11","unstructured":"Cisco. (2011). Intelligent automation for cloud. Cisco Data Sheet, 1-9."},{"key":"jitr.2013010101-12","author":"R.Credle","year":"2013","journal-title":"IBM systems director 6.3 best practice"},{"key":"jitr.2013010101-13","unstructured":"Elson, J., & Howell, J. (2009). Refactoring human roles solves systems problems. In Proceedings of the Conference on Hot Topics in Cloud Computing."},{"key":"jitr.2013010101-14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090408"},{"key":"jitr.2013010101-15","doi-asserted-by":"publisher","DOI":"10.1145\/1394127.1394131"},{"key":"jitr.2013010101-16","doi-asserted-by":"crossref","unstructured":"Grobauer, B., Walloschek, T., & St\u00f6cker, E. (2011). Understanding cloud computing vulnerabilities. In Proceedings of the Cloud Computing, Copublished by The IEEE Computer And Reliability Societies (pp. 50-57).","DOI":"10.1109\/MSP.2010.115"},{"key":"jitr.2013010101-17","doi-asserted-by":"crossref","unstructured":"Guha, R., & Al-Dabass, D. (2010). Impact of web 2.0 and cloud computing platform on software engineering, In Proceedings of the International Symposium on Electronic System Design (ISED) (pp. 213-218).","DOI":"10.1109\/ISED.2010.48"},{"key":"jitr.2013010101-18","first-page":"71","article-title":"Distributed cloud intrusion detection model.","volume":"34","author":"I.Gul","year":"2011","journal-title":"International Journal of Advanced Science and Technology"},{"key":"jitr.2013010101-19","unstructured":"Hamilton, J. (2009). Cooperative expendable micro-slice servers (CEMS): Low cost, low power servers for internet-scale services. Proceedings of the Conference on Innovative Data Systems Research (CIDR \u201909)."},{"key":"jitr.2013010101-20","doi-asserted-by":"publisher","DOI":"10.1108\/10650751311319296"},{"key":"jitr.2013010101-21","unstructured":"Intel. (2009). Developing an enterprise cloud computing strategy. Intel White Paper."},{"key":"jitr.2013010101-22","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243426"},{"key":"jitr.2013010101-23","author":"R.Jennings","year":"2010","journal-title":"Cloud computing with the windows azure platform"},{"key":"jitr.2013010101-24","doi-asserted-by":"crossref","unstructured":"Jing, X., Nimis, J., & Jian-Jun, J. (2010). A brief survey on the security model of cloud computing. In Proceedings of the Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.","DOI":"10.1109\/DCABES.2010.103"},{"key":"jitr.2013010101-25","author":"N.Johnson","year":"2013","journal-title":"Google app engine - Using the XMPP service"},{"key":"jitr.2013010101-26","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899942"},{"key":"jitr.2013010101-27","unstructured":"Kristensen, E. S., & Halberg, N. (1997). A systems approach for assessing sustainability in livestock farms. In Proceedings of the 4th International Symposium on Livestock Farming Systems (Vol. 89, pp. 16-30)."},{"key":"jitr.2013010101-28","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226458106.001.0001"},{"key":"jitr.2013010101-29","unstructured":"Kundra, V. (2011). Federal cloud computing strategy. Chief Information Officers Council Report (pp. 1-43)."},{"key":"jitr.2013010101-30","unstructured":"Lockeretz, W. (2000). Organic farming research, today and tomorrow. In Proceedings of the 13th International IFOAM Scientific Conference (pp. 718-720)."},{"key":"jitr.2013010101-31","unstructured":"Microsoft. (2010). Look before you leap into google\u2019s cloud services - Pilot findings from going Google. Microsoft White Paper."},{"key":"jitr.2013010101-32","doi-asserted-by":"crossref","unstructured":"Mohagheghi, P., & S\u00e6ther, T. (2011). Software engineering challenges for migration to the service cloud paradigm: Ongoing work in the REMICS project. In Proceedings of the IEEE World Congress on Services (SERVICES).","DOI":"10.1109\/SERVICES.2011.26"},{"key":"jitr.2013010101-33","volume":"Vol. II","year":"2011","journal-title":"US government cloud computing technology roadmap. NIST"},{"key":"jitr.2013010101-34","unstructured":"Opengroup. (2011). The cloud cube model, Jericho forum, Opengroup White Paper."},{"key":"jitr.2013010101-35","unstructured":"Oracle (2011). Architectural strategies for cloud computing. Oracle White Paper in Enterprise Architecture. Oracle Press."},{"key":"jitr.2013010101-36","unstructured":"Pham, H., Paluska, J. M., & Ward, S. (2011, May 9-12). User interface models for the cloud. In Proceedings of the International Conference for Human-Computer Interaction, ACM, Vancouver, Canada."},{"key":"jitr.2013010101-37","doi-asserted-by":"crossref","unstructured":"Ramanathan, V., & Venkatraman, S. (2010, November 1-2). Transforming web and grid services to cloud services \u2013 Can it be a success. In Proceedings of the International Conference on Advances in Distributed and Parallel Computing (ADPC 2010), Singapore. Global Science and Technology Forum Publications.","DOI":"10.5176\/978-981-08-7656-2_A-26"},{"key":"jitr.2013010101-38","unstructured":"Ramanathan, V., & Venkatraman, S. (2012). Towards unified user management for achieving cloud adoption. In Proceedings of 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) (pp. 91-101). IACSIT Press."},{"key":"jitr.2013010101-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.007"},{"key":"jitr.2013010101-40","doi-asserted-by":"crossref","unstructured":"Riungu, L. M., Taipale, O., & Smolander, K. (2010). Software testing as an online service: Observations from practice. In Proceedings of the Third International Conference on Software Testing, Verification, and Validation Workshops (ICSTW) (pp. 418-423).","DOI":"10.1109\/ICSTW.2010.62"},{"key":"jitr.2013010101-41","doi-asserted-by":"crossref","unstructured":"Schmidt-Wesche, B., Bleizeffer, T., Calcaterra, J., Nair, D., Rendahl, R., & Sohn, P. (2011). Cloud user roles: Establishing standards for describing core tasks of cloud creators, providers, and consumers. In Proceedings of the 2011 IEEE International Conference on Cloud Computing) (pp. 764-765).","DOI":"10.1109\/CLOUD.2011.89"},{"key":"jitr.2013010101-42","author":"K.Schmotzer","year":"2011","journal-title":"IBM LotusLive: A social networking and collaboration platform for the midmark"},{"key":"jitr.2013010101-43","unstructured":"Secunia Advisory. (2007). Xen multiple vulnerabilities. Secunia White Paper."},{"key":"jitr.2013010101-44","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4301-7.ch001"},{"key":"jitr.2013010101-45","unstructured":"Sharma, G. BevinaKoppa, S., & Venkatraman, S. (2013). Modeling of mobile cloud security - The case of an educational institution. In Proceedings of the 7th WSEAS International Conference on Circuits, Systems, Signal and Telecommunications (CSST '13)."},{"issue":"1","key":"jitr.2013010101-46","first-page":"1","article-title":"Research challenges in cloud computing.","volume":"1","author":"S.Shenai","year":"2013","journal-title":"International Journal of Research in Engineering & Advanced Technology"},{"key":"jitr.2013010101-47","unstructured":"Shimba, F. (2010). Cloud computing: strategies for cloud computing adoption. Masters Dissertation, Dublin Institute of Technology."},{"key":"jitr.2013010101-48","article-title":"Advances in CLOUDS, research in future cloud computing. Expert Group Report, Public version 1.0, Information Society and Media","author":"L.Shubert","year":"2012","journal-title":"European Union"},{"key":"jitr.2013010101-49","unstructured":"Stuerzlinger, W. (2011, May 7\u201312). On- and off-line user interfaces for collaborative cloud services. In Proceedings of the CHI 2011, Vancouver, BC, Canada."},{"key":"jitr.2013010101-50","unstructured":"Ulrich, W. (1990). What is called \u2018Critical systems thinking'. In Proceedings of the 34th ISSS Annual Meeting, 1, 4-14."},{"key":"jitr.2013010101-51","unstructured":"V\u00e4\u00e4n\u00e4nen-Vainio-Mattila, K., Kaasinen, E., & Roto, V. (2011, May 7\u201312). User experience in the cloud: Towards a research agenda. In Proceedings of the CHI 2011, Vancouver, BC, Canada."},{"key":"jitr.2013010101-52","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-010-9174-8"},{"key":"jitr.2013010101-53","unstructured":"Varia, J., & Mathew, S. (2013). Amazon AWS - Overview of Amazon web services. Amazon White Paper, 1-21."},{"key":"jitr.2013010101-54","first-page":"1","article-title":"A framework for ICT security policy management","author":"S.Venkatraman","year":"2011","journal-title":"Frameworks for ICT policy: Government, social and legal issues"},{"issue":"2","key":"jitr.2013010101-55","first-page":"7","article-title":"Cloud computing - A research roadmap in coalescence with software engineering.","volume":"2","author":"S.Venkatraman","year":"2012","journal-title":"International Journal of Software Engineering"},{"key":"jitr.2013010101-56","unstructured":"Venkatraman, S., Wadhwa, B., Nemani, A., & Ramanathan, V. (2012). Integrating user roles with cloud interfaces. In Proceedings of 2012 International Conference on Software and Computer Applications (ICSCA 2012) (pp. 91-101). IACSIT Press."},{"key":"jitr.2013010101-57","author":"T.Wong","year":"2010","journal-title":"Salesforce.com for dummies"}],"container-title":["Journal of Information Technology Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=80251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:18:17Z","timestamp":1654114697000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitr.2013010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jitr.2013010101","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"value":"1938-7857","type":"print"},{"value":"1938-7865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}