{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T20:44:27Z","timestamp":1771620267429,"version":"3.50.1"},"reference-count":101,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7,1]]},"abstract":"<p>Cloud computing, characterized by on demand availability of resources is gaining a lot of popularity in the present day business scenario. This new computing paradigm is predicted to revolutionize the Information Technology industry with its dynamic and scalable capabilities. Cloud computing is catering to the needs of a wide variety of users, across the different parts of the world with its huge number of offerings. Information technology resources are offered as services over the Internet, which leads to a number of technical and management concerns. Data is stored away from the users' premises, leading to various challenges in maintaining security, privacy and regulatory compliances. Therefore, cloud computing does not involve single discipline rather multi-discipline. Considering this multi-disciplinary involvement, current work focuses on identification of research issues in the cloud computing environment, and categorizing these issues in the technical, legal and management domains. Work further discusses the multi-disciplinary research areas where cloud computing is currently focused and suggests the potential areas for further research.<\/p>","DOI":"10.4018\/jitr.2014070103","type":"journal-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T15:37:19Z","timestamp":1412696239000},"page":"32-53","source":"Crossref","is-referenced-by-count":14,"title":["Multi-Disciplinary Research Issues in Cloud Computing"],"prefix":"10.4018","volume":"7","author":[{"given":"Jitendra","family":"Singh","sequence":"first","affiliation":[{"name":"PGDAV College, University of Delhi, New Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6753-1557","authenticated-orcid":true,"given":"Vikas","family":"Kumar","sequence":"additional","affiliation":[{"name":"Asia-Pacific Institute of Management, New Delhi, India"}]}],"member":"2432","reference":[{"key":"jitr.2014070103-0","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-011-0155-7"},{"issue":"1","key":"jitr.2014070103-1","first-page":"4","article-title":"Data management in the cloud: Limitations and opportunities","volume":"32","author":"D. J.Adabi","year":"2009","journal-title":"A Quarterly Bulletin of the Computer Society of the IEEE Technical Committee on Data Engineering"},{"key":"jitr.2014070103-2","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"jitr.2014070103-3","unstructured":"Amazon S3 Availability Event. (2008, July 20). Retrieved April 8, 2011, from http:\/\/status.aws.amazon.com\/s3-20080720.html"},{"key":"jitr.2014070103-4","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., et al. (2009). Above the clouds: A Berkeley view of cloud computing. University of California at Berkley, CA. Technical Rep UCB\/EECS-2009-28."},{"key":"jitr.2014070103-5","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"jitr.2014070103-6","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"jitr.2014070103-7","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2012.158"},{"key":"jitr.2014070103-8","doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Generation Computer Science, 28(5), 755\u2013768.","DOI":"10.1016\/j.future.2011.04.017"},{"key":"jitr.2014070103-9","article-title":"An ontology for quality-aware service discovery","author":"S.Bleul","year":"2005","journal-title":"Proceeding of First International Workshop on Engineering Service Compositions (WESC\u201905)"},{"key":"jitr.2014070103-10","first-page":"D4","article-title":"Quantitative estimates of the demand for cloud computing in Europe & the likely barriers to up-take","volume":"2011","author":"D.Bradshaw","year":"2012","journal-title":"SMART"},{"key":"jitr.2014070103-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.03.010"},{"key":"jitr.2014070103-12","unstructured":"CIOL Bureau. (2012). 14 cloud outages in 7 months, who is next? Available at http:\/\/www.ciol.com\/Cloud-and-Virtualization\/Feature\/14-cloud-outages-in-7-months-who-is-next\/164853\/0\/"},{"key":"jitr.2014070103-13","unstructured":"Cisco. (2012). Cisco asa 1000V cloud firewall data sheet. Retrieved from http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/ps6032\/ps6094\/ps12233\/data_sheet_c78-687960.pdf"},{"key":"jitr.2014070103-14","doi-asserted-by":"crossref","unstructured":"Comes, D., Bleul, S., Weise, T., & Geihs, T. (2009). A flexible approach for business processes monitoring. Available at http:\/\/www.it-weise.de\/documents\/ metaCBWG2009AFAFBPM.html","DOI":"10.1007\/978-3-642-02164-0_9"},{"key":"jitr.2014070103-15","unstructured":"Cook, G. (2012). How clean is your cloud. GreenPeace International. Available at http:\/\/www.greenpeace.org\/international\/Global\/international\/publications\/climate\/2012\/iCoal\/HowCleanisYourCloud.pdf"},{"key":"jitr.2014070103-16","unstructured":"CSA. (2009). Security guidance for critical areas of focus in cloud computing v2.1. Available at https:\/\/cloudsecurityalliance.org\/csaguide.pdf"},{"key":"jitr.2014070103-17","unstructured":"CSA. (2010). Top threats to cloud computing v 1.0. Available at https:\/\/cloudsecurityalliance. org\/csaguide.pdf"},{"key":"jitr.2014070103-18","unstructured":"CSA. (2013). The Notorious nine cloud computing top threats in 2013. Available at https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/top_threats\/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf"},{"key":"jitr.2014070103-19","unstructured":"CSRC. (n.d.). Retrieved from http:\/\/www.csrc.nist.gov\/groups\/SNS\/cloud-computing\/index.html"},{"key":"jitr.2014070103-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.018"},{"key":"jitr.2014070103-21","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"jitr.2014070103-22","first-page":"41","article-title":"Risk perception and trust in the cloud","volume":"4","author":"F.Farahmand","year":"2010","journal-title":"ISACA Journal"},{"key":"jitr.2014070103-23","unstructured":"Federal Computer Week Custom Report. (2012). Mainstreaming cloud computing. Available at www.fcw.com\/ResearchReportCloudComputing"},{"key":"jitr.2014070103-24","unstructured":"Ferguson, T. (2009). Salesforce.com outage hits thousands of businesses. Available on http:\/\/news.cnet.com\/8301-1001_3-10136540-92.html"},{"key":"jitr.2014070103-25","unstructured":"Freedman, R. (2009). Cloud computing migrations issues: What you need to know. Available at http:\/\/www.techrepublic.com\/blog\/project-management\/cloud-computing-migration-issues-what-you-need-to-know\/1248"},{"key":"jitr.2014070103-26","unstructured":"Gagnaire, M., Diaz, F., Coti, C., Cerin, C., Shiozaki, K., Xu, Y., et al. (2012). Downtime statistics of current cloud solutions. Available at http:\/\/iwgcr.org\/wp-content\/uploads\/2012\/06\/IWGCR-Paris.Ranking-002-en.pdf"},{"key":"jitr.2014070103-27","unstructured":"Gantz, J. F., Chute, C., Manfrediz, A., Minton, S., Reinsel, D., Schlichting, W., & Toncheva, A. (2008). The diverse and exploding digital universe: An updated forecast of worldwide information growth through 2011, an IDC White Paper\u2014sponsored by EMC (p. 16). Framingham, MA: IDC. Available at http:\/\/www.emc.com\/collateral\/analyst-reports\/diverseexploding-digital-universe.pdf"},{"key":"jitr.2014070103-28","unstructured":"Garfinkel, S. (2007). An evaluation of Amazon\u2019s grid computing services: EC2, S3 and SQS. Tech. Rep. TR-08-07, Harvard University,."},{"key":"jitr.2014070103-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.04.004"},{"key":"jitr.2014070103-30","unstructured":"Gartner\u2019s Report. (2008). Available at http:\/\/www.gartner.com\/"},{"key":"jitr.2014070103-31","first-page":"519","article-title":"Answering aggregation queries in a secure system model","author":"T.Ge","year":"2007","journal-title":"Proceedings of VLDB"},{"key":"jitr.2014070103-32","doi-asserted-by":"crossref","unstructured":"Gens, F. (2011). Executive information: Top 10 predictions. IDC #231720, Vol. 1","DOI":"10.1016\/S0969-4765(11)70076-5"},{"key":"jitr.2014070103-33","unstructured":"Gite, V. (2008). Explain: Five nines (99.999%) computer \/ network uptime concept. Available at http:\/\/www.cyberciti.biz\/faq\/computer-network-uptime-five-nines-999999\/"},{"key":"jitr.2014070103-34","unstructured":"Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing. Gartner Group."},{"key":"jitr.2014070103-35","first-page":"91","article-title":"Cloud computing: The limits of public clouds for business applications","author":"P.Hofmann","year":"2010","journal-title":"IEEE Internet Computing,"},{"key":"jitr.2014070103-36","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1003"},{"key":"jitr.2014070103-37","unstructured":"IWGCR. (2013). Outages in cloud computing. Available at http:\/\/iwgcr.org"},{"key":"jitr.2014070103-38","unstructured":"Jackson, T. (2008). We feel your pain and we are sorry. Accessed from http:\/\/gmailblog.blogspot.com\/2008\/08\/we-feel-your-pain-and-were-sorry.html"},{"key":"jitr.2014070103-39","first-page":"21","article-title":"Cloud computing technologies and applications","author":"Z.Jinzy","year":"2010","journal-title":"Handbook of cloud computing: Furht and Escalante"},{"key":"jitr.2014070103-40","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.53"},{"key":"jitr.2014070103-41","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"jitr.2014070103-42","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_24"},{"key":"jitr.2014070103-43","doi-asserted-by":"crossref","unstructured":"Kantere, V., Dash, D., Francois, G. G., Kyriakopoulou, S., & Ailamaki, A. (2011). Optimal service pricing for a cloud cache. IEEE Transactions on Knowledge and Data Engineering, 23(9).","DOI":"10.1109\/TKDE.2011.35"},{"key":"jitr.2014070103-44","unstructured":"Kepes, B. (2012). Cloud migration \u2013 The pain and the opportunity. Available at http:\/\/www.rackspace.com\/blog\/cloud-migration-the-pain-and-the-opportunity\/"},{"key":"jitr.2014070103-45","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.57"},{"key":"jitr.2014070103-46","article-title":"Energy-credit scheduler: An energy-aware virtual machine scheduler for cloud systems","author":"N.Kima","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"jitr.2014070103-47","first-page":"584","article-title":"Trust cloud: A framework for accountability and trust in cloud computing","author":"R. K. L.Ko","year":"2011","journal-title":"IEEE World Congress on Services"},{"key":"jitr.2014070103-48","unstructured":"Kshetri, N. (2012). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Journal of Telecommunication Policy."},{"key":"jitr.2014070103-49","unstructured":"Leone, S. (2012). Criticism rains down over cloud data centers. Renewable Energy World.com. Available at http:\/\/www.renewableenergyworld.com\/rea\/news\/article\/2012\/05\/criticism-rains-down-over-cloud-data-centers"},{"key":"jitr.2014070103-50","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.22"},{"key":"jitr.2014070103-51","first-page":"14185","article-title":"Maintenance reliability estimation for a cloud computing network with nodes failure","volume":"38","author":"Y. K.Lin","year":"2011","journal-title":"Expert Systems with Applications"},{"key":"jitr.2014070103-52","author":"T.Mather","year":"2009","journal-title":"Cloud security and privacy"},{"key":"jitr.2014070103-53","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.023"},{"issue":"1","key":"jitr.2014070103-54","first-page":"1","article-title":"Optimizing cloud provider\u2019s revenues via energy efficient server allocation","volume":"2","author":"M.Mazzucco","year":"2012","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"jitr.2014070103-55","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Special publication 800-145, National Institute of Standards and Technology. Available at http:\/\/csrc.nist.gov\/ publications\/ PubsSPs.html#800-145","DOI":"10.6028\/NIST.SP.800-145"},{"key":"jitr.2014070103-56","unstructured":"Messmer, E. (2009a). Security breach cost Heartland $12.6 million so far. NetworkWorld, May 2009. Available at http:\/\/www.networkworld.com\/news\/ 2009\/050709-heartland-breach-tally.html"},{"key":"jitr.2014070103-57","unstructured":"Messmer, E. (2009b). Debit card processor claims data breach part of bigger fraud. ComputerWorld. Available at http:\/\/www.computerworld.com\/ action\/article.do?command=viewArticleBasic&articleId=9126345."},{"key":"jitr.2014070103-58","unstructured":"Messmer, E. (2012, June 12). Gartner: Network virtualization will lead to security control changes. Network World."},{"key":"jitr.2014070103-59","unstructured":"Movius & Krup (2009). U.S. and EU privacy policy: comparison of regulatory approaches."},{"key":"jitr.2014070103-60","doi-asserted-by":"crossref","unstructured":"Mykletun, E., & Tsudik, G. (2006). Aggregation queries in the database-as-a-service model. IFIP WG 11.3 on Data and Application Security (pp. 89\u2013103).","DOI":"10.1007\/11805588_7"},{"key":"jitr.2014070103-61","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2009010104"},{"key":"jitr.2014070103-62","unstructured":"Network World. (2012). Retrieved from http:\/\/www.networkworld.com\/news\/2012\/061212-gartner-macdonald-260107.html"},{"key":"jitr.2014070103-63","author":"W. A.Pauley","year":"2010","journal-title":"Cloud provider transparency an empirical evaluation"},{"key":"jitr.2014070103-64","unstructured":"Perez, J. C. (2008). Extended Gmail outage hits Apps admins. Retrieved from http:\/\/www.computerworld.com\/s\/article\/9117322\/Extended_Gmail_outage_hits_Apps_admins"},{"key":"jitr.2014070103-65","unstructured":"Pike Research. (2011). Cloud computing could cut data center energy consumption by nearly one-third by 2020. Available at http:\/\/www.pikeresearch.com\/newsroom\/cloud-computing-could-cut-data-center-energy-consumption-by-nearly-one-third-by-2020"},{"key":"jitr.2014070103-66","unstructured":"Pucciarelli, J. C. (2011). IT cloud decision economics: 10 best practices for cloud services selection & management. IT Cloud Decision Economics: Customer Need & Strategies, 1. IDC#229207."},{"key":"jitr.2014070103-67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.09.004"},{"key":"jitr.2014070103-68","doi-asserted-by":"crossref","unstructured":"Rehman, Z., Hussain, F. K., & Hussain, O. K. (2011). Towards multi-criteria cloud service selection. In Proceeding of Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Seoul, South Korea (pp. 44\u201348).","DOI":"10.1109\/IMIS.2011.99"},{"key":"jitr.2014070103-69","author":"K. A.Robbins","year":"2003","journal-title":"UNIX systems programming: Communication, concurrency and threads"},{"key":"jitr.2014070103-70","unstructured":"Rose, N. (2011). Personal financial information in China."},{"key":"jitr.2014070103-71","unstructured":"Rouse, M. (2007). Line of business. Available at http:\/\/searchcio.techtarget.com\/definition\/LOB"},{"key":"jitr.2014070103-72","first-page":"1","article-title":"Auditing to keep online storage services honest","author":"M. A.Shah","year":"2007","journal-title":"Proceeding of 11th USENIX Workshop Hot Topics in Operating Systems (HotOS \u201907)"},{"key":"jitr.2014070103-73","unstructured":"Shah, M. A., Swaminathan, R., & Baker, M. (2008). Privacy-preserving audit and extraction of digital contents. Cryptology ePrint Archive, Report 2008\/186. Available at http:\/\/eprint.iacr.org"},{"key":"jitr.2014070103-74","unstructured":"Singh, J., & Kumar, V. (2010, March 3-4). Matrix based model for selection of cloud. In Proceedings of International Conference on Computing Business Applications and Legal Issues, IMT- Ghaziabad, India (pp. 51-57)."},{"issue":"4","key":"jitr.2014070103-75","first-page":"180","article-title":"Assessment of security risks in merging the private and public cloud","volume":"VII","author":"J.Singh","year":"2011","journal-title":"Asia Pacific Business Review"},{"issue":"3","key":"jitr.2014070103-76","first-page":"713","article-title":"A price- and-time-slot-negotiation mechanism for cloud service reservations. IEEE Transactions on Systems Management and Cybernetics\u2014Part B","volume":"42","author":"S.Son","year":"2012","journal-title":"Cybernetics"},{"key":"jitr.2014070103-77","unstructured":"Stemer, T. (2012). An introduction to securing a cloud environment. SANS institute. Available at http:\/\/www.sans.org\/reading-room\/whitepapers\/cloud\/introduction-securing-cloud-environment-34052"},{"key":"jitr.2014070103-78","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.537"},{"key":"jitr.2014070103-79","doi-asserted-by":"publisher","DOI":"10.1145\/1655121.1655127"},{"key":"jitr.2014070103-80","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229328"},{"key":"jitr.2014070103-81","article-title":"Access control","author":"J.Tiller","year":"2007","journal-title":"Official (ISC) 2 guide to the CISSP"},{"key":"jitr.2014070103-82","unstructured":"Turner, M. J., & Mahowald, R. P. (2011). Five steps to successful integrated cloud management. IDC White paper, No. 228116."},{"key":"jitr.2014070103-83","unstructured":"USDOC. (2011). Selected Asia and Oceania data protection laws."},{"key":"jitr.2014070103-84","unstructured":"Vijayan, J. (2007a). Data breach at TJX leads to fraudulent card use. ComputerWorld, January 2007. Available at http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&articleId=9009158."},{"key":"jitr.2014070103-85","unstructured":"Vijayan, J. (2007b). TJX data breach: At 45.6M card numbers, it\u2019s the biggest ever. ComputerWorld, March 2007. Available at http:\/\/www.computerworld.com\/action\/article.do?command = viewArticleBasic&articleId=9014782"},{"key":"jitr.2014070103-86","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.23"},{"key":"jitr.2014070103-87","doi-asserted-by":"crossref","unstructured":"Wang, Q., & Wang, C., Ren, K., Lou, W., & Li, j.(2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions On Parallel and Distributed Systems, 22(5).","DOI":"10.1109\/TPDS.2010.183"},{"key":"jitr.2014070103-88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"jitr.2014070103-89","year":"2007","journal-title":"Privacy laws. In Proskauer on international litigation and arbitration: Managing, resolving, and avoiding cross-border business or regulatory disputes"},{"key":"jitr.2014070103-90","article-title":"Ad-hoc aggregate query processing algorithms based on bit-store for query intensive applications in cloud computing","author":"D.Yang","year":"2012","journal-title":"Journal of Future Generation of Computer System"},{"key":"jitr.2014070103-91","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.69"},{"key":"jitr.2014070103-92","doi-asserted-by":"crossref","DOI":"10.1002\/9781118256107.ch8","article-title":"Utility computing on global grids","author":"C. S.Yeo","year":"2007","journal-title":"Handbook of computer networks"},{"key":"jitr.2014070103-93","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2009.05.024"},{"key":"jitr.2014070103-94","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.02.004"},{"key":"jitr.2014070103-95","doi-asserted-by":"publisher","DOI":"10.1109\/ICFN.2010.60"},{"key":"jitr.2014070103-96","doi-asserted-by":"publisher","DOI":"10.1109\/ICFN.2010.60"},{"key":"jitr.2014070103-97","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.024"},{"key":"jitr.2014070103-98","unstructured":"Zillman, M. P., & Ahma, M. S. (2010), \u201cGrid, distributed and cloud computing resources\u201d, white paper, virtual private library, Jul 1."},{"key":"jitr.2014070103-99","doi-asserted-by":"crossref","unstructured":"Zissis, D. & Lekkas, D.(2012),\u201dAddressing cloud computing security issues\u201d, Journal of Future generation computer system, Vol. 28, Issue 3, pp. 583\u2013592.","DOI":"10.1016\/j.future.2010.12.006"},{"key":"jitr.2014070103-100","first-page":"364","article-title":"Toward enhancing trust in cloud computing environment","author":"B.Zou","year":"2011","journal-title":"proceeding of 2nd International Conference on Control, Instrumentation and Automation (ICCIA)"}],"container-title":["Journal of Information Technology Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=116636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T02:11:30Z","timestamp":1701483090000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitr.2014070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,7,1]]},"references-count":101,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jitr.2014070103","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"value":"1938-7857","type":"print"},{"value":"1938-7865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,1]]}}}