Issue and Challenge
https://doi.org/10.12785/IJCDS/090417Abstract
There are many IT issues and challenges in management including Cloud Computing, Virtualization, Emerging Technology, Big Data Analytics, BYOD (Bring Your Own Devices) and BYOA (Bring Your Own Applications), Shadow IT, Boomers (a transient worker) , Interoperability, User Systems, Energy Efficiency, Creating Value, Social Networks and so on. In this paper, we highlight three challenges: Cloud Computing, Virtualization and Social Networks. Over the last few years Cloud Computing, Virtualization and Social Networks have become modern trends in the information technology space that increase the accessibility and flexibility for the users around the globe. Cloud Computing offers faster innovation, flexible resources and economies of scale, whereas Virtualization deals with better control on IT resources like applications, wide area networks, local area networks, servers, desktops, storage and appliances like firewalls and application delivery controllers. Social Network defines an online service platform where users are able to build relationships with each other by message, posting information, images etc. Despite the success of cloud computing, virtualization and social networks face tremendous challenges such as downtime, vulnerability to attack and limited control in cloud computing, backup and resource distribution in virtualization, security and privacy threats in social networks that are preventing management of organizations from accepting these techniques. This paper gives an overview of these technologies and identifies the different technical challenges and proposes suitable directions to resolve them. In addition, we separately focus on features, types, and myriad benefits of these technologies and discuss solutions that can protect users from these issues. We then present findings, future direction and discuss some techniques to overcome these challenges.
References (38)
- Mahdi Daghmehci Firoozjaei, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim (2017). Security challenges with network functions virtualization.Future Generation Computer Systems, 67, 315-324.
- Shailendra Rathore, Pradip Kumar Sharma, Vincenzo Loia, Young-Sik Jeong, Jong Hyuk Park (2017). Social network security: Issues, challenges, threats, and solutions.Information Sciences, 421, 43-69.
- Diane Barrett, Gregory Kipper (2010). Virtualization Challenges.Virtualization and Forensics, 175-195.
- Racha Ajami, Noha Ramadan, Nadar Mohamed, Jameela Al- Jaroodi (2011). Security Challenges and Approaches in Online Social Networks: A Survey.International Journal of Computer Science and Network Security, 11, 8.
- Tatjana Vasiljeva, Sabina Shaikhulina, Karlis Kreslins. (2017). Cloud Computing: Business Perspectives, Benefits and Challenges for Small and Medium Enterprises (Case of Latvia).Procedia Engineering, 178, 443-451.
- Deepak Puthal, B. P. S. Sahoo, Sambit Mishra, Satyabrata Swain (2015). Cloud Computing Features, Issues and Challenges : A Big Picture,International Conference on Computational Intelligence & Networks,DOI: 10.1109/CINE.2015.31.
- Aejaz Ahmad Dar (2018). Cloud Computing -Positive Impacts and Challenges in Business Perspective.Journal of Computer Science & Systems Biology, 12, 1, 15-18.
- Ibtissam M'rhaoaurh, Chafik Okar, Abdelwahed Namir, Nadia Chafiq (2018). Challenges of cloud computing use: A systematic literature review.MATEC Web of Conferences,DOI: 10.1051/matecconf/201820000007.
- Mohsin Nazir. (2012). Cloud Computing: Overview & Current Research Challenges.Journal of Computer Engineering,8, 1, 14- 22.
- Nidal M. Turab, Anas Abu Taleb, Shadi R. Masadeh (2013). Cloud Computing Challenges and Solutions,International Journal of Computer Networks & Communications, 5, 5, 209-216.
- Marisol Garcia-Valls, Tommaso Cucinotta, Chenyang Lu. (2014). Challenges in real-time virtualization and predictable cloud computing.Journal of System Architecture, 60, 726-740.
- Sanjaya K. Panda, Indrajeet Gupta, Prasanta K. Jana (2019). Task scheduling algorithms for multi-cloud systems: allocation-aware approach.Information System Frontiers, 21, 2, 241-259.
- Niroshinie Fernando, Seng W.Loke, Wenny Rahayu. (2013). Mobile cloud computing: A survey.Future Generation Computer Systems, 29, 84-106.
- Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inacio, P.R.M. (2014). Security issues in cloud environment: A survey.International Journal of Information Security, 13, 2, 113- 170.
- Sanjaya Kumar Panda, Prasanta K. Jana (2015). Efficient task scheduling algorithms for heterogeneous multi-cloud environment.The Journal of Supercomputing, 71, 4, 1505-1533.
- Munmun Saha, Sanjaya Kumar Panda, Suvasini Panigrahi (2019). Distributed Computing Security: Issues and Challenges, Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies.Wiley, 129-138.
- Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy. (2011). Cloud Computing: Security Issues and Research Challenges.International Journal of Computer Science and Information Technology & Security,1, 2.
- R. Velumadhava Rao, K. Selvamani. (2015). Data Security Challenges and Its Solutions in Cloud Computing.Procedia Computer Science, 48, 204-209.
- Ravichandiran C. (2014). Data Security Challenges and Its Solutions for Cloud Computing.International Journal of Advance Computing, Engineering and Application, 3, 6. http://journal.uob.edu.bh
- Prantosh Kumar Paul, Mirnal K. Ghose. (2012). Cloud Computing: Possibilities, Challenges and Opportunities with Special Reference to its Emerging Need in the Academic and Working Area of Information Science.Procedia Engineering, 38, 2222-2227.
- Richard Scroggins. (2017). Emerging Virtualization Technology.Global Journal of Computer Science and Technology, 17, 3.
- Durairaj, M, Kannan.P. (2014). A Study on Virtualization Techniques and Challenges in Cloud Computing.International Journal of Scientific & Technology Research, 3, 11.
- T.Swathi, K.Srikanth, S.Raghunath Reddy. (2014). Virtualization in cloud computing.International Journal of Computer Science and Mobile Computing,3,5,540-546.
- Weimin Ding, Benjamin Ghansah, and Yanyan Wu (2015). Research on the Virtualization Technology in Cloud Computing Environment,International Journal of Engineering Research in Africa, 21, 191-196.
- Kamyab Khajehei. (2014). Role of virtualization in cloud computing.International Journal of Advance Research in Computer Science and Management Studies,2,4.
- Santosh Kumar, R.H. Goudar. (2012). Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey.International Journal of Future Computer and Communication,1, 4.
- Loganayagi, S. Sujatha. (2012). Enhanced Cloud Security by Combining Virtualization and Policy Monitoring Techniques.Procedia Engineering, 30, 654-661.
- Gabriel Cephas Obasuyi, Arif Sari (2015). Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment,Int.J.Communications, Network and System Sciences, 8, 260-273.
- Vikas Kumar, Prasann Pradhan. (2015). Trust Management Issues in Social-Media Marketing.International Journal of Online Marketing,5,3, 47-64.
- Stefan Stieglitz, Milad Mirbabie, Bjorn Ross, Christoph Neuberger. (2018). Social media analytics -Challenges in topic discovery, data collection, and data preparation.International Journal of Information Management, 39, 156-168.
- Daniel Schlagwein, Monica Hu (2016). How and why organisations use social media: five use types and their relation to absorptive capacity,Journal of Information Technology, 1-16.
- Virpi Kristiina Tuunainen, Olli Pitkanen, Marjaana Hovi (2009). User's Awareness of Privacy on Online Social Networking Sites - Case Facebook,eEnablement: Facilitating an Open, Effective and Representative eSociety, 14-17.
- Roshan Jabee, M.Afshar Alam. (2016). Issues and Challenges of Cyber Security for Social Networking Sites (Facebook).International Journal of Computer Applications, 144, 3.
- C.F. Hofacker, D. Belanche. (2016). Eight Social media challenges for marketing managers.Spanish Journal of Marketing - ESIC,20, 2, 73-80.
- Susan P. Williams, Verena Hausman. (2017). Categorizing the Business Risks of Social Media.Procedia Computer Science, 121, 266-273. [35] [36] Vandana and kumar, Anil, Issues and challenges in management related to information technology (March 20, 2019). In proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM- 2019), February 26 -28, 2019, Amity University Rajasthan, Jaipur, India. Available at SSRN: https://ssrn.com/abstract=3356540
- Dr U Ravi Babu (2017). Self-Services and Broad Network Access in Cloud Computing Stack.International Journal For Research in Emerging Science and Technology, 4, 1, 24-28.
- Sanjaya K. Panda, Prasanta K. Jana (2019). Load balanced task scheduling for cloud computing: a probabilistic approach.Knowledge and Information Systems, 1-25.
- Sanjaya K. Panda, Prasanta K. Jana (2019). An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems.Cluster Computing, 22, 2, 509-527.