DEMATEL-Based Method for Secure Transition of Commercial Institutes to Cloud Computing

Document Type : Review article

Authors

Shahed University

Abstract

By rapid advancement in processing and storage technologies as well as Internet, a new computational model called cloud computing has emerged. However, most of the business and IT companies operate in the traditional IT space in Iran. Recently, companies began to learn and use expert persons in this field. Despite of many benefits of cloud, there are several risks which institutions should know before they migrate to the cloud environment. There are many factors that affect the adaptation and adoption of cloud by companies. Identifying these factors is required for better understanding of cloud computing to accept or reject it. To understand and analyze the effect of these factors on cloud computing, we need to use a technology acceptance model. In this research according to the conducted studies about companies adoption with cloud and as well as interview with experts who are often from cloud service providers and IT service provider companies, we tried to identify these factors and finally using technology acceptance model, a new and suitable model was provided to adopt with cloud computing. In this model, the relationships between the factors have been studied in a way that the effect of them on each will be recognized well.

Keywords


Archana, S. (2012). Data Management and Deployment of Cloud Applications in Financial Institutions and its Adoption Challenges. International Journal of Scientific & Technology , 1 (1), 25-31
Behrend, S., Wiebe, E., London, J., Johson, E. ( 2011). Cloud computing adoption and usage in community colleges. Behaviour & Information Technology, 30 (2), 231-240.
Chaves, D., Westphall, C. B., Lamin, F. R. (2010). SLA Perspective in Security Management for Cloud Computing. 6th International Conference on Networking and Services (ICNS), 212–217.
Dawoud, W., Takouna, I., Meinel, C. (2010). Infrastructure as a service security: Challenges and solutions. 7th International Conference on Informatics and Systems (INFOS).
Ho, W. R. J., Tsai, C. L., Tzeng, G. H., Fang, S. K. (2011). Combined DEMATEL technique with a novel MCDM model for exploring portfolio selection based on CAPM. Expert Systems with Applications, 38 (1), 16–25.
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L. (2009). On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing.
Kaufman, L. M. (2009). Data Security in the World of Cloud Computing. IEEE Security Privacy, (4) 7, 61–64.
Kuyoro, S. O., Ibikunle, F., Awodele, O. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks (IJCN), 3 (5), 247 – 255.
Omotunde, A. A., Awodele, O. (2013). Survey of Cloud Computing Issues at Implementation Level. Journal of Emerging Trends in Computing and Information Sciences.
Qiang, Z., Dong, C. (2009). Enhance the User Data Privacy for SAAS by Separation of Data, Information Management, Innovation Management and Industrial Engineering,.
Ronnie, T. (2012). Cloud computing in Singapore: Business Transformation with Cloud. Info-communications Development Authority of Singapore, ISBN: 978-9810716929.
Ross, V. W. (2010). Factors influencing the adoption of cloud computing by decision making managers. Capella University.
Roudbari, R. B., Zarkandi, S., Ghaziani, K. (2015). Engineering Statistics and Probability, Dynamic new publication, first edition,. (in Persian)
Schwarz, A., Jayatilaka, B., Hirschheim, R., Goles, T. (2009). A Conjoint Approach to Understanding IT Application Services Outsourcing. Journal of the AIS, 10 (10), 748–781.
Terence, H. L. (2015). Regression Analysis of Cloud Computing Adoption for U.S. Hospitals. Walden University: LAP LAMBERT Academic Publishing, ISBN: 978-3659774881.
Walsh, K. R. (2003). Analyzing the Application ASP Concept: Technologies, Economies, and Strategies, Communications of the ACM,.
Wang, C., Wang, Q., Ren, K., Lou, W. (2010). Ensuring data storage security in Cloud Computing, 17th International Workshop on Quality of Service (IWQoS).