Implementing Cloud-Centric IoT Transformations: Merits and Demerits

Authors

DOI:

https://doi.org/10.31181/sa22202422

Keywords:

Cloud-centric, IOT, Transformation, Manufacturing enterprise, JEL classification codes: O14‎

Abstract

This study critically analyzed the merits and demerits of implementing cloud-centric cloud Internet of Things (IoT) transformation in ac manufacturing enterprise that specializes in automobile parts. The objective of cloud computing at AC Manufacturing Inc., a mid-sized business that specialises in car parts, should be accomplished with the intention of either increasing revenue or decreasing the time spent on various tasks. The departments of the entire organisation may operate more simply thanks to cloud computing. On the other side, cloud computing brings up certain issues that might become troublesome regarding reliability, safety, legal responsibility, and credibility. It is thus suggested that the management of AC Manufacturing Inc. embrace cloud computing, but with periodic staff training and retraining, in light of the comprehensive analysis of the merits and demerits of cloud computing.

References

‎[1]‎ Tournier, J., Lesueur, F., Mouël, F. Le, Guyon, L., & Ben-Hassine, H. (2021). A survey of IoT protocols ‎and their security issues through the lens of a generic IoT stack. Internet of things, 16, 100264. DOI: ‎‎10.1016/j.iot.2020.100264‎

‎[2]‎ Koo, D., Piratla, K., & Matthews, C. J. (2015). Towards sustainable water supply: schematic ‎development of big data collection using internet of things (IoT). Procedia engineering, 118, 489–497. ‎DOI: 10.1016/j.proeng.2015.08.465‎

‎[3]‎ Oza, S., Ambre, A., Kanole, S., Kshirsagar, P., Dhabekar, N., Paliwal, K., & Hendre, V. (2020). IoT: the ‎future for quality of services. ICCCE 2019: proceedings of the 2nd international conference on ‎communications and cyber physical engineering (pp. 291–301). Springer Singapore. DOI: 10.1007/978-981-‎‎13-8715-9_35‎

‎[4]‎ Alieyan, K., Almomani, A., Abdullah, R., Almutairi, B., & Alauthman, M. (2021). Botnet and internet of ‎things (IoTs): a definition, taxonomy, challenges, and future directions. In Research anthology on ‎combating denial-of-service attacks (pp. 138–150). IGI Global. DOI: 10.4018/978-1-7998-5348-0.ch007‎

‎[5]‎ Maru, R., Pitroda, J. R., & Raval, A. D. (2020). Feasibility study of internet of things (IoT) in ‎construction industry: a review. Studies in indian place names, 40(50). https://l1nq.com/XwHql

‎[6]‎ Sharma, K., Anand, D., Sabharwal, M., Tiwari, P. K., Cheikhrouhou, O., & Frikha, T. (2021). A disaster ‎management framework using internet of things-based interconnected devices. Mathematical problems ‎in engineering, 2021(1), 9916440. DOI: 10.1155/2021/9916440‎

‎[7]‎ Khanna, A., & Kaur, S. (2020). Internet of Things (IoT), applications and challenges: a comprehensive ‎review. Wireless personal communications, 114, 1687–1762. DOI: 10.1007/s11277-020-07446-4‎

‎[8]‎ Dehalwar, V., Kalam, A., Kolhe, M. L., & Zayegh, A. (2016). Review of machine to machine communication ‎in smart grid. 2016 international conference on smart grid and clean energy technologies (ICSGCE) (pp. ‎‎134–139). IEEE. DOI: 10.1109/ICSGCE.2016.7876040‎

‎[9]‎ Kim, W. (2009). Cloud computing: today and tomorrow. Journal of object technology, 8(1), 65–72. ‎http://www.jot.fm/issues/issue_2009_01/column4/‎

‎[10]‎ Rafat, A., & Abdur, R. (2018). An online based inventory management system implementation in ‎printing business. Journal of emerging technologies and innovative research (JETIR), 5(11). DOI: ‎‎10.13140/RG.2.2.13930.77763 ‎

‎[11]‎ Vella, E., Yang, L., Anwar, N., & Jin, N. (2018). Adoption of cloud computing in hotel industry as emerging ‎services. International conference on information (pp. 218–228). Cham: springer international ‎publishing. DOI: 10.1007/978-3-319-78105-1_26‎

‎[12]‎ Ayoobkhan, M. & Kaldeen, M. (2020). An empirical study on cloud computing technology on hotel ‎industry in Sri Lanka. The emerald handbook of ict in tourism and hospitality, emerald publishing limited, leeds, ‎‎425–440. DOI: 10.1108/978-1-83982-688-720201027‎

‎[13]‎ Schneider, A. (2012). The adaptation of cloud computing by the hotel industry. [Thesis]. University of ‎Nevada, Las Vegas. https://digitalscholarship.unlv.edu/thesesdissertations/1330/‎

‎[14]‎ Nigar, N., Saeed, S., & Hussaineni, S. N. (2023). Key opportunities and challenges of migrating IT ‎resources to cloud computing. Trends in technical & scientific research, 6(1), 555680. DOI: ‎‎10.19080/TTSR.2023.06.555680‎

‎[15]‎ Azar, A., Bagheri Gara Bollagh, H., & Keshavarz, M. (2023). Precursors and outcomes of students’ ‎attitude towards social media advertising, the case of the University of Semnan. Global media journal-‎persian edition, 13(1), 1-21. (In Persian). DOI: 10.22059/gmj.2023.68232‎

‎[16]‎ Neelima, M. L., & Padma, M. (2014). A study on cloud storage. International journal of computer science ‎and mobile computing, 3(5), 966–971. https://www.academia.edu/download/33820504/V3I5201499a81.pdf

‎[17]‎ Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT ‎platforms: vision, hype, and reality for delivering computing as the 5th utility. Future generation ‎computer systems, 25(6), 599–616. DOI: 10.1016/j.future.2008.12.001‎

‎[18]‎ Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., & Teregowda, P. (2011). Decision support tools for cloud ‎migration in the enterprise. 2011 ieee 4th international conference on cloud computing (pp. 541–548). ‎IEEE. DOI: 10.1109/CLOUD.2011.59‎

‎[19]‎ Chieu, T. C., Mohindra, A., Karve, A. A., & Segal, A. (2009). Dynamic scaling of web applications in a ‎virtualized cloud computing environment. 2009 ieee international conference on e-business engineering ‎‎(pp. 281–286). IEEE. https://ieeexplore.ieee.org/abstract/document/5342101/‎

‎[20]‎ Khajeh-Hosseini, A., Sommerville, I., & Sriram, I. (2010). Research challenges for enterprise cloud ‎computing. ArXiv preprint arxiv:1001.3257. DOI: 10.48550/arXiv.1001.3257‎

‎[21]‎ Qian, L., Luo, Z., Du, Y., & Guo, L. (2009). Cloud computing: an overview. Cloud computing: first ‎international conference, Beijing, China. (pp. 626–631). Springer. DOI: 10.1007/978-3-642-10665-1_63‎

‎[22]‎ Dillon, T., Wu, C., & Chang, E. (2010). Cloud computing: issues and challenges. 2010 24th ieee international ‎conference on advanced information networking and applications (pp. 27–33). IEEE. DOI: ‎‎10.1109/AINA.2010.187‎

‎[23]‎ Tarhini, A., Al-Badi, A., Almajali, M., & Alrabayaah, S. H. (2017). Factors influencing employees¡ ‎intention to use cloud computing. Journal of management and strategy, 8(2), 47–62. DOI: ‎‎10.5430/jms.v8n2p47‎

‎[24]‎ Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing ‎environments. IEEE security & privacy, 8(6), 24–31. DOI: 10.1109/MSP.2010.186‎

‎[25]‎ Ahmed, H. A. S., Ali, M. H., Kadhum, L. M., Zolkipli, M. F., & Alsariera, Y. A. (2017). A review of ‎challenges and security risks of cloud computing. Journal of telecommunication, electronic and computer ‎engineering (JTEC), 9(1–2), 87–91. https://jtec.utem.edu.my/jtec/article/view/1662‎

‎[26]‎ Tabrizchi, H., Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: ‎issues, threats, and solutions. Journal of supercomputer, 76(12), 9493–9532. DOI: 10.1007/s11227-020-03213-‎‎1‎

‎[27]‎ Ucuz, D., & others. (2020). Comparison of the iot platform vendors, microsoft azure, amazon web services, and ‎google cloud, from users’ perspectives. 2020 8th international symposium on digital forensics and security ‎‎(ISDFS) (pp. 1–4). IEEE. DOI: 10.1109/ISDFS49300.2020.9116254‎

‎[28]‎ Rana, S., & Joshi, P. K. (2012). Risk analysis in web applications by using cloud computing. International ‎journal of multidisciplinary research, 2(1), 386–394. ‎https://www.academia.edu/download/36574912/zijmr_vol_2_issue_1_jan_2012_complete.pdf#page=39‎‎3‎

‎[29]‎ Pearson, S., & Benameur, A. (2010). Privacy, security and trust issues arising from cloud computing. 2010 ‎ieee second international conference on cloud computing technology and science (pp. 693–702). IEEE. ‎DOI: 10.1109/CloudCom.2010.66‎

‎[30]‎ Yang, J. N., Yang, J. K., & Lin, K. (2015). The cloud computing and the application of cloud computing ‎in the telecommunication enterprise. Applied mechanics and materials, 729, 195–198. DOI: 10.4028‎

‎[31]‎ Diaby, T., & Rad, B. B. (2017). Cloud computing: a review of the concepts and deployment models. ‎International journal of information technology and computer science, 9(6), 50–58. DOI: ‎‎10.5815/ijitcs.2017.06.07‎

‎[32]‎ Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-Service (SaaS): perspectives and challenges. Science ‎china information sciences, 57, 1–15. DOI: 10.1007/s11432-013-5050-z

‎[33]‎ Giessmann, A., & Stanoevska-Slabeva, K. (2012). Business models of platform as a service (PaaS) ‎providers: current state and future directions. JITTA: journal of information technology theory and ‎application, 13(4), 31. https://www.proquest.com/openview/beb21a86d14ac60dbf94b335defd142b/1?pq-‎origsite=gscholar&cbl=25721‎

‎[34]‎ Devi, T., & Ganesan, R. (2015). Platform-as-a-service (PaaS): model and security issues. Telkomnika ‎indonesian journal of electrical engineering, 15(1), 151–161. DOI: 10.11591/telkomnika.v15i1.8073‎

‎[35]‎ Manvi, S. S., & Shyam, G. K. (2014). Resource management for infrastructure as a service (IaaS) in cloud ‎computing: a survey. Journal of network and computer applications, 41, 424–440. DOI: ‎‎10.1016/j.jnca.2013.10.004‎

‎[36]‎ Jansen, W., Grance, T., & others. (2011). Guidelines on security and privacy in public cloud computing. ‎National institute of standards and technology. ‎https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-144.pdf‎

‎[37]‎ Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in a hybrid ‎cloud computing environment: modelling and platform. Enterprise information systems, 7(3), 237–271. ‎DOI: 10.1080/17517575.2012.677479‎

‎[38]‎ Alajmi, Q., Sadiq, A. S., Kamaludin, A., & Al-Sharafi, M. A. (2018). Cloud computing delivery and ‎delivery models: opportunity and challenges. Advanced science letters, 24(6), 4040–4044. DOI: ‎‎10.1166/asl.2018.11537‎

‎[39]‎ Siddiqui, S., Darbari, M., & Yagyasen, D. (2019). A comprehensive study of challenges and issues in ‎cloud computing. Soft computing and signal processing (pp. 325–344). Singapore: Springer Singapore. ‎DOI: 10.1007/978-981-13-3600-3_31‎

‎[40]‎ Singh, Y., Kandah, F., & Zhang, W. (2011). A secured cost-effective multi-cloud storage in cloud computing. ‎IEEE conference on computer communications workshops (infocom workshops) (pp. 619–624). IEEE. ‎DOI: 10.1109/INFCOMW.2011.5928887‎

‎[41]‎ Xing, Y., & Zhan, Y. (2012). Virtualization and cloud computing. Future wireless networks and ‎information systems, (pp. 305–312). Springer. DOI: 10.1007/978-3-642-27323-0_39‎

Published

2024-09-04

How to Cite

Adeniran, A. O. ., Onuajah, S. I. ., Adeniran, A. A. ., & Ogunmola, M. A. . (2024). Implementing Cloud-Centric IoT Transformations: Merits and Demerits. Systemic Analytics, 2(2), 174-187. https://doi.org/10.31181/sa22202422