Skip to main content

Cloud Applications Management – Issues and Developments

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2018 (ICCSA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10963))

Included in the following conference series:

Abstract

Cloud computing is a platform that dictates the mode of operations within most data centers. Cloud computing relieves its consumer’s from investment in IT infrastructure. Cloud consumers are provided with on-demand services at affordable cost. Cloud service providers offer custom made applications that can be used by a variety of users to handle routine tasks. Cloud service providers also offer their users programming interfaces that enables developers design and deploy applications efficiently. In addition, it is very important for cloud service providers to regulate resources based on the workload on the applications and provide computational resources and storage. Despite cloud computing benefits, it is difficult for cloud users to port applications from one platform to another, this difficulty is inevitable because of the cost and complexity of porting such applications. In addition, it is essential for the cloud service providers to adjust resources based on workloads or failures on the system. This paper discusses key concepts of cloud applications management, issues and development and also reviews recent related literature on cloud application management. This paper examines present trends in the area of cloud application management and provides a guide for future research. In this paper, the main objective is to answer the following questions: what is the current development and trend in cloud application management? Papers published in journals, conferences and white papers were analyzed. The result in this review shows that there is insufficient discussion in the area of trust management and security as it relates to cloud applications management. This would be beneficial to prospective cloud users, researchers and cloud service providers alike.

This work was supported in part by the Covenant University Centre for Research Innovation and Discovery (CUCRID).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145 (2011)

    Google Scholar 

  2. BetterCloud: Cloud Application Management (2015). https://www.bettercloud.com/glossary-cloud-application-management/

  3. Brogi, A., Ibrahim, A., Soldani, J., Carrasco, J., Cubo, J., Pimentel, E., D’Andria, F.: SeaClouds: a European project on seamless management of multi-cloud applications. SIGSOFT Softw. Eng. Notes 39(1), 1–4 (2014). 39-1-2014-0163-5948. https://doi.org/10.1145/2557833.2557844

  4. Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2011)

    Article  Google Scholar 

  5. Hoßfeld, T.: Challenges of QoE management for cloud applications. IEEE Commun. Mag. 50(4), 20–27 (2012)

    Article  Google Scholar 

  6. Fehling, C., Leymann, F., Rütschlin, J., Schumm, D.: Pattern-based development and management of cloud applications. Future Internet 4, 110–141 (2012). https://doi.org/10.3390/fi4010110

    Article  Google Scholar 

  7. Pourghomi, P., Ghinea, G.: Managing NFC payment applications through cloud computing. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) (2012)

    Google Scholar 

  8. Fang, X., Misra, S., Xue, G., Yang, D.: Managing smart grid information in the cloud: opportunities, model, and applications. IEEE Netw. 26(4), 32–38 (2015). https://doi.org/10.1109/mnet.2012.6246750

    Article  Google Scholar 

  9. Doukas, C., Maglogiannis, I.: Managing wearable sensor data through cloud computing. In: 2011 Third IEEE International Conference on Coud Computing Technology and Science (2011). https://doi.org/10.1109/cloudcom.2011.65

  10. Caglar, F., Gokhale, A.: iOverbook: Managing Cloud-based Soft Real-time Applications in a Resource Overbooked Data Center. https://pdfs.semanticscholar.org/f42c/56380367fa638f389eeb3eae67ab8a6c075e.pdf

  11. Ferry, N., Song, H., Rossini, A., Chauvel, F., Solberg, A.: CloudMF: Applying MDE to Tame the Complexity of Managing Multi-Cloud Applications (2013). http://cloudml.org/wp-content/uploads/nordicloud13_pres.pdf

  12. Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.B.H.J., Yussof, S.: An effective approach for managing power consumption in cloud computing infrastructure. J. Comput. Sci. 21, 349–360 (2016). http://dx.doi.org/10.1016/j.jocs.2016.11.007

    Article  Google Scholar 

  13. Zhaoa, Z., Martin, P., Wang, J., Taal, A., Jones, A., Taylor, I., Stankovski, V., Vega, I.G., Suciu, G., Ulisses, A., de Laat, C.: Developing and operating time critical applications in clouds: the state of the art and the SWITCH approach. Proc. Comput. Sci. 68(2015), 17–28 (2015). https://doi.org/10.1016/j.procs.2015.09.220

    Article  Google Scholar 

  14. Toffetti, G., Brunner, S., Blöchlinger, M., Spillner, J., Bohnert, T.M.: Self-managing cloud-native applications: design, implementation, and experience. Future Gener. Comput. Syst. (2016). https://doi.org/10.1016/j.future.2016.09.002

    Article  Google Scholar 

  15. Fortinet: Securing Cloud Applications (2017). www.fortinet.com

  16. Huebscher, M.C., Mccann, J.A.: A survey of autonomic computing—degrees, models and applications (2009). Accessed 24 May 2017

    Google Scholar 

  17. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305(2015), 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  18. Velte, A.T., Velte, T.J., Elsenpeter, R.C., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, pp. 250–251. The McGraw-Hill, New York (2010). ISBN 978-0-07-162695-8

    Google Scholar 

  19. Cloud Management Tools: Cloud Native Application Management, 1 October 2017. https://cloud.google.com/products/management/

  20. App Dynamics: Cloud Application Management (2017). https://www.appdynamics.com/solutions/cloud-application-management/

  21. Mishra, A., Mathur, R., Jain, S., Singh Rathore, J.: Cloud computing security. Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC), pp. 36–39 (2013). http://www.ijritcc.org/download/IJRITCC_1309.pdf

  22. Tari, Z.: Security and privacy in cloud computing. IEEE Cloud Comput. 1(1), 54–57 (2014). https://doi.org/10.1109/MCC.2014.20

    Article  Google Scholar 

  23. Behl, A., Behl, K.: An analysis of cloud computing security issues. In: 2012 World Congress on Information and Communication Technologies (WICT), pp. 109–114 (2012). http://doi.org/10.1109/WICT.2012.6409059

  24. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647–651 (2012). http://doi.org/10.1109/ICCSEE.2012.193

  25. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials 15(2), 843–859 (2013). https://doi.org/10.1109/SURV.2012.060912.00182

    Article  Google Scholar 

  26. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). https://doi.org/10.1016/j.future.2010.12.006

    Article  Google Scholar 

  27. Rahman, M., Cheung, W.M.: Analysis of cloud computing vulnerabilities. Int. J. Innov. Sci. Res. 2(2), 308–312 (2014a). http://www.issr-journals.org/links/papers.php?journal=ijisr&application=pdf&article=IJISR-14-120-07

  28. Liu, M., Dou, W., Yu, S., Zhang, Z.: A decentralized cloud firewall framework with resources provisioning cost optimization. IEEE Trans. Parallel Distrib. Syst. 26(3), 621–631 (2015). https://doi.org/10.1109/TPDS.2014.2314672

    Article  Google Scholar 

  29. Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. PP(99), 1 (2015). http://doi.org/10.1109/TC.2015.2389960

  30. Al-Anzi, F.S., Salman, A.A., Jacob, N.K., Soni, J.: Towards robust, scalable and secure network storage in Cloud Computing. In: 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 51–55 (2014). http://doi.org/10.1109/DICTAP.2014.6821656

  31. Khalil, I.M., Khreishah, A., Bouktif, S., Ahmad, A.: Security concerns in cloud computing. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 411–416 (2013). http://doi.org/10.1109/ITNG.2013.127

  32. Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12:1–12:30 (2013). http://doi.org/10.1145/2522968.2522980

    Article  Google Scholar 

  33. Al-Anzi, F.S., Yadav, S.K., Soni, J.: Cloud computing: security model comprising governance, risk management and compliance. In: 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), pp. 1–6 (2014). http://doi.org/10.1109/ICDMIC.2014.6954232

Download references

Acknowledgment

We acknowledge the support and sponsorship provided by Covenant University through the Centre for Research, Innovation and Discovery (CUCRID).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. Odun-Ayo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Odun-Ayo, I., Odede, B., Ahuja, R. (2018). Cloud Applications Management – Issues and Developments. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10963. Springer, Cham. https://doi.org/10.1007/978-3-319-95171-3_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95171-3_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95170-6

  • Online ISBN: 978-3-319-95171-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics