Abstract
Organisations and enterprise firms, from banks to social Web, are considering developing and deploying applications on the cloud due to the benefits offered by them. These benefits include cost effectiveness, scalability and theoretically unlimited computing resources. Many predictions by experts have indicated that centralising the computation and storage by renting them from third-party provider is the way to the future. However, before jumping into conclusions, engineers and technology officers must assess and weigh the advantages of cloud applications over concerns, challenges and limitations of cloud-based applications. Decisions must also involve choosing the right service model and knowing the disadvantages and limitations pertaining to that particular service model. Although cloud applications have benefits a galore, organisations and developers have raised concerns over the security and reliability issues. The idea of handing important data over to another company certainly has security and confidentiality worries. The implication does not infer that cloud applications are insecure and flawed but conveys that they require more attention to cloud-related issues than the conventional on-premise approaches. The objective of this chapter is to introduce the reader to the challenges of cloud application development and to present ways in which these challenges can be overcome. The chapter also discusses the issues with respect to different service models and extends the challenges with reference to application developer’s perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800–145, September 2001
Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. In: High Performance Computing and Communications, 2008, HPCC ’08, Dalian, China. 10th IEEE International Conference, pp. 5–13 (2008)
Gong, C., et al.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshops, San Diego
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
Cloud Computing: What is infrastructure as a service. http://technet.microsoft.com/en-us/magazine/hh509051.aspx
Wang, L., Tao, J., Kunze, M., Castellanos, A.C., Kramer, D., Karl, W.: Scientific cloud computing: early definition and experience. 10th IEEE Int. Conf. High Perform. Comput. Commun. 9(3), 825–830 (2008)
Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: PROC 2010 I.E. International Conference on Cloud Computing, Indianapolis, USA (2010)
API and usage documentation for developer using Rackspace service. http://docs.rackspace.com
Wu, R., Ahn, G., Hongxin Hu, Singhal M.: Information flow control in cloud computing. In: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference, Brisbane, Australia, pp. 17. IEEE (2010)
Shimba, F.: Cloud computing: strategies for cloud computing adoption. Masters Dissertation, Dublin Institute of Technology (2010)
About STAR: https://cloudsecurityalliance.org/star/faq/
Description of standard service by TripWire. http://www.tripwire.com/services/standard/
Description of Custom service by TripWire. http://www.tripwire.com/services/custom/
Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Lee, B.S., HP Laboratories: TrustCloud: a framework for accountability and trust in cloud computing. http://www.hpl.hp.com/techreports/2011/HPL-2011-38.pdf
Minnear, R.: Latency: The Achilles Heel of cloud computing, 9 March 2011. Cloud Expo: Article, Cloud Comput. J. http://cloudcomputing.sys-con.com/node/1745523 (2011)
Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5) (2011)
FedRAMP: U.S General Services Administration Initiative. http://www.gsa.gov/portal/category/102371
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Prepared by CSA 2009. https://cloudsecurityalliance.org/csaguide.pdf
Weixiang, S., et al.: Cloud service broker, March 2012. http://tools.ietf.org/pdf/draft-shao-opsawg-cloud-service-broker-03.pdf (2012)
Tyagi, S.: RESTful web service, August 2006. http://www.oracle.com/technetwork/articles/javase/index-137171.html (2006)
Kerberos in the Cloud: Use Case Scenarios. https://www.oasis-open.org/committees/download.php/38245/Kerberos-Cloud-use-cases-11june2010.pdf
Apache PIG: http://pig.apache.org/
Apache Hadoop: http://hadoop.apache.org/
SAAS, PAAS and IAAS – Making Cloud Computing Less Cloudy. http://cioresearchcenter.com/2010/12/107/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Pramod, N., Muppalla, A.K., Srinivasa, K.G. (2013). Limitations and Challenges in Cloud-Based Applications Development. In: Mahmood, Z., Saeed, S. (eds) Software Engineering Frameworks for the Cloud Computing Paradigm. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-5031-2_3
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5031-2_3
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5030-5
Online ISBN: 978-1-4471-5031-2
eBook Packages: Computer ScienceComputer Science (R0)