Challenges for Migrating to the Service Cloud Paradigm: An Agile Perspective

  • Stavros Stavru
  • Iva Krasteva
  • Sylvia Ilieva
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7652)

Abstract

Migrating to the Service Cloud Paradigm implies the migration of legacy software systems to a service-oriented architecture with deployment in the cloud. Although this specific software modernization paradigm promises numerous strategic and operational advantages, it poses also many complex organizational and technical challenges, among which is the lack of mature processes, methods and techniques. This paper examines the questions of whether agile methods and techniques could be scaled to fit the migration to the Service Cloud Paradigm and how they could help overcoming the challenges of software modernization in this specific context. The research methodology presented here first extracts the challenges of the migration to Service Cloud Paradigm through a systematic literature review and then, using expert judgment, evaluates how different agile techniques, taken from Scrum and Extreme Programming (XP), could address the identified challenges. As a result, a ranked list of applicable agile techniques is presented and suggestions for their adoption in software modernization projects are drawn.

Keywords

Agile Software Development Software Migration Software Modernization Cloud Computing Service-Oriented Architecture 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Helmer, O., Helmer-Hirschberg, O.: Looking forward: a guide to futures research. Sage Publications (1983)Google Scholar
  2. 2.
    Linstone, H.A., Turoff, M.: The Delphi method: techniques and applications. Addison-Wesley Pub. Co., Advanced Book Program (1975)MATHGoogle Scholar
  3. 3.
    Dalkey, N.C., Corporation, R.: Delphi: Rand (1967)Google Scholar
  4. 4.
    Yousuf, M.I.: Using Experts’ Opinions through Delphi Technique. Practical Assessment Research & Evaluation 12 (2007)Google Scholar
  5. 5.
    Pfeiffer, J.: New look at education: systems analysis in our schools and colleges. Odyssey Press (1968)Google Scholar
  6. 6.
    Tilley, S., et al.: Migrating to SOA: approaches, challenges, and lessons learned. Presented at the Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research, Toronto, Ontario, Canada (2010)Google Scholar
  7. 7.
    Bano, M., Ikram, N.: Issues and Challenges of Requirement Engineering in Service Oriented Software Development. In: 2010 Fifth International Conference on Software Engineering Advances (ICSEA), pp. 64–69 (2010)Google Scholar
  8. 8.
    Mahmood, Z.: Service oriented architecture: potential benefits and challenges. Presented at the Proceedings of the 11th WSEAS International Conference on Computers, Agios Nikolaos, Crete Island, Greece (2007)Google Scholar
  9. 9.
    Lewis, G.A., et al.: Effects of service-oriented architecture on software development lifecycle activities. Software Process: Improvement and Practice 13, 135–144 (2008)CrossRefGoogle Scholar
  10. 10.
    Kontogiannis, K., et al.: A research agenda for service-oriented architecture. Presented at the Proceedings of the 2nd International Workshop on Systems Development in SOA Environments, Leipzig, Germany (2008)Google Scholar
  11. 11.
    Kontogiannis, K., et al.: The Landscape of Service-Oriented Systems: A Research Perspective. In: International Workshop on Systems Development in SOA Environments, SDSOA 2007, ICSE Workshops, p. 1 (2007)Google Scholar
  12. 12.
    Lewis, G.A., et al.: Common Misconceptions about Service-Oriented Architecture. In: Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, ICCBSS 2007, pp. 123–130 (2007)Google Scholar
  13. 13.
    Zheng, L., et al.: Facing Service-Oriented System Engineering challenges: An organizational perspective. In: 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA), pp. 1–4 (2010)Google Scholar
  14. 14.
    Hutchinson, J., et al.: Evolving Existing Systems to Service-Oriented Architectures: Perspective and Challenges. In: IEEE International Conference on Web Services, ICWS 2007, pp. 896–903 (2007)Google Scholar
  15. 15.
    Nasr, K.A., et al.: Realizing service migration in industry—lessons learned. Journal of Software Maintenance and Evolution: Research and Practice, n/a–n/a (2011)Google Scholar
  16. 16.
    Papazoglou, M., et al.: Service-Oriented Computing: A Research Roadmap. International Journal of Cooperative Information Systems 17, 223 (2008)CrossRefGoogle Scholar
  17. 17.
    Kokko, T., et al.: Adopting SOA: Experiences from Nine Finnish Organizations. In: 13th European Conference on Software Maintenance and Reengineering, CSMR 2009, pp. 129–138 (2009)Google Scholar
  18. 18.
    Mahmood, Z.: The Promise and Limitations of Service Oriented Architecture. International Journal of Computers 1, 74–78 (2007)Google Scholar
  19. 19.
    Becker, A., et al.: Value Potentials and Challenges of Service-Oriented Architectures. Business & Information Systems Engineering 3, 199–210 (2011)CrossRefGoogle Scholar
  20. 20.
    Maurizio, A., et al.: Service Oriented Architecture: Challenges for Business and Academia. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, p. 315 (2008)Google Scholar
  21. 21.
    Bhallamudi, P., Tilley, S.: SOA migration case studies and lessons learned. In: 2011 IEEE International Systems Conference (SysCon), pp. 123–128 (2011)Google Scholar
  22. 22.
    Papazoglou, M.P., et al.: Service-Oriented Computing: State of the Art and Research Challenges. Computer 40, 38–45 (2007)CrossRefGoogle Scholar
  23. 23.
    Tilley, S.: Report from the 5th and 6th international workshops on adoption-centric software engineering: Migrating to SOA. In: 2011 IEEE International Systems Conference (SysCon), pp. 135–139 (2011)Google Scholar
  24. 24.
    Nigul, L., et al.: The SOA programming model: challenges in a services oriented world. Presented at the Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research, Ontario, Canada (2009)Google Scholar
  25. 25.
    Feuerlicht, G.: Enterprise SOA: What are the benefits and challenges? In: Systems Integration, pp. 36–43 (2006)Google Scholar
  26. 26.
    Lewis, G.A.: SMART: The Service-oriented Migration and Reuse Technique: Carnegie Mellon University, Software Engineering Institute (2005)Google Scholar
  27. 27.
    Kulkarni, N., Dwivedi, V.: The Role of Service Granularity in a Successful SOA Realization A Case Study. Presented at the Proceedings of the 2008 IEEE Congress on Services - Part I (2008)Google Scholar
  28. 28.
    Issarny, V., et al.: Service-oriented middleware for the Future Internet: state of the art and research directions. Journal of Internet Services and Applications 2, 23–45 (2011)CrossRefGoogle Scholar
  29. 29.
    Brown, P.C.: Succeeding with SOA: realizing business value through total architecture. Addison-Wesley (2007)Google Scholar
  30. 30.
    Choudhury, P., et al.: Deployment of Service Oriented architecture in MANET: A research roadmap. In: 2011 9th IEEE International Conference on Industrial Informatics (INDIN), pp. 666–670 (2011)Google Scholar
  31. 31.
    Yi, W., Blake, M.B.: Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. IEEE Internet Computing 14, 72–75 (2010)Google Scholar
  32. 32.
    Balasubramaniam, S., et al.: Challenges for assuring quality of service in a service-oriented environment. In: ICSE Workshop on Principles of Engineering Service Oriented Systems, PESOS 2009, pp. 103–106 (2009)Google Scholar
  33. 33.
    Simanta, S., et al.: Information assurance challenges and strategies for securing SOA environments and web services. In: 2009 3rd Annual IEEE Systems Conference, pp. 173–178 (2009)Google Scholar
  34. 34.
    Venters, C.C., et al.: Provenance: Current directions and future challenges for service oriented computing. In: 2011 IEEE 6th International Symposium on Service Oriented System Engineering (SOSE), pp. 262–267 (2011)Google Scholar
  35. 35.
    Phan, C.: Service Oriented Architecture (SOA) - Security Challenges and Mitigation Strategies. In: Military Communications Conference, MILCOM 2007, pp. 1–7. IEEE (2007)Google Scholar
  36. 36.
    Canfora, G., Di Penta, M.: Testing services and service-centric systems: challenges and opportunities. IT Professional 8, 10–17 (2006)CrossRefGoogle Scholar
  37. 37.
    Verma, A., Kaushal, S.: Cloud Computing Security Issues and Challenges: A Survey. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 445–454. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  38. 38.
    Xiu-ping, Z.: Study on the opportunities and challenges of the cloud computing for Chinese medium-sized and small enterprises. In: 2011 International Conference on E -Business and E -Government (ICEE), pp. 1–3 (2011)Google Scholar
  39. 39.
    Habib, S.M., et al.: Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation. In: 2010 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 410–415 (2010)Google Scholar
  40. 40.
    Dillon, T., et al.: Cloud Computing: Issues and Challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27–33 (2010)Google Scholar
  41. 41.
    Al-Qirim, N.: A Roadmap for success in the clouds. In: 2011 International Conference on Innovations in Information Technology (IIT), pp. 271–275 (2011)Google Scholar
  42. 42.
    Kim, W., et al.: Adoption issues for cloud computing. Presented at the Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, Kuala Lumpur, Malaysia (2009)Google Scholar
  43. 43.
    Oh, T.H., Lim, S., Choi, Y.B., Park, K.-R., Lee, H., Choi, H.: State of the Art of Network Security Perspectives in Cloud Computing. In: Kim, T.-h., Stoica, A., Chang, R.-S., et al. (eds.) SUComS 2010. CCIS, vol. 78, pp. 629–637. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  44. 44.
    Roberts II, J.C., Al-Hamdani, W.: Who can you trust in the cloud?: a review of security issues within cloud computing. Presented at the Proceedings of the 2011 Information Security Curriculum Development Conference, Kennesaw, Georgia (2011)Google Scholar
  45. 45.
    Hay, B., et al.: Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. In: 2011 44th Hawaii International Conference on System Sciences (HICSS), pp. 1–7 (2011)Google Scholar
  46. 46.
    Timmermans, J., et al.: The Ethics of Cloud Computing: A Conceptual Review. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 614–620 (2010)Google Scholar
  47. 47.
    Takabi, H., et al.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8, 24–31 (2010)CrossRefGoogle Scholar
  48. 48.
    Ovadia, S.: Navigating the Challenges of the Cloud. Behavioral & Social Sciences Librarian 29, 233–236 (2010)CrossRefGoogle Scholar
  49. 49.
    Mathisen, E.: Security challenges and solutions in cloud computing. In: 2011 Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference (DEST), pp. 208–212 (2011)Google Scholar
  50. 50.
    Petcu, D.: Portability and interoperability between clouds: Challenges and case study. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssière, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 62–74. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  51. 51.
    Mathur, P., Nishchal, N.: Cloud computing: New challenge to the entire computer industry. In: 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC), pp. 223–228 (2010)Google Scholar
  52. 52.
    Chang, H., Choi, E.: Challenges and security in cloud computing. In: Kim, T.-H., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 120, pp. 214–217. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  53. 53.
    Kossmann, D., Kraska, T.: Data Management in the Cloud: Promises, State-of-the-art, and Open Questions. Datenbank-Spektrum 10, 121–129 (2010)CrossRefGoogle Scholar
  54. 54.
    Joshi, K.R., et al.: Dependability in the cloud: Challenges and opportunities. In: DSN, pp. 103–104 (2009)Google Scholar
  55. 55.
    Morrell, R., Chandrashekar, A.: Cloud computing: new challenges and opportunities. Network Security 2011, 18–19 (2011)CrossRefGoogle Scholar
  56. 56.
    Al-Azzoni, I., et al.: Abstract only: performance evaluation for software migration. SIGSOFT Softw. Eng. Notes 36, 42 (2011)CrossRefGoogle Scholar
  57. 57.
    Roberts, J.C., Al-Hamdani, W.: Who can you trust in the cloud?: a review of security issues within cloud computing. Presented at the Proceedings of the 2011 Information Security Curriculum Development Conference, Kennesaw, Georgia (2011)Google Scholar
  58. 58.
    Lar, S.U., et al.: Cloud computing privacy & security global issues, challenges, & mechanisms. In: 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 1240–1245 (2011)Google Scholar
  59. 59.
    Zhao, W.: An Initial Review of Cloud Computing Services Research Development. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 324–328 (2010)Google Scholar
  60. 60.
    Zhang, Q., et al.: Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications 1, 7–18 (2010)CrossRefGoogle Scholar
  61. 61.
    Dudin, E., Smetanin, Y.: A review of cloud computing. Scientific and Technical Information Processing 38, 280–284 (2011)CrossRefGoogle Scholar
  62. 62.
    Loutas, N., et al.: Cloud Computing Interoperability: The State of Play. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 752–757 (2011)Google Scholar
  63. 63.
    Grobauer, B., Schreck, T.: Towards incident handling in the cloud: challenges and approaches. Presented at the Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, Illinois, USA (2010)Google Scholar
  64. 64.
    Pareto, V.: Manual of political economy: Scholars Book Shelf (1971)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Stavros Stavru
    • 1
  • Iva Krasteva
    • 1
  • Sylvia Ilieva
    • 1
  1. 1.Sofia University “St. Kliment Ohridski” 5SofiaBulgaria

Personalised recommendations