Anda di halaman 1dari 6

Computer Standards & Interfaces 38 (2015) 72–77

Contents lists available at ScienceDirect

Computer Standards & Interfaces


journal homepage: www.elsevier.com/locate/csi

Cloud computing: A value creation model


David C. Chou ⁎
Department of Computer Information Systems, Eastern Michigan University, Ypsilanti, MI 48197, USA

a r t i c l e i n f o a b s t r a c t

Article history: Cloud computing has gained vast attention due to its technological advancement and availability. Possible
Received 12 April 2014 benefits of adopting cloud computing in organizations are ease-of-use, convenience, on-demand access,
Received in revised form 18 July 2014 flexibility, and least management from the users. This paper analyzes the risk and value components inside
Accepted 1 October 2014
cloud computing practice through a value creation model.
Available online 13 October 2014
© 2014 Elsevier B.V. All rights reserved.
Keywords:
Cloud computing
Value creation model
Risk analysis
IT auditing standards

1. Introduction process and technology may also be examined before it to be adopted


in organizations. For this vibrant thought, cloud computing's practice
Cloud computing is a newly developed computing area that has may also be examined through the value creation analysis.
been adopted by a large number of organizations in the world for This study aims to identify a set of components that assist organi-
information technology practices. Organizations move to cloud comput- zations to assess the value creation of cloud computing. We
ing practice may gain benefits such as cost saving, efficiency improving, introduce a value creation model to describe the content of each
agility enhancing, flexibility and scalability of services, and environmen- component and the relationship among components in the value
tal sustainability. Cloud computing gained its popularity because it creation model. Various effects of implementing cloud computing
changed the physiognomies of the IT industry through the exercise of in organizations will be discussed. This value creation model
virtualization. In the meantime, some major concerns to cloud provides guidance to the IT industry for their future development
computing practice, such as security and privacy breaches are originat- in cloud computing. Since cloud computing heavily depends on
ed from its virtualized setting. The cloud computing operation is similar Internet infrastructure and technology, security will be a major
to the practice of information technology (IT) outsourcing. The concern to cloud computing operation. These risk factors are identi-
complexity of outsourcing makes cloud computing's quality control a fied in the value model. The auditing practice is stipulated by law. In
challengeable job. order to comply with legal requirement, auditing must be exercised
This paper intends to discover the value creation and challenges in cloud computing operation. All of these concerns and require-
confronted by cloud computing's practice. Since cloud computing may ments are included and discussed in the value creation model.
become the next wave of IT innovation, many more organizations may The paper is structured as follows. The next section provides a
adopt this technology into their business processes. Therefore, a clear background analysis to cloud computing technology, including its
examination to the value realization of cloud computing may contribute benefits and inherent risks. After that, the concept and the theoretical
to the IT field dramatically. foundation of IT value are explained. The cloud computing value
The discovery of value creation is an essential and challengeable task creation model is introduced and illustrated in the next section. A
in every business process. In order to pursue sustainable business conti- conclusion is provided in the last section of the paper.
nuity in organizations, they must maintain and strengthen the outcome
of value creation activities. For example, Michael Porter [21] proposed
“value chain analysis”, in which every step in business process has 2. Moving to the cloud
been investigated to manage its value. However, individual business
2.1. Cloud computing implications

⁎ Tel.: +1 734 487 0054. More and more companies adopted cloud computing services
E-mail address: dchou@emich.edu. recently. Gartner Inc. forecasted that the sale for cloud services will

http://dx.doi.org/10.1016/j.csi.2014.10.001
0920-5489/© 2014 Elsevier B.V. All rights reserved.
D.C. Chou / Computer Standards & Interfaces 38 (2015) 72–77 73

increase from US $46.4 billion in 2008 to US $150.1 billion in 2013 [14]. 2.2. Benefits of moving to the cloud
Cloud computing is a recently developed information technology (IT)
that utilizes resources virtualization approach to deliver IT services Cloud computing providers offer active and convenient accessibility
through Internet technology and on-demand mode. National Institute to clients, such as on-demand and pay-per-use services. Cloud comput-
of Standards and Technology (NIST) defined cloud computing, on its ing users save IT cost since they only pay for what they used; they do not
web page, as “a model for enabling convenient, on-demand network ac- need to invest in hardware, software, networking, and hiring IT staff in-
cess to a shared pool of configurable computing resources (e.g., networks, side organizations. Security service is handled by cloud computing pro-
servers, storage, applications, and services) that can be rapidly viders, however, the user organizations are the major concern of
provisioned and released with minimal management effort or service security breach. Another important benefit of moving to the cloud is
provider interaction” [18]. NIST classified the cloud deployment into the the scalability and flexibility of IT that are offered by cloud computing
following four categories: private cloud, community cloud, public cloud, vendors. Cloud computing users can enjoy the suppleness of workload
and hybrid cloud [18]. changes, especially handling growing business transactions during the
Private cloud is operated solely for an organization, on which hard- hot season. Users moving to cloud computing just are like outsourcing
ware, networking, storage, applications, interfaces, and infrastructure their IT operations to the vendors. For this reason, users do not need
do not share with other companies. Private cloud provides internal to handle IT management tasks in the organization. Another benefit of
services to the organization and employees through corporate intranet moving to the cloud is the enhancement of mobility, that is, clients
or data center. This cloud service can offer desired fault tolerance and can have access to the software at any place they go to, as long as the
security capabilities (such as firewall) to guard the safety of internal IT Internet access is feasible.
operations and processes. Therefore, private cloud can be implemented
in a highly secured and manageable environment. The main disadvan- 2.3. Risks of moving to the cloud
tage of running private cloud computing is its high cost for hiring staff
and maintaining infrastructure and data center. The main risks on cloud computing technology are related to the
Community cloud is “shared by several organizations and supports a following areas: authentication, data security and privacy, interfacing
specific community that has shared concerns (e.g., mission, security with internal systems, system availability, business continuity, and
requirements, policy, and compliance considerations).” [15, p. 5]. ownership of content and other legal requirements [22]. Among these
Community cloud can be created inside or outside the organization. risk factors, security and privacy are the most concerned area since
Since its shared characteristics, cloud security control becomes a cloud computing data are stored outside corporate premises [19].
major concern. For example, a school district in a city may create a In cloud computing practices, the clients (or user companies) out-
community cloud for regional schools' access and usage. These schools source servers, server applications, data storage, and software programs
must agree to and follow a common policy of cloud computing practice. to a cloud service provider (or vendor) for receiving on-demand and
Public cloud is the most common type of cloud computing. Within pay-per-use service [20]. Most of cloud providers offer metered
this model, the service provider (such as Google or Amazon.com) offers service— it means they charge customers for the processing capacity
its cloud infrastructure for general public use on a self-service, that customers have actually used. This special arrangement makes
on-demand, and pay-per-use basis. Public cloud service providers cloud computing's audit work different from that of traditional IT audit.
must create an extremely scalable data center and flexible infrastruc- We recognize the fact that information technology delivers value to
ture for clients' needs. Since client's computing and storage needs are user organizations and businesses. Any new breed of information
unpredictable, cloud service providers must be well prepared for technology should add new and supplementary value to the existing
these uncertain demands. Public cloud may serve a large amount of IT capability or functionality to survive. Cloud computing has been in-
customers in the market; its security functionality must be well troduced to the IT field and gained sufficient acceptance from the
protected. users in the business community. It is likely that cloud computing has
Hybrid cloud is the cloud service that syndicates public cloud, created substantial value in many user organizations. We would discuss
private cloud, and community cloud options. Based on corporate the implication of IT value creation and its relevance to cloud computing
needs (such as strategic, security and/or confidentiality concerns), in the next section.
company can allocate workloads into separate cloud infrastructures.
For example, a company may use a public platform to send data to a 3. Theoretical foundation
private cloud would be a hybrid cloud environment. A new way of
conducting corporate computing process is to combine public ser- 3.1. Cloud computing and outsourcing model
vices with private clouds and data center together. This is a typical
hybrid cloud implementation. Cloud computing, just like SaaS, is an operation of outsourcing
Based on the package offered by the vendors, cloud computing internal IT services into external vendors for meeting company's
contains three different types of service models: software-as-a- needs. Chou [4] indicated that SaaS practice should be fitted into an
service (SaaS), platform-as-a-service (PaaS), and infrastructure-as- outsourcing model, its main advantages are cost saving, better resources
a-service (IaaS). SaaS allows clients to use providers' applications utilization, more application access scalability, and global outsourcing
that run on a cloud infrastructure, which can be accessed through a possibility. The theoretical foundation behind outsourcing practice is
web browser. All needed cloud infrastructure (such as network, ample, for example, production cost economics [28], transaction cost
servers, operating systems, and application software) is hosted in theory [7], resource-based theory [8], competitive advantage and
vendor's house. PaaS accommodates to developers' need by offering value chain [21], and economies of scale [4]. The production cost
the entire computing platform and solutions set for an application economics theory supports the argument that outsourcing decision of
needed at client's house. PaaS allows the client to control the appli- the firm is to pursue a low-cost production process [4,5]. The transac-
cation software (analysis and design), however, the developer tion cost theory reflected that organizations intend to consider
must know how to work with vendors' programming languages, outsourcing while transaction cost is low for business activities, includ-
interfaces and database systems. IaaS offers clients the capabilities ing time and cost for negotiation, and writing and enforcing contract be-
of processing, storage, networks, and other computing resources so tween two sites [4,5]. The resource-based theory indicates that firms
they can run selective software (operating systems and applications) center on deployment and combination of specific input rather than
in house. Its only tradeoff is that cloud providers manage the avoidance of opportunities [8]. For this reason, an outsourcing decision
infrastructure in use. is based on seeking external resources or capability for meeting
74 D.C. Chou / Computer Standards & Interfaces 38 (2015) 72–77

company's purposes such as saving expenses or improving capability [4, green IT. As indicated by Chou and Chou [3], the value of green IT is
5]. Cloud computing practice, similarly, allows user companies to con- achieved through the satisfactions of enterprises and society.
sume a subset of resources from a pool of IT hardware and software Thethi [26, p. 2] made a cloud value proposition as “reduction of total
that are managed within the company (i.e., for private cloud operation) cost of ownership, translation of fixed to variable cost, and improve-
or by external providers (i.e., for public cloud operation). ment of business agility and ability to build systems of a global class.”
Porter [21] proposed a competitive forces model to show the princi- Based on his cloud value proposition, Thethi [26] proposed a four-step
ple of competitive advantage. The value chain is based on the process cloud adoption strategy, which includes assess, validate, prepare, and
view of organizations, that is, it sees an organization as a series of pro- execute.
cesses and each process adds value to the product or service for their Another cloud computing value study was delivered by Mohammed
customers. A main strategy in competitive advantage is to target high et al. [17]. They proposed a cloud computing value chain model that is
value-adding process within an organization for enhancing their final based on Porter's value chain theory. This model incorporated three in-
value [21]. Mohammed et al. [17] applied Porter's value chain theory dividual segments, they are primary services, business-oriented support
into a reference model for the cloud value chains. services, and cloud-oriented support services. Cloud computing value is
Economies of scale and division of labor are also theoretical founda- to be delivered based on constant process implementation within above
tion of creating outsourcing practice [4]. The outsourcing vendor ex- mentioned services [17].
poses economies of scale since their average cost declines through the Since cloud computing is an emergent technology in the IT industry,
provision of a mass amount of IT services in the marketplace [4,5]. it is worth of discovering its process of value realization. This paper
Cloud computing vendors perform the similar capability for gaining proposes a cloud computing value creation model that is based on the
the advantage of economies of scale. theoretical foundation of cost economies, resource-based theory,
In summary, theoretical foundation of outsourcing and cloud com- competitive advantage, value chain theory, and economies of scale.
puting is similar to each other, they are cost economy, resource sharing, These theories support the innovative application of cloud computing
competitive advantage, value chain, and economies of scale. Their main in the IT industry. The IT industry observed the needs and opportunities
principle of cloud computing is to have individual vendors who can offer of cost reduction, resourcing sharing, value creation and economies of
high quality, mass capability, and low cost service to enter the market- scale that exist in the marketplace; therefore, cloud computing has
place. The final objective of cloud computing process is to create value to been formed and developed. However, cloud computing technology
the society. We will discuss the value of cloud computing next. needs to go through a few steps to create its value. Based on the above
discussion, a cloud computing value creation model may possess a
four-step process, including awareness, translation, comprehension,
3.2. Value of cloud computing and cloud computing value creation. The final objective of implementing
cloud computing is to reach a sustainable cloud computing technology.
Valuation is an economic process that identifies the value of actions The details of this model are discussed in the next section.
in an organization. Value plays an important role while organizations
are determining an action-taking arrangement. While business 4. Cloud computing value creation model
executives intend to invest in a vital project, they must measure the pos-
sible outcome of satisfaction in that venture. Value is therefore a foun- Cloud computing value realization process can be identified and
dation of decision-making. Cronk and Fitzgerald [9] indicated that illustrated through a value creation model. As illustrated in Fig. 1,
value is the worth or desirability of a thing. Porter [21] proposed a cloud computing value creation model consists of four components:
well-known “value chain analysis”. This value chain analysis conducts awareness, translation, comprehension, and cloud computing value cre-
‘a systematic way of examining all the activities a firm performs and ation. The combined outcomes of the framework, including awareness,
how they interact is necessary for analyzing the sources of competitive translation, comprehension, and cloud computing value creation can
advantage.’ (Porter, p. 33). reach to the status of cloud computing sustainability. The individual
Without a doubt, IT delivers value to organizations. IT generates components of the framework are discussed below.
value by utilizing computing power in the work place, in there time sav-
ing, cost deduction, and decision-support function can be achieved is a 4.1. Awareness component
vivid indication of IT value realization. Whereas applying value analysis
into IT practice, Smith and McKeen [25] constituted three components The expected benefits of adopting cloud computing service can be
of developing an IT value in business processes, including identification, anticipated by prospective organizations. Logically, organizations may
conversion, and realization. Identification component implies that those create their own wish list or expectations for the cloud computing ser-
potential opportunities for adding value should be identified at the be- vice. An ideal cloud computing service should offer a client organization
ginning of the process. Conversion component is the step to show that needed IT capability through on-demand and pay-per-use service from
those opportunities must be converted into effective applications of provider's provisioning of application software, platform, infrastructure,
technology for the process. Realization component is the final step and data center, so the client company could focus on its core business
that states applications must be realized by organizations for generating strategies, such as innovation, economic of scale, competitiveness, and
IT value [25]. efficiency and effectiveness, just to name a few of them.
One example of value realization process model was done by Chou The prospective cloud computing adopters should understand the
and Chou [3]. They utilized a value model to illustrate the process of types of cloud computing (public, private, community, and hybrid)
realizing green IT. Their green IT value model consists of four compo- and then determine the one that may fit into their business environ-
nents/stages, including awareness, translation, comprehension, and ment. They should also understand the cloud computing service
green IT value realization. In order to achieve the goal of adopting models, including software-as-a-service (SaaS), infrastructure-as-a-
green IT, the awareness stage indicates that organizations must identify service (IaaS), and platform-as-a-service (PaaS). Picking a suitable ser-
and recognize the value of green IT. The translation stage specifies that vice model is essential since such cloud computing practice must meet
organizations must convert the idea of green IT into actions. The organizational need and IT setting.
comprehension stage demands organizations to fully support the prac- Another important decision factor now is cost determination. The
tice of green IT by developing metrics and methods for evaluating and client company must figure out the cost and benefits of moving to the
monitoring the implementation outcomes of green IT. The final stage, cloud environment. Moving to the cloud is similar to pursuing IT
green IT value, reveals the performance result and the value of realizing outsourcing practice. SaaS, for example, can be characterized as an
D.C. Chou / Computer Standards & Interfaces 38 (2015) 72–77 75

Cloud Compung Sustainable


Awareness Translaon Comprehension Value Creaon cloud computing

1. Understanding 1. Risk idenficaon 1. Audit standards 1. Sasfacon


of cloud compung
2. Security protecon 2. Risk measurement 2. Social value
2. Need
idenficaon 3. Contracng issue 3. Knowledge 3. Green IT
management system
3. Cost analysis

Fig. 1. Cloud computing value creation model.

outsourcing model [5]. The benefit of moving to the cloud is to save a The user organizations should pay close attention to these areas since
large portion of current IT expenses such as hardware, software, any security breach may cause damage to companies.
networking, data storage, technical support, and staff management Another important risk is regarding contracting issue. Cloud com-
and training. The cost of receiving cloud computing service is based on puting vendors and clients must agree upon their service items and
the amount of IT services received from the vendors. To most organiza- guaranteed quality levels. These details must be included as the service
tions, the result of cost/benefit analysis must be positive. Gartner Inc. level agreements (SLAs) in the service contract.
reported its investigation to the economics, or cost/benefit analysis, of The cloud computing practitioners must fully understand the issues
cloud computing and found that economic advantage of cloud comput- discussed above, and then the translation stage can be completed. The
ing is higher than on-site computing practice [12]. In the meantime, next component in the cloud computing value creation model is
organizations must recognize possible risks of moving to the cloud. comprehension.
Risk factors such as security breach and system unavailability may
cause a vital damage to the organization.
4.3. Comprehension component

The third component in the value creation model is comprehension.


4.2. Translation component
During this stage, organizations must fully understand the characteris-
tics of cloud computing, cost function of subscribing cloud computing
After awareness, the value creation model moves to the translation
service, risk factors and legal compliance (such as cloud computing
component. A vital objective of the translation component is to convert
auditing). It is then moving to the cloud comprehension phase.
cloud computing desire and interest into a series of tactics. During this
During cloud comprehension, organizations must create measure-
phase, organizations must perform profound studies before adopting
ment to assess the outcome of cloud computing operations. The current
cloud computing practice, especially to the area of risk identification.
IT assessment method is commonly handled by the auditing process.
Risk identification can be done through a detailed examination to
Cloud computing should also apply IT auditing process to monitor its
possible security breach during data transmission in cloud computing
operations.
practice. Also, moving to the cloud implies the existence of uncertain sit-
Organizations that adopt cloud computing service imply the action
uations such as loss of control to IT operation and data management.
of outsourcing its IT functions to external vendors. Under SOX regula-
Many cases have been reported about service interruption from cloud
tion, the client company cannot surrender its management responsibil-
computing providers. On April 21, 2011, Amazon's cloud computing
ities of IT internal control to vendor organizations. The Auditing
platform stopped working, which brought down a number of websites
Standard No. 2 (stipulated by Public Company Accounting Oversight
such as Reddit and Quora [27]. Essers [11] reported the cloud failures
Board) states that:
as “A total of 568 h of downtime at 13 well-known cloud services
since 2007 had an economic impact of more than $71.7 million dollars, “The use of a service organization does not reduce management's
said the International Working Group on Cloud Computing Resiliency responsibility to maintain effective internal control over financial
(IWGCR) …. Their research is based on press reports of cloud outages reporting. Rather, user management should evaluate controls at the ser-
at services like Twitter, Facebook, Amazon, Microsoft, Google, Yahoo, vice organization, as well as related controls at the user company, when
and Paypal, among others.” making its assessment about internal control over financial reporting.”
Cloud computing is based on virtualization scheme and it processes
information through the Internet. There are many risk areas inside The above standard stipulates that cloud computing adopters must
cloud computing practice. Armbrust et al. [2] indicated “top 10 obstacles conduct an evaluation of vendor organization's control over IT environ-
and opportunities” for cloud computing: business continuity and ser- ment. The SAS 70 (Statement on Auditing Standard No. 70) states that
vice availability, data lock-in, data confidentiality and auditability, data auditor's report from vendor's site will meet the goal of this stipulation,
transfer bottlenecks, performance unpredictability, scalable storage, although this auditor's report is prepared by vendor's auditor. Since
bugs in large-scale distributed systems, scaling quickly, reputation fate there are two types of SAS 70 reports — type-1 and type-2 audit reports.
sharing, and software licensing. Within these risk factors, data security Type-1 audit focuses on the fairness of the presentation of service
is a growing concern in cloud computing operation. As indicated earlier, organization's controls. Type-2 audit focuses on whether the specific
client's data are stored in cloud computing vendor's data center and also controls were operating effectively. Since cloud computing technology
shared with other client's data (i.e., memory virtualization) without is more complicated than regular outsourcing practice, and conducting
controlling capability, which could create ‘trust’ concern. However, type-2 audit may show more detailed controlling information from
most of security breaches exist in end-users' systems or storage practice. the vendor's site [10].
76 D.C. Chou / Computer Standards & Interfaces 38 (2015) 72–77

The rise of cloud computing attracted IT auditor's attention, especial- computing audit. An auditing firm must offer their IT auditors sound
ly on possible risks associated with such technology. Under such educational and training programs. A better way to develop their
circumstance, IT auditors must understand the details of cloud comput- auditors is the creation of a knowledge management system (KMS)
ing and follow a specific auditing method/approach that can comply for cloud computing audit. All experienced cloud computing auditors'
with regulations set by auditing authority for conducting auditing knowledge, solutions to problems, and work experience can be stored
work. However, risks on cloud computing implementation are the in the KMS for corporate access.
major focus in cloud computing auditing.
Since cloud computing involves external vendor's support and
4.4. Cloud computing value creation component
control to needed information technologies, the auditing work should
be more complicated than the regular IT auditing work [13,22–24].
Combining the effects of cloud computing's awareness, translation,
Risk-based IT auditing is one of the important auditing methods. This
and comprehension could result in a predictable cloud computing
approach requests IT auditors to follow an effective risk assessment
value. Specifically, the user organizations place the full trust into the
method to conduct IT audit.
vendors. All risks and security breaches can be fully controlled by
An alternate way of conducting cloud computing audit is the value-
vendors. Auditing practice can be independently implemented by the
added approach. Auditors should clearly understand the value of cloud
cloud computing auditor. The targeted value set by user organization
computing to be assumed by the client organization. The auditing
can be assessed and verified at this stage.
then focuses on those targeted value propositions. Possible value aims
Value can be identified as the worth of desirability of a thing [9].
for cloud computing practice comprise of budget solution, increased
Value can be measured through the satisfaction of doing things. It can
flexibility, better resource utilization, improved efficiency and greater
be inferred that the value of cloud computing can reveal the degree of
agility, access to new technology, improved security, cost avoidance,
satisfaction in the IT industry. A measurement device will be used to
new cost model, and improved collaboration [6]. Value-added cloud
measure the value of cloud computing practice.
computing can be easier if these targeted value components can be
Cloud computing can generate additional value on enhancing envi-
identified and checked by the IT auditor.
ronmental sustainability. Moving to the cloud means the reduction of
Cloud computing auditing is a complicated task, in which various
acquiring computer hardware and network devices. Most importantly,
technological aspects need to be examined and reported. For example,
the use of electricity in organizations will be diminished. In the mean-
organizations may adopt public cloud, private cloud, community
time, the result of e-waste generation will also be shortened. These en-
cloud, or hybrid cloud for their cloud practices. The complexity within
vironmental protection activities create the social value in our society.
these cloud categories may cost IT auditors tremendous amount of
This value effect contributes to the green IT movement and finally
energy to filtering out the details of network connectivity, systems
reaches to the goal of environmental sustainability. It could be the
and software interfaces, database storage methods, platform differ-
best scenario to the development of cloud computing technology.
ences, and infrastructure designs.
Security is the most significant concern to cloud computing practice.
Since user organization's data are stored in provider's remote site, it 5. Conclusion
raises privacy and confidentiality concerns. Also, any data transforma-
tion in cloud operation must pass through the Internet infrastructure. Cloud computing has been accepted by the IT industry. Its practice
Unless the providers offering absolute security programs to guard the brings in benefits such as cost saving, ease of use, scalability, flexibility,
data source and to prevent data breach during transmission, trust and environmental sustainability. This new technology adds new value
relationship between vendors and clients may not be easily established. to the society, however, it may not be easy to be watched. Therefore, we
Other than data security, there are plenty of risk components that need must identify its value realization process.
to be identified before an IT auditor starts his/her work. Therefore, a In order to understand the inner insinuation of this new technology,
well preparation is essential to the success of cloud computing audit this paper conducts a study to investigate the implications of cloud
process. computing, and then proposed a cloud computing value creation
Since cloud computing is a relatively new computing technology, its model. This cloud computing value creation model can be depicted
technological weaknesses and immaturity may exist. In order to con- with four components: awareness, translation, comprehension, and
duct a complete audit process, these technological drawbacks need to cloud computing value creation. The final circumstance of cloud
be discovered and published. This way allows IT auditors to find the computing is to reach to a sustainable computing era.
right areas to examine. Therefore, cloud computing's audit effectiveness After examining the technical and application aspects, this paper
can be achieved rapidly. lays down a number of challenges that face cloud computing, including
A variety of IT auditing standards have been used, they are COBIT technological complexity, security risk, absence of audit standard, and
(Control Objectives for Information and related Technology), ISACA's contractual issue. As indicated by Marston et al. [16], weaknesses exit
IT Assurance Framework, ITIL (Information Technology Infrastructure on using cloud computing. For example, user organizations have
Library), ISO reporting standard ISAE 3402, and SAS 70 [1,10,19,24]. concern about the loss of physical control of the data in the cloud and
The auditor may select one acceptable standard for auditing practice. the service quality and availability may not be guaranteed by the
Most of these standards are applicable to IT auditing, however, it lacks cloud vendors. Oracle Corp. established a “Cloud Computing Maturity
a standard for implementing cloud computing audit. Model” in 2011 to guide the success of building cloud capabilities. This
A non-technical challenge to cloud computing is the contractual model is in line with the Capability Maturity Model (CMM) that has
issue, that is, service level agreements (SLAs) disputing among clients been frequently adopted in the software industry. Oracle's Cloud
and vendors. Since clients depend heavily on vendor's technology to Computing Maturity Model contains six levels of maturity, including
run business and process data, a fully agreeable contract (including none, ad hoc, opportunistic, systematic, managed, and Optimized [16].
SLA) must be created and signed. For example, the SLA must include The cloud computing industry still sees the level-6 maturity as a
performance measurement, security provisions, service charge amount challengeable goal to be reached. Furthermore, the future devel-
and metering method, exit strategy (how to terminate contract), etc. opment to this technology could be knowledge management system's
Therefore, SLA is a key object to be audited. construction.
Finally, cloud computing auditors need to be knowledgeable to all We wish this study could provide some guidance to those IT practi-
related information of cloud computing practice. As we mentioned tioners who are going to conduct cloud computing practice in the
above, there are a number of challenges face to the future of cloud near future.
D.C. Chou / Computer Standards & Interfaces 38 (2015) 72–77 77

References [13] S. Gadia, Cloud computing: an auditor's perspective, ISACA J. 6 (2009).


[14] S. Hamm, Cloud Computing's Big Bang for Business, BusinessWeek, June 15, p. 42–44,
[1] J. Akoka, I. Wattiau, A framework for auditing web-based information systems, ECIS 2009.
2010 Proceedings, 2010 (Paper 58). [15] V. Kundra, Federal Cloud Computing StrategyA white paper The White House,
[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Washington, DC, 2011.
Patterson, A. Rabkin, I. Stoica, M. Zaharia, A view of cloud computing, Commun. [16] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, A. Ghalsasi, Cloud computing — the
ACM 53 (4) (2010) 50–58. business perspective, Decis. Support. Syst. 51 (2011) 176–189.
[3] D.C. Chou, A.Y. Chou, Awareness of Green IT and its value model, Comput. Stand. [17] A.B. Mohammed, J. Altmann, J. Hwang, Cloud computing value chains: understand-
Interfaces 34 (2012) 447–451. ing businesses and value creation in the cloud, Economic Models and Algorithms for
[4] D.C. Chou, An investigation into IS outsourcing success: the role of quality and Distributed Systems, Birkhauser Verlag, Basel, Switzerland, 2009, pp. 187–208.
change management, Int. J. Inf. Syst. Chang. Manag. 2 (2) (2007) 190–204. [18] NIST, NIST cloud computing programavailable at http://www.nist.gov/itl/cloud/
[5] D.C. Chou, A.Y. Chou, Analysis of a new information systems outsourcing practice: 2012 (accessed November 01, 2012).
software-as-a-service business model, Int. J. Inf. Syst. Chang. Manag. 2 (4) (2007) [19] C.A. Nicolaou, A.I. Nocolaou, G.D. Nocolaou, Auditing in the cloud: challenges and
392–405. opportunities, CPA J. (January 2012) 66–70.
[6] CDW, Migrating to the CloudA white paper, available at cdw.com/cloud2012 [20] R.R. Panko, J.L. Panko, Business Data Networks and Telecommunications, 8th edition
(accessed on November 1, 2012). Prentice Hall, Boston, MA, 2011.
[7] R. Coase, The nature of the firm, Economica 4 (1937) 386–405. [21] M.E. Porter, Competitive Advantage: Creating and Sustaining Superior Performance,
[8] K.R. Conner, A historical comparison of resource-based theory and five schools of The Free Press, New York, 1985.
thought within industrial organization economics: do we have a new theory of [22] V. Raval, Risk landscape of cloud computing, ISACA J. 1 (2010).
the firm? J. Manag. 17 (1) (1991) 121–154. [23] S. Ross, Cloudy daze, ISACA J. 1 (2010).
[9] M. Cronk, E. Fitzgerald, Understanding ‘IS business value’: derivation of dimensions, [24] T.W. Singleton, IT audits of cloud and SaaS, ISACA J. 3 (2010) 1–3.
Logist. Inf. Manag. 12 (1–2) (1999) 40–49. [25] H.A. Smith, J.D. McKeen, Developments in practice VII: developing and delivering
[10] H. Du, Y. Cong, Cloud computing, accounting, auditing, and beyond, CPU J. (October the IT value proposition, Communications of the Association for Information
2010) 66–70. Systems, vol. 112003. (article 25).
[11] L. Essers, Cloud failures cost more than $71 million since 2007, InfoWorld, June 19 [26] J.P. Thethi, Realizing the value proposition of cloud computing: CIO's enterprise IT
2012. (available at http://www.infoworld.com/d/cloud-computing/cloud-failures- strategy for clouda white paper Infosys, Inc., 2009.
cost-more-71-million-2007-195895, accessed on April 2, 2013). [27] S. Towns, Preparing for cloud computing failuresAccessed from http://www.governing.
[12] J. Feiman, D.W. Cearly, Economics of the cloud: business value assessment, Gartner RAS com/columns/tech-talk/Preparing-for-Cloud-Computings-Failure.html2011.
Core Research Note G00168554, Gartner Inc., 2009. (available at http://escience.wash- [28] O.E. Williamson, The modern corporation: origin, evolution, attributes, J. Econ. Lit.
ington.edu/sites/default/files/b-economics_of_the_cloud_bva_OR.en-us.pdf, accessed 19 (1981) 1537–1568.
on July 10, 2014).

Anda mungkin juga menyukai