Next Article in Journal
Evaluation of Landfill Site Selection by Combining Fuzzy Tools in GIS-Based Multi-Criteria Decision Analysis: A Case Study in Diyarbakır, Turkey
Next Article in Special Issue
Probing Determinants Affecting Intention to Adopt Cloud Technology in E-Government Systems
Previous Article in Journal
Enterprise Architecture Approach for Project Management and Project-Based Organizations: A Review
Previous Article in Special Issue
The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing

1
Department of Computer Science & Informational Technology, Sarhad University of Science & Informational Technology, Peshawar 25120, Pakistan
2
Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture, Peshawar 25120, Pakistan
3
Department of Information Technology, College of Computer and Information Technology, Taif University, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(16), 9809; https://doi.org/10.3390/su14169809
Submission received: 17 April 2022 / Revised: 1 August 2022 / Accepted: 1 August 2022 / Published: 9 August 2022
(This article belongs to the Special Issue Sustainable Information Systems)

Abstract

:
Sustainable Cloud Computing is the modern era’s most popular technology. It is improving daily, offering billions of people sustainable services. Currently, three deployment models are available: (1) public, (2) private, and (3) hybrid cloud. Recently, each deployment model has undergone extensive research. However, relatively little work has been carried out regarding clients’ adoption of sustainable public cloud computing (PCC). We are particularly interested in this area because PCC is widely used worldwide. As evident from the literature, there is no up-to-date systematic literature review (SLR) on the challenges clients confront in PCC. There is a gap that needs urgent attention in this area. We produced an SLR by examining the existing cloud computing models in this research. We concentrated on the challenges encountered by clients during user adoption of a sustainable PCC. We uncovered a total of 29 obstacles that clients confront when adopting sustainable PCC. In 2020, 18 of the 29 challenges were reported. This demonstrates the tremendous threat that PCC still faces. Nineteen of these are considered critical challenges to us. We consider a challenge a critical challenge if its occurrence in the final selected sample of the paper is greater than 20%. These challenges will negatively affect client adoption in PCC. Furthermore, we performed three different analyses on the critical challenges. Our analysis may indicate that these challenges are significant for all the continents. These challenges vary with the passage of time and with the venue of publication. Our results will assist the client’s organization in understanding the issue. Furthermore, it will also help the vendor’s organization determine the potential solutions to the highlighted challenges.

1. Introduction

Sustainable cloud computing (CC) is a developing technology [1,2]. The versatility, broad accessibility, and efficient process of computer assets are all unique properties of CC. A flexible paradigm gives different organizations various options regarding diverse resources [3,4]. It plays a key role in big data [2,3]. CC, according to the National Institute of Standards and Technology (NIST), is a method of providing ubiquitous, convenient, on-demand access to a network of shared fields of configurable computer resources (such as networks, servers, data warehouses, applications, and services) that can be quickly provided and delivered with minimal service provider involvement. That is, it controls a huge amount of data (Big data) by applying an efficient mechanism [5,6]. Various organizations benefit from its flexibility to adequately and reliably utilize big data and compete in the market. Because of CC, multiple businesses have grown [7,8,9,10,11].
CC is a significant area of interest in information technology (I.T.). It does not only offer flexibility and scalability [12]. However, it also has the advantages of being simple to use, having market access, saving time, and being cost-effective. Because of these benefits, businesses have turned to CC [13,14,15].
In recent years, the adoption of public cloud computing (PCC) has gained great significance in the industry and academia [16]. PCC is becoming more widely adopted worldwide because of its potential to deliver significant benefits to the industry and the community [17]. A contract-based arrangement between a cloud client(s) and a cloud vendor(s) constitutes a CC implementation. In such an agreement, the customer agrees to transfer some or all of their organization’s digital assets to the cloud vendor [18], who provides agreed-upon services on a “pay-as-you-go” basis [19].
The public cloud (P.C.) infrastructure is available for the general public or a large-scale industrial organization selling the cloud services [20]. In the P.C., resources are available through the internet with the concept of pay-per-usage. Grace explained that the users could use the services on demand, for which they do not need to buy special hardware. The P.C. provides the services according to the required capacity of the users [21]. According to Peter et al., cloud services can be owned and distributed by a third-party company [22]. Its primary distributed source is the internet. It is designed so that everyone can use it easily [23]. Consumers of the P.C. are primarily residential users who can connect to the services using a shared internet connection [24]. Tim et al. argue that Google, Amazon, and Microsoft are the best examples of using the P.C. [25]. Oskar explained that users’ data could be managed and stored on third-party vendor servers [26].
The advantages of PCC include the following [27]:
  • Data availability;
  • 24/7 technical expertise is provided;
  • Scalability is on-demand;
  • Easy and cost-efficient;
  • No resource wastage.
The disadvantages of PCC include:
  • Data security;
  • Privacy.
In PCC, you may be unable to know about your data residency. One may be unable to know about the backup procedure of the data. Reliability can also be an issue with public cloud computing [28].
Even though much work has been carried out in PCC, very little in adoption has been carried out on the challenges clients face in adopting PCC. This work focuses on identifying challenges that clients face in adopting PCC.

2. Background

This section contains related public cloud computing research. We have described some of them as follows:
Ren et al. [29] outlined many key security concerns for commercial and P.C., but their list is far from complete. For example, although CC allows for almost unlimited compute capacity while lowering prices, the question of how to prevent hostile cloud users from exploiting cloud resources remains unsolved. Password/key cracking, malicious data hosting, and botnet command and control are examples of misuse. One method to address this risk is to adopt stricter monitoring of cloud resource utilization, which will inevitably conflict with legal users’ privacy rights. As a result, more research is required.
Chakrawarti et al. [30] argued that storing data in an encrypted format is a typical data privacy protection method, but it exposes user data to the danger of unauthorized exposure. They presented a system that combines other identity management and accessed control technologies to improve enterprise P.C. authentication and security to address the problem.
Users can access the P.C. through the internet and cloud subscribers can undertake administrative tasks. This paradigm raises security vulnerabilities in and of itself because remote access exposes possible cyber attackers. While these flaws expand the threat landscape, other concerns constitute an equal, if not greater, security risk [31].
He et al. [32] state that health authorities may mishandle or exploit data obtained via digital mobile apps for long-term and other objectives. Many people are concerned about whether or not these COVID-19-fighting apps are safe to use, how they will protect privacy, and what regulations will be required to avoid abuse [33]. These worries will likely erode public trust and limit people’s willingness to accept new technologies.
People’s use of technological innovations, mainly providing their data to meet the issues posed by the COVID-19 pandemic, requires public confidence and trust. [32].
The P.C. also has some configuration, security, and SLA precision limits, making it less than ideal for services that use confidential material and are vulnerable to compliance rules [34].
According to Kaura et al. [35], users must relinquish control over various security-related issues to the cloud provider when using the P.C. The service agreements given by the service provider may not guarantee that the cloud provider will resolve a challenge that exposes security vulnerability.
Hlatshwayo and Zuva [36] argue that mobile cloud computing (MCC), as one of the future mobile technology developments, provides top services for mobile consumers by combining the advantages of both cloud computing and mobile computing. As more and more people become aware of the data on businesses and individuals being stored in the cloud, MPCC users’ privacy and data integrity are concerns that must be addressed. Many cloud providers must deal with this issue.
Aslam et al. [37] discuss that V.M. migration, an essential function for cloud service providers, for various administrative reasons, poses several security risks, jeopardizing the cloud service’s dependability. They established essential user requirements that serve as the foundation for our proposed V.M. Migration mechanism to solve this. They employed trusted platform module (TPM) capabilities to create a trusted credential (i.e., Trust Token) that ensures the security and trustworthiness of cloud platforms.
Baror et al. [38] argue that in document communications such as texts, emails, or instant chats, public cloud users (whether a possible victim of a cyberattack or a digital forensic investigator) intrinsically communicate using natural human language in the form of sentences and semantics. Their study uses natural human language as an identifier to establish a revolutionary digital forensic readiness (DFR) architecture for cloud computing to detect cybercrime. The DFR framework uses natural language processing techniques to create a mechanism that simulates a near real-time approach to cybercrime detection in the cloud. To construct a DFR framework, natural language understanding algorithms were employed to analyze text data from users in the public cloud and text data from reported cybercrimes. The suggested DFR framework can reduce the time it takes to identify cybercrimes on the public cloud and the time it takes to investigate them.
As a result, cloud users can be identified by their natural human language interaction.
Kaneko et al. [39] developed a V.M. scaling strategy for adjusting the number of V.M.s by forecasting unanticipated performance fluctuations. They tested the proposed method and found that it enhanced the message processing success rate by up to 15% compared to basic methods that do not account for unexpected performance fluctuations.
The related work suggests a few studies conducted in the PCC domain. The studies that are conducted have different approaches. Our focus is on the client-side aspects of PCC.

3. Research Methodology

The strong belief is that selecting the data collection method significantly impacts the analysis process [40]. So, this selection has been made very carefully. We chose the SLR and Questionnaire survey for the data collection to conduct this research. “A systematic literature review (SLR) is a means of identifying, evaluating, and interpreting all available research relevant to a particular research question, topic area, or phenomenon of interest. Individual studies contributing to a systematic review are called primary studies; a systematic review is a form of secondary study” [41]. According to Kitchenham and Charters [42], the critical steps of SLR are conducted in three stages, i.e., planning, conducting, and reporting [43,44].

3.1. Research Questions

The following research questions have been formulated to achieve our research objectives:
RQ1: What challenges, as acknowledged by the literature, are confronted by client organizations that decide to adopt public cloud computing?
RQ1.1: Do these challenges vary across continents?
RQ1.2: Do these challenges differ across publication years?
RQ1.3: Do these challenges differ across different publication venues?
Section 4 presents the answers to all the above questions.

3.2. Search Strategy

Initially, the following trail search was used to search in Google scholar. The papers accessed through the following search string were used for the final search term.
Trail Search string: (“cloud computing”) AND (Challenges)
Synonyms and Boolean operations are used to construct the final search string. “AND” and “OR” are the key terms in this search string.
((“Public cloud” OR “Public cloud computing”) AND (“Challenges” OR “risks” OR “barriers” OR “problems”) AND (“Clients” OR “Users” OR “Customers”)).
Different digital libraries have different interfaces, so we apply the above search string to each library. Irrespective of the date bound, we searched the available literature after constructing the search string. The following digital libraries are searched:

3.3. Publication Selection

First, we reviewed the title, keyword, and abstract for the primary selection of the retrieved publications, as known in Table 1. After that, primarily selected papers’ contents are probed by reading the complete text. As shown in Figure 1, inclusion and exclusion criteria were used for the publication quality assessment.

3.3.1. Inclusion Criteria (IC)

  • IC1: Studies present PCC in general
  • IC2: Studies that addressed the challenges/issues/risks in the domain of CC, specifically PCC
  • IC3: Relevant publish papers in the English Language

3.3.2. Exclusion Criteria (E.C.)

  • EC1: Studies which does not describe challenges/risks in the PCC adoption
  • EC2: Excludes those papers and articles discussing CC challenges in the P.C. domain.
  • EC3: Published paper other than the English Language

3.4. Study Quality Assessment

The following questions were used to assess the quality of the final selected publications:
  • QA1: Are there fine pieces of evidence provided by the study?
  • QA2: Is the author unbiased regarding the positive and negative results?
  • QA3: Are the data collection methods clear?
These questions were marked ‘YES,’ ‘NO,’ ‘Partial,’ and ‘N.A.’

3.5. Data Extraction and Synthesis

We extracted the article title from our finally selected sample of papers, as shown in Appendix A Table A1. As presented in Appendix A Table A2, we also extracted data related to each paper, such as publishing year, journal/conference proceedings/others, databases, and author’s continent. We also extracted PCC risks, challenges, and barriers from each publication and article. An Excel sheet was used to record these data.

4. Results and Discussion

In this section, we present the SLR results conducted to identify challenges faced by clients in adopting PCC. The details are given in Section 4.1. We also performed three different analyses on the challenges. The details are available in Section 4.2.

4.1. Challenges Confronted Clients in the Adoption of Public Cloud Computing

We dig out 29 challenges for clients during the adoption of PCC, as shown in Table 2. Table footer shows the “Frequency of each challenge in SLR” and Table footer shows the Percentage of each challenge in SLR”. “Lack of security” has the highest frequency of 64. The second most cited challenge is “Lack of privacy,” with a frequency of 44. The third most cited challenge is “Data loss or leakage,” having a frequency of 41. For more specifications, we also analyze the critical challenges more thoroughly. We considered a challenge a critical challenge if its percentage occurrence in SLR is =>20. We evaluated nineteen challenges as being pressing challenges. We consider these challenges will negatively affect PCC. CC# represents critical challenges. The identified challenges are as follows:
  • CC#1 Lack of security
In PCC, security remains an issue, not understanding how your data is backed up or stored. However, the CC model presents chances for advanced security services that can boost individual users and organizations [36,45,46].
  • CC#2 Lack of privacy
In the new digital world, enterprise applications generally export user data to P.C. storage to take advantage of cloud infrastructure’s flexibility and efficiency and make corporate goals more cost-efficient. Service providers and consumers face a complex problem with security and privacy concerns in cloud settings [34].
  • CC#3 Data loss or leakages
Information is lost as a result of data breaches. Outsiders are not the only ones who pose a threat; insiders also play an essential role. Insiders can be any member of a cloud service provider who can pose a risk to any user. When unauthorized customer data exposure occurs, secret and proprietary information are at risk [47,48].
  • CC#4 Data and service availability
The service provider’s servers that keep the user’s data in the cloud may be situated elsewhere or far away [49]. If an issue with that server happens, the user may not even have control over that instance [50]. If a node goes down, loses power, a hard drive crashes, or is locked out of their account, the user will not have immediate access to personal records or rectify the problem or issue. The data in the cloud does not guarantee that it is often accessible to the users [50].
  • CC#5 Perceived industry pressure
The amount of cloud computing competence in the firm’s industry and its competitors is called industry pressure. Companies are more inclined to implement I.T. advancements because of their business partners’ recommendations and requirements [51]. If their competitors are implementing new I.T., businesses will be pushed to follow suit to stay competitive. Businesses’ perceptions of I.S. performance improve due to pressure from business partners and competitors. As a result of industry pressure from competitors and business partners, I.S. adoption is strongly predicted [51].
  • CC#6 Geographical dispersion
Big data for data processing can be stored in various locations worldwide and keeping such large servers in multiple locations is costly for a company [52]. Cloud computing significantly reduces the cost of large amounts of data by storing and processing data across geographically dispersed and virtual computers [52].
  • CC#7 Compliance and legal aspects
Legislative and jurisdictional issues are critical information systems management issues in cloud computing due to the likelihood of data center’s being placed in jurisdictions with differing laws [53,54]. Lawmakers must urgently develop effective regulations that will aid in assessing the acceptability of legislation in circumstances where data is stored in many jurisdictions [53,54].
  • CC#8 Lack of user control
The cloud appears to contradict user-centric control: when a SaaS platform is used, the service provider assumes responsibility for data storage, and our data is placed in the hands of a third party with limited flexibility and control [54]. So, how can a consumer retain control over their data when it is kept and accessed in the cloud by a third party? [55].
  • CC#9 Lack of accepted standards
Customers may face vendor lock-in and data portability issues if cloud providers do not use any form of common open standards. Cloud service providers are not approved by any official certification agency [56,57].
  • CC#10 Lack of customer trust
The customer relies on the vendor for many services in the CC architecture. Trust is a larger concept than security because it encompasses subjective technique and experience [58]. On the provider’s end, the consumer must store his personal information. SaaS adoption is dependent on trust, and openness is a critical mechanism [59]. The dealer chain’s lack of control and visibility will create suspicion and distrust [55].
  • CC#11 Lack of Quality of service
Quality-of-Service (QoS) management, which is the problem of sharing resources with the application to ensure a service level across variables such as performance, availability, and dependability, is a challenge cloud applications offer [60].
  • CC#12 Lack of awareness/ Lack of Customer Support/lack of understanding
Consumers are usually unaware of how their data is used and dispersed in the cloud, and whether it is used for purposes other than those for which it was obtained. For example, in some circumstances, such as Google Drive or Dropbox, the primary aim of the service is to store personal information in the cloud, and so use is transparent [61]. Other applications, such as those in the sphere of the Internet of Things (IoT), are less evident. Data can be saved on the device, locally, or in the cloud, or a mix of these options. Consumers may be unaware of where their data is kept [61]. Inadequate service provider expertise, such as data privacy and security policies, is thus a significant barrier to PCC adoption [62].
  • CC#13 Training and education
Education and training have always welcomed new teaching methods and tools [62]. Lack of training and education of experts significantly affects PCC.
  • CC#14 Lack of communication and coordination
PCC makes use of a vast number of networked computers to deliver better services to customers, such as database access, software application execution, and file storage [63]. These services can be provided to users by a single computer server. However, it is impossible to pinpoint a specific machine in the cloud that is providing services to users. Distance between customers and suppliers adds additional issues, such as a difficult communication and coordination process, cultural and linguistic barriers, time zone variances, information management problems, and collaboration problems. [63,64,65,66].
  • CC#15 Lack of Reliability
Consumers are more concerned about the availability of resources in the CC [67,68]. The term “availability” here refers to the cloud service’s reachability and the transaction’s positive outcome. The availability among most cloud providers is not defined in this way. The term “availability” is used by cloud providers to illustrate the level of reliability they may expect from their cloud services. Most cloud providers claim that their servers are available 99.99% of the time. Still, it is unclear if this refers to a single server where a customer’s virtual instance sits or to all servers in data centers worldwide. There have already been several recorded outage occurrences in cloud providers’ data centers [40,67], sending a negative message to cloud customers about the providers’ trustworthiness [56].
  • CC#16 SLA breach
An SLA is a contract between a service provider and a client that defines specifications and requirements, as well as the availability of services, contract term, security, and a contingency plan. The PCC also has some configuration, security, and SLA specificity limits, making it less than ideal for services that use confidential material and thus are subject to compliance rules [35].
  • CC#17 Poor bandwidth
Compared to wired networks, limited bandwidth, congestion, and poor bandwidth efficiency are critical issues in mobile networks [69,70].
  • CC#18 Lack of Standard interface
Web interfaces are the primary interface between mobile devices and the cloud. These interfaces are not designed for mobile devices; thus, they have a hefty price tag. Compatibility across mobile devices could be a problem. A standard protocol and an interface must be devised [36].
  • CC#19 Authentication and Authorization
Software usage is incomplete without authentication, authorization, and access control (AAA), a critical mechanism [71]. The service providers must set up various rights for users, and if either of these rights is broken, the user’s account can be deleted, and all privileges granted to the user. It should be clearly defined in the Service Level Agreement (SLA) [48,71].
Other challenges include:
  • Multi-tenancy
Multi-tenancy in CC occurs when a service provider provides services from many data centers, resulting in data isolation and inconsistency [72,73]. Resource pooling, in which users share resources, is one of the primary properties of CC. When the first user uses a resource and shares it with other users, the first user’s data is overwritten by another user’s data, making it difficult for digital forensics to locate data during resource pooling [72,74]. The problem arises when the results are in two sorts of data: attacker and user. The goal is to find attacker data while respecting user privacy [72,75].
  • Loss of Governance
Users must relinquish control over various security-related issues to the cloud provider using the public cloud. The service agreements given by the service provider may not guarantee that the cloud provider will resolve such difficulties. It exposes a security vulnerability [76].
  • Hidden Cost
According to institutional and transaction cost economics, customers should estimate other expenses beyond the price. Cloud consumers may be unaware of such charges, resulting in frustration, disappointment, and implementation issues [77].
  • Insecure or incomplete data deletion
The user’s data may not be wiped if a contract with a provider is terminated. There are frequent backup copies of data, and there is a potential that this data will be jumbled with other customers’ data. As a result, multi-tenancy poses a greater risk to consumers than embedded systems [34].
  • Power consumption
Unlike disc and memory, energy is a resource that cannot be replenished by activities performed on mobile devices once it has been depleted and can only be filled by external operations [10]. Smart phones have insufficient battery life in response to energy-intensive applications such as video games, audio and video streaming, and running sensors, etc. In MCC, smartphone energy consumption is a problem [78,79].

4.2. Comparison of the Related Surveys

We compare the results of the existing surveys related to public cloud computing. We found 13 survey papers in our total sample of 98. Table 3 shows the comparison of the 19 critical challenges with the survey papers. In the table “✓” shows that the challenges are discussed in the survey. “-” shows that the challenge is not discussed in the survey. Additionally, (C1 to C19) shows the critical challenges identified by us through SLR. It was found that the limited challenges are discussed in each survey in terms of PCC. Further there are no up-to-date systematic literature reviews carried out on the challenges associated with clients in PCC, as evident from the literature.

4.3. Analysis of the Challenges

We performed three different analyses on the critical challenges. The objective of the analysis was to specify each challenge from a different perspective. We performed a linear-by-linear chi-square test (LBL-CST) on each analysis because the data type ordinal can be found in the SPSS data collection. The literature shows that this test is favored and more potent than the Pearson chi-square test when examining the differences between ordinal variables [89]. The following theory was put to the test:
Hypothesis 0 (H0):
There is no significant difference in exposing communication and coordination issues between the various study approaches used for a specific task.
Hypothesis 1 (H1):
There is a significant difference in revealing the communication and coordination issues between the various studies approaches used for a particular topic.
If the value of ‘p’ is more significant than 0.05, we will study H0 for obstacles clients face in PCC adoption; otherwise, H1 will be considered.

4.3.1. Year-Wise Analysis of the Challenges

For year-wise analysis, we divided the selected papers’ publication years into two periods, i.e., period one from (2010 to 2015) and period two from (2016 to 2021). The same approach is evident in the papers [2,90]. The aim was to find out the intensity of each challenge in each period in order to help us determine the scope of the challenge and whether the identified challenges vary from time to time. Out of the selected papers, 38 were published from 2010 to 2015 and 60 from 2016 to 2021, as shown in Table 4. The results show that many articles were published in the second period. It indicates that PCC still faces many problems that need to be taken seriously. The findings also show that much work has been carried out and is ongoing in this area. We included the three most significant challenges in each period and the three least significant ones to help us find the difference between the first and second periods and help us determine what challenges were crucial in the first and second periods.
The highest occurrence is “Lack of security,” in period one, having 63%. The second-highest occurrence is “Perceived Industry Pressure,” having 47%. The third highest occurrence is “Data and service availability,” having 42%. The lowest occurrence is “Lack of Communication and Coordination,” having 8%. The second most minor occurrence is “poor bandwidth,” with 21%.
In period two, the highest occurrence is “Lack of security” with 67%. The second-highest occurrence is “Lack of privacy,” which has 50%. The third highest occurrence is “Data loss or leakages,” having 43%. The lowest occurrence is “Lack of standard interface,” having 17%. The second most minor occurrence is “SLA breach,” with 20%.
We also performed LBL-CST to find out if there was any significant difference between the challenges. We determined one significant difference for the challenge “Lack of Communication and Coordination,” having an LBL-CST value of 0.001, which is less than the predefined value of 0.05. This is because this challenge has only 8% in period one. In the second period, the challenges’ occurrence significantly increased to 40%. This may indicate that this challenge has grown in recent years. The rest of the challenges show no significant difference.
Figure 2 shows the graphical representation of the papers selected for the two periods for a better understanding. The x-axis shows the two periods, and the y-axis shows the frequency of each period. The statistical graph shows that extensive work is ongoing in the area. The bar graph shows a consistent increase in the second period.
Table 5 shows the occurrence of each challenge each year. The table shows the frequency of each challenge each year. Y represents YES, showing that the papers presented the challenges, while N stands for No; it demonstrates that the paper fails to present the challenge. The year 2021 shows six frequencies because the data was obtained first. Among the twelve years, the highest range of papers was selected in 2020, which shows that PCC computing is still being rigorously researched. The lowest range of 2 papers is selected from 2015, as shown in Figure 3. This may indicate that relatively few papers were published in 2015.
The x-axis shows the publication year of the selected sample, i.e., 2010–2021, while the y-axis shows the paper published each year.

4.3.2. Analysis Based on the Authors’ Continent

We performed a statistical analysis of the challenges based on the author’s continent. As we have a lot of papers from Asia in the list of total papers having a frequency of 51, we analyzed them in two categories, ASIA and other continent. We merged all the other continents into one category, having a frequency of 47, which we called other continents, as shown in Table 6. Similar categorization is evident from published papers [2,90]. We did this to generate a better LBL-CST on the challenges. We may deduce from the analysis that a significant amount of research has been carried out in Asia. It may be because PCC is less expensive than the other deployment models. In Asia, most countries are in the developing stage, and the users cannot afford the cost of other models. The other reason may be that Asia is the most populated continent globally, as more people live in Asia. That is why there are more papers published in the area of Asia relevant to PCC.
The highest occurrence in ASIA is “Lack of security,” with 69%. The second-highest occurrence is “Data loss or leakages,” at 47%. The third highest occurrence is “Lack of privacy,” with 41%. The lowest occurrence is “Lack of standard interface,” and “SLA breach”, with 22%.
In Figure 4, the x-axis shows each continent of the authors, while the y-axis shows the number of publications from each continent.
The highest occurrence is “Lack of security” in other continents’ categories, at 62%. The second-highest occurrence is “Lack of privacy,” having 49%. The third highest occurrence is “Data and service availability,” at 47%. The lowest occurrence is “Authentication and Authorization,” which has the same 15%.
Both categories consider “lack of security” the most critical challenge. Therefore, it can be deduced that, first and foremost, this challenge needs to be mitigated. The lowest critical challenges considered by both are different across continents.
We also performed LBL-CST to find any significant difference between the challenges across the two categories, i.e., ASIA and other continents. There are changes in both the categories across each challenge. We found that none of the challenges have less than a 0.05 value of LBL-CST. This may mean that the challenges are considered equally across the continents. It may also indicate that all the challenges have significance on each continent.
To give a better understanding of the statistical analysis based on the continent. Figure 4 shows the graphical representation of the papers selected across the different continents. We present a graphical representation of all the authors’ continents. We have selected 49 papers from Asia, 21 from Europe, 12 from America, seven from Australia, and seven from South Africa. Appendix A Table A2 presents the author’s continent in each paper for internal validity. It also indicates that Europe is the second highest paper retrieval continent, from which 21 papers have been selected.

4.3.3. Analysis Based on Publication Venue

We performed an analysis on the paper publication venue. We divided it into two categories: journals, and conferences. We merged the papers of conferences, symposiums, and workshops into one general category called “conference.” We merged them to produce a better analysis, as evident from Other researchers’ work [90]. This analysis helped us find the venue with the most relevant published papers. This analysis also helped us to find a relevant journal for future publication. Out of the 98 selected papers, 64 are published in journals and 34 in conferences. This may indicate that PCC researchers are keener to publish their work in journals.
From Table 7, in the journal category, the highest occurrence is “Lack of security,” with a 69% occurrence. The second-highest occurrence is “Lack of privacy,” at 50%. The third highest occurrence is “Data and service availability,” with 45%.
The lowest occurrence is that of “SLA breach,” “Poor bandwidth,” and “Authentication and Authorization,” having 22%. The highest occurrence in the conference category is “Lack of security,” which has 59%. The second-highest occurrence is “Lack of service quality,” with 47%. The third highest occurrence is “Perceived Industry Pressure “and “Data loss or leakage,” having 36% each.
The lowest occurrence is “Lack of Standard interface,” having 15%. The second least cited are “Poor bandwidth” and “Authentication and Authorization,” having 24%. We also performed LBL-CST to find significant differences across both venues. We found that one challenge, “Lack of quality of service,” has a CST value of “0.027,” which is less than the predefined value of 0.05. The analysis shows that “Lack of security” has been considered the most critical challenge in the publication venue. The least critical challenges considered in both venues are different. It indicates a clear difference between the venues regarding most minor critical challenges. Each selected paper’s internal validity publication venue has been presented in Appendix A Table A2. If someone has any doubt about the data for this analysis, they can verify it.
We also present the graphical representation of the graph in Figure 5. It can be seen all the challenges are cited more in journals compared to conferences. This may be because there are more journals in PCC than in conferences. We may also deduce that more compact papers are published in the area of PCC.

5. Limitations and Threats to Validity

We used a systematic literature review as a research methodology, with appropriate strings and a sufficient sample. However, we can suppose that we may have missed some essential data. The two authors suggested keywords to verify the study’s validity and include as much relevant material as feasible.
For example, we searched just the most relevant and well-known libraries in computer disciplines, limiting the number of libraries searched and increasing the danger of data exploitation. To reduce the risk, we have listed the publications in Appendix A Table A1 from which the data was extracted for interested viewers. To reduce the risk, the collaborating scholars reviewed and evaluated each phase of the SLR. The alteration was made because similar research has employed the same technique. Another danger was that we only selected articles in English, which raised the likelihood of papers in the same domain.
The search results also ended in 2021. To reduce the danger, we will publish more outcomes in the future. Additionally, only papers in English were chosen.

6. Conclusions and Future Work

We conducted an SLR for the challenges faced by PCC clients. We first executed a general search string in five well-known digital libraries to identify the gap. We then developed our research string for this study. Following SLR guidelines, we sifted through the final 98 papers to identify the challenges that clients face when adopting PCC. We identified a total of 29 challenges. Out of the 29 challenges, we considered 19 challenges to be critical challenges. We consider a challenge critical if its occurrence in SLR is greater than 20%. We also performed further analysis on the challenges. We aimed to analyze the challenges from a different perspective. We performed three different analyses, i.e., the publication year of the selected papers, publication venue, and continents. The result will assess clients to identify the challenges faced by them. It will also assess PCC vendors in developing systems based on clients’ challenges.
In the future, we intend to find out the best practices for each challenge. Furthermore, we will conduct an empirical study to validate the findings of SLR. We will then develop a public cloud client’s adoption model (PCCAM) that will assess organization capabilities for clients. We will also conduct a case study to validate the model from PCC companies.

Author Contributions

M.J.K. conducted the SLR and retrieved data from the papers. F.U. supervised the entire process. M.I. is the co-supervisor who extracted the data for analysis. J.K. performed the analysis. A.K., A.S.A. and S.S.A. provided funding for the paper. They also review the paper several times for any improvements. They are also response to the reviewer’s comments. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by Taif University Researchers supporting Project number (TURSP-2020/311), Taif University, Taif, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

We provided the sources from which the data has been collected in the Appendix A. All the paper titles are available for validation.

Acknowledgments

We are thankful to Taif University Researchers supporting Project number (TURSP-2020/311), Taif University, Saudi Arabia, for supporting this work.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Titles of the selected papers.
Table A1. Titles of the selected papers.
Paper IDTracking IDTitle
1IEEE-01Mobile Public Cloud Computing, Merits and Open Issues
2IEEE-02Cloud Security Issues Based on People, Process and Technology Model: A Survey
3IEEE-03Security and Trust Preserving VM Migrations in Public Clouds
4IEEE-04An enhanced data security and trust management enabled framework for
cloud computing systems
5IEEE-05Survey paper on cloud computing security
6IEEE-06Security Challenges for the Public Cloud
7IEEE-07An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
8IEEE-08Mobile Cloud Computing: Issues and Challenges
9IEEE-09A survey on cloud security issues and Blockchain
10IEEE-10Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance
11IEEE-11Security Concerns and risk at different levels in Cloud Computing
12IEEE-12SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions
13IEEE-13The architectural framework for public cloud security
14IEEE-14Survey on Access Control Issues in Cloud Computing
15IEEE-15KeySea: Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
16IEEE-16A Survey of Challenging Issues and Approaches in Mobile Cloud Computing
17IEEE-17Cloud Computing Landscape and Research Challenges regarding Trust and Reputation
18IEEE-18Virtual Machine Scaling Method Considering Performance Fluctuation of Public Cloud
19IEEE-19Can Public-Cloud Security Meet Its Unique Challenges?
20IEEE-20TrustCloud: A Framework for Accountability and Trust in Cloud Computing
21IEEE-21Authorized Private Keyword Search over Encrypted Data in Cloud Computing
22IEEE-22Key Factors Impacting Cloud Computing Adoption
23IEEE-23Towards Cloud Computing SLA Risk Management: Issues and Challenges
24IEEE-24Cloud Computing Digital Forensic challenges
25IEEE-25A Review On Cloud Computing
26IEEE-26Cloud Computing Adoption in Higher Education Institutions: A Systematic Review
27IEEE-27Analysis of Performance Variability in Public Cloud Computing
28IEEE-28Enhancing data storage security in cloud using certificate less public auditing
29IEEE-29Risk Management on the Security Problem in Cloud Computing
30IEEE-30Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing
31IEEE-31Security Challenges in Vehicular Cloud Computing
32IEEE-32Key-Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments
33SP-01Security Frameworks in Mobile Cloud Computing
34SP-02Cloud Computing: Vulnerability and Threat Indications
35SP-03Develop Ten Security Analytics Metrics for Big Data on the Cloud
36SP-04Trust as a facilitator in cloud computing: a survey
37SP-05Security concerns and countermeasures in cloud computing: a qualitative analysis
38SP-06A quantitative analysis of current security concerns and solutions for cloud computing
39SP-07Trust mechanisms for cloud computing
40SP-08Trust model at service layer of cloud computing for educational institutes
41SP-09Smart Innovation, Systems and Technologies
42SP-10Cloud Computing Adoption Decision in E-government
43SP-11Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective
44SP-12Cloudy transaction costs: a dive into cloud computing economics
45SP-13Quality-of-service in cloud computing: modeling techniques and their applications
46SP-14Factors Influencing the Adoption of Cloud Computing by Small and Medium Size Enterprises (SMEs)
47SP-15A survey of compliance issues in cloud computing
48SD-01A Comprehensive Survey on Security in Cloud Computing
49SD-02A Study on Data Storage Security Issues in Cloud Computing
50SD-03Enabling Privacy and Security in Cloud of Things: architecture, applications, security & privacy challenges
51SD-04Security in cloud computing: Opportunities and challenges
52SD-05Key Issues for Embracing the Cloud Computing to Adopt a Digital Transformation: A study of Saudi Public Sector
53SD-06Advantages and challenges of adopting cloud computing from an enterprise perspective
54SD-07Risk perception and risk management in cloud computing: Results from a case study of Swiss companies
55SD-08Towards an integrated sociotechnical approach for designing adaptive privacy aware services in cloud computing
56SD-09Conceptualizing a model for adoption of cloud computing in education
57SD-10Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability
58SD-11Challenges of Deploying Cloud Computing in eHealth
59SD-12Information Technology Solutions, Challenges, and Suggestions for Tackling the COVID-19 Pandemic
60SD-13Impact of Coronavirus Pandemic Crisis on Technologies and Cloud Computing Applications
61SD-14Security and privacy of electronic health records: Concerns and challenges
62ACM-01Challenges and Solutions in Cloud Forensics
63ACM-02Security, Privacy Issues and challenges In Cloud Computing: A Survey
64ACM-03Cloud Computing Adoption: A Short Review of Issues and Challenges
65ACM-04Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey
66ACM-05Management Issues with Cloud Computing
67ACM-06A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade
68ACM-07CloudCmp: Comparing Public Cloud Providers
69ACM-08Cloud Computing: Survey on Energy Efficiency
70ACM-09State-of-the-art Cloud Computing Security Taxonomies A classification of security challenges in the present cloud computing environment
71ACM-10Scalable Query Processing and Query Engines over Cloud Databases: Models, Paradigms, Techniques, Future Challenges
72CS-01Security Issues: Public vs Private vs Hybrid Cloud Computing
73CS-02An Assessment Of Cloud Computing: Evolution
74GS-01Data Security and Privacy in Cloud Computing
75GS-02Cloud Computing Security Issues and Challenges
76GS-03Public vs. Private vs. Hybrid vs. Community—Cloud Computing: A Critical Review
77GS-04A Data Security Implementation Model For Cloud Computing In Government Parastatals
78GS-05A Study on E-Learning and Cloud Computing
79GS-06A Survey on Cloud Computing Security, Challenges and Threats
80GS-07Cloud Applications for Data Management and Deployment: Analysis for Financial Institutions
81GS-08Cloud computing security: protecting cloud-based smart city applications
82GS-09Understanding Determinants Of Cloud Computing Adoption Using An Integrated Diffusion Of Innovation (Doi)- Technological, Organizational And Environmental (Toe) Model
83GS-10Cloud Computing Performance Evaluation: Issues And Challenges
84GS-11Government Cloud Computing and National Security
85GS-12Challenges of Cloud Computing Adoption From the TOE Framework Perspective
86GS-13Cloud Computing: Research Issues and Implications
87GS-14Cloud Computing: Security Issues and Research Challenges
88GS-15Major Challenges Facing Cloud Migration
89GS-16Perceived impacts of Cloud Computing adoption on the role of an IT department of a higher institution in a developing country.
90GS-17Cloud Computing: Study Of Security Issues And Research Challenges
91GS-18Cloud Computing Avoids Downfall Of Application Service Providers
92GS-19Internal audits in the digital era: opportunities risks and challenges
93GS-20Privacy Preservation In Cloud Using Glowworm Swarm-Based Whale Optimization Algorithm (Gwoa) With 128 Key Size In Cleveland Database
94GS-21A Survey on QoS Requirements Based on Particle Swarm Optimization Scheduling Techniques for Workflow Scheduling in Cloud Computing
95GS-22Public Health Innovation through Cloud Adoption: A Comparative Analysis of Drivers and Barriers in Japan, South Korea, and Singapore
96GS-23Cloud Computing’s Impact on Enterprises In Term of Security and Cost
97GS-24A natural human language framework for digital forensic readiness in the public cloud
98GS-25Data control in public cloud computing: Issues and challenges
Table A2. Data gather from the selected papers for analysis.
Table A2. Data gather from the selected papers for analysis.
Paper IDYearPublication VenueCountry
12016ConferenceSouth Africa
22019JournalIran
32012ConferenceSweden
42014ConferenceIndia
52017ConferenceIndia
62012JournalUSA
72020JournalChina
82018ConferenceIndia
92019ConferenceIndia
102014JournalKuwait
112013ConferenceIndia
122011ConferenceAustralia
132014ConferenceIndia
142016JournalIndia
152020JournalIndia
162016ConferenceChina
172010SymposiumGermany
182017ConferenceJapan
192010ConferenceUSA
202011ConferenceSINGAPORE
212011ConferenceChina
222013JournalIreland
232012ConferenceSwitzerland
242018ConferenceIndia
252019ConferenceIndia
262019JournalMalaysia
272017ConferenceAustralia
282017ConferenceIndia
292011ConferenceJapan
302012ConferenceIndia
312013JournalChina
322020JournalChina
332020JournalUSA
342020JournalIndia
352019JournalUSA
362012JournalGermany
372019JournalIndia
382012JournalBrazil
392013JournalUSA
402015JournalPakistan
412019JournalUK
422018JournalGreece
432016JournalUK
442020JournalGermany
452014JournalUK
462014JournalCanada
472016JournalUSA
482017Work ShopAustralia
492016ConferenceIndia
502019JournalFrance
512015JournalUSA
522018ConferenceUK
532014ConferenceRomania
542013JournalSwitzerland
552020JournalGreece
562016JournalUSA
572016JournalMexico
582021ConferenceEgypt
592020JournalUSA
602020JournalMalaysia
612020JournalSaudi Arabia
622018ConferencePakistan
632016ConferenceIndia
642017ConferenceMalaysia
652019ConferenceIndia
662013JournalSouth Africa
672018JournalAustralia
682010JournalAustralia
692014JournalAustralia
702012ConferenceIndia
712021ConferenceFrance
722012JournalIndia
732014JournalIndia
742017JournalChina
752011JournalNigeria
762014JournalIndia
772016JournalNairobi
782018JournalIndia
792011JournalIndia
802020JournalJordan
812016JournalGreece
822020JournalTurkey
832013JournalIran
842020JournalEgypt
852018JournalJordan
862012JournalIndia
872011JournalIndia
882020JournalBrazil
892019JournalSweden
902018JournalIndia
912011JournalUSA
922020JournalCyprus
932020JournalIndia
942020JournalMalaysia
952021JournalSingapore
962021JournalTurkey
972021JournalIndia
982021ConferenceIndia

References

  1. Khan, S.U.; Ullah, N. Practices for Clients in the Adoption of Hybrid Cloud: Practices for Clients in the Adoption of Hybrid Cloud. Proc. Pak. Acad. Sci. A Phys. Comput. Sci. 2017, 54, 13–32. [Google Scholar]
  2. Khan, S.U.; Ullah, N. Challenges in the adoption of hybrid cloud: An exploratory study using systematic literature review. J. Eng. 2016, 2016, 107–118. [Google Scholar] [CrossRef]
  3. Vafamehr, A.; Khodayar, M.E. Energy-aware cloud computing. Electr. J. 2018, 31, 40–49. [Google Scholar] [CrossRef]
  4. Shabir, M.Y.; Iqbal, A.; Mahmood, Z.; Ghafoor, A. Analysis of classical encryption techniques in cloud computing. Tsinghua Sci. Technol. 2016, 21, 102–113. [Google Scholar] [CrossRef]
  5. Pańkowska, M.; Pyszny, K.; Strzelecki, A. Users’ adoption of sustainable cloud computing solutions. Sustainability 2020, 12, 9930. [Google Scholar] [CrossRef]
  6. Yoo, S.-K.; Kim, B.-Y. A decision-making model for adopting a cloud computing system. Sustainability 2018, 10, 2952. [Google Scholar] [CrossRef]
  7. Bandyopadhyay, S.; Sengupta, M.; Maiti, S.; Dutta, S. Role of middleware for internet of things: A study. Int. J. Comput. Sci. Eng. Surv. 2011, 2, 94–105. [Google Scholar] [CrossRef]
  8. Priyadarshinee, P.; Raut, R.D.; Jha, M.K.; Gardas, B.B. Understanding and predicting the determinants of cloud computing adoption: A two staged hybrid SEM-Neural networks approach. Comput. Hum. Behav. 2017, 76, 341–362. [Google Scholar] [CrossRef]
  9. Gupta, A.; Bhadauria, H.; Singh, A.; Patni, J.C. A theoretical comparison of job scheduling algorithms in cloud computing environment. In Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 4–5 September 2015. [Google Scholar]
  10. Shaukat, U.; Ahmed, E.; Anwar, Z.; Xia, F. Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. J. Netw. Comput. Appl. 2016, 62, 18–40. [Google Scholar] [CrossRef]
  11. Bal, P.K.; Mohapatra, S.K.; Das, T.K.; Srinivasan, K.; Hu, Y.-C. A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques. Sensors 2022, 22, 1242. [Google Scholar] [CrossRef] [PubMed]
  12. Mlotshwa, L.; Leonard, A.; Ntawanga, F. A conceptual framework for cloud-computing management: An end-user environment perspective. In Proceedings of the 2015 IST-Africa Conference, Lilongwe, Malawi, 6–8 May 2015. [Google Scholar]
  13. Chang, B.-Y.; Hai, P.H.; Seo, D.-W.; Lee, J.-H.; Yoon, S.H. The determinant of adoption in cloud computing in Vietnam. In Proceedings of the 2013 International Conference on Computing, Management and Telecommunications (ComManTel), Ho Chi Minh City, Vietnam, 21–24 January 2013. [Google Scholar]
  14. Gai, K.; Qiu, M.; Zhao, H. Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. 2018, 111, 126–135. [Google Scholar] [CrossRef]
  15. Duan, H.; Chen, C.; Min, G.; Wu, Y. Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems. Future Gener. Comput. Syst. 2017, 74, 142–150. [Google Scholar] [CrossRef]
  16. Goundar, S. Cloud Computing: Opportunities and Issues for Developing Countries. DiploFoundation: Internet Governance Research Paper. 2010. Available online: https://www.researchgate.net/profile/Sam-Goundar/publication/265060137_Cloud_computing_Opportunities_and_issues_for_developing_countries/links/55c30f9508aebc967defeb3b/Cloud-computing-Opportunities-and-issues-for-developing-countries.pdf (accessed on 16 April 2022).
  17. Alhamazani, K.; Ranjan, R.; Mitra, K.; Rabhi, F.; Jayaraman, P.P.; Khan, S.U.; Guabtni, A.; Bhatnagar, V. An overview of the commercial cloud monitoring tools: Research dimensions, design issues, and state-of-the-art. Computing 2015, 97, 357–377. [Google Scholar] [CrossRef]
  18. Pahl, C.; Xiong, H.; Walshe, R. A comparison of on-premise to cloud migration approaches. In Proceedings of the Second European Conference, ESOCC 2013, Málaga, Spain, 11–13 September 2013; pp. 212–226. [Google Scholar]
  19. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
  20. Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011. [Google Scholar]
  21. Lewis, G. Basics about Cloud Computing; Software Engineering Institute Carniege Mellon University: Pittsburgh, PA, USA, 2010. [Google Scholar]
  22. Mell, P.; Grance, T. Effectively and securely using the cloud computing paradigm. NIST Inf. Technol. Lab. 2009, 2, 304–311. [Google Scholar]
  23. Nelson, M.R. Building an open cloud. Science 2009, 324, 1656–1657. [Google Scholar] [CrossRef] [PubMed]
  24. Baliga, J.; Ayre, R.; Sorin, W.V.; Hinton, K.; Tucker, R.S. Energy consumption in access networks. In Proceedings of the OFC/NFOEC 2008—2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference, San Diego, CA, USA, 24–28 February 2008. [Google Scholar]
  25. Mather, T.; Kumaraswamy, S.; Latif, S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2009. [Google Scholar]
  26. Hamrén, O. Mobile Phones and Cloud Computing: A Quantitative Research Paper on Mobile Phone Application Offloading by Cloud Computing Utilization. Master’s Thesis, Umeå University, Umeå, Sweden, 2012. [Google Scholar]
  27. Jansen, W.; Grance, T. Sp 800–144. Guidelines on Security and Privacy in Public Cloud Computing; National Institute of Standards & Technology: Gaithersburg, MD, USA, 2011. [Google Scholar]
  28. Meng, S.; Luo, L.; Qiu, X.; Dai, Y. Service-Oriented Reliability Modeling and Autonomous Optimization of Reliability for Public Cloud Computing Systems. IEEE Trans. Reliab. 2022, 71, 527–538. [Google Scholar] [CrossRef]
  29. Ren, K.; Wang, C.; Wang, Q. Security challenges for the public cloud. IEEE Internet Comput. 2012, 16, 69–73. [Google Scholar] [CrossRef]
  30. Chakrawarti, R.K.; Singhai, K. The architechtural framework for public cloud security. In Proceedings of the 2014 International Conference of Soft Computing Techniques for Engineering and Technology (ICSCTET), Bhimtal, India, 7–8 August 2014; pp. 1–5. [Google Scholar]
  31. Kaufman, L.M. Can public-cloud security meet its unique challenges? IEEE Secur. Priv. 2010, 8, 55–57. [Google Scholar] [CrossRef]
  32. He, W.; Zhang, Z.J.; Li, W. Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic. Int. J. Inf. Manag. 2021, 57, 102287. [Google Scholar] [CrossRef]
  33. O’Neill, P.H.; Ryan-Mosley, T.; Johnson, B. A flood of coronavirus apps are tracking us. Now it’s time to keep track of them. MIT Technology Review, 7 May 2020. [Google Scholar] [CrossRef]
  34. Chaudhari, P.; Das, M.L. KeySea: Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption. IEEE Trans. Serv. Comput. 2020, 15, 1036–1044. [Google Scholar] [CrossRef]
  35. Kaura, W.C.N.; Lal, A. Survey paper on cloud computing security. In Proceedings of the 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 17–18 March 2017; pp. 1–6. [Google Scholar]
  36. Hlatshwayo, C.M.; Zuva, T. Mobile public cloud computing, merits and open issues. In Proceedings of the 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), Durban, South Africa, 28–29 November 2016; pp. 128–132. [Google Scholar]
  37. Aslam, M.; Gehrmann, C.; Björkman, M. Security and trust preserving VM migrations in public clouds. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 869–876. [Google Scholar]
  38. Baror, S.O.; Venter, H.S.; Adeyemi, R. A natural human language framework for digital forensic readiness in the public cloud. Aust. J. Forensic Sci. 2021, 53, 566–591. [Google Scholar] [CrossRef]
  39. Kaneko, Y.; Ito, T.; Ito, M.; Kawazoe, H. Virtual Machine Scaling Method Considering Performance Fluctuation of Public Cloud. In Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honololu, HI, USA, 25–30 June 2017; pp. 782–785. [Google Scholar]
  40. Morawiec, P.; Sołtysik-Piorunkiewicz, A. Cloud Computing, Big Data, and Blockchain Technology Adoption in ERP Implementation Methodology. Sustainability 2022, 14, 3714. [Google Scholar] [CrossRef]
  41. Weidt, F.; Silva, R. Systematic Literature Review in Computer Science—A Practical Guide; Relatórios Técnicos Do DCC/UFJF; 2016. Available online: https://www.semanticscholar.org/paper/Systematic-Literature-Review-in-Computer-Science-A-Weidt-Silva/0a582fd8d9ceeb16466e0e6da756dfff39febf2f (accessed on 16 April 2022).
  42. Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; EBSE Technical Report EBSE-2007-01; University of Durham: Durham, UK, 2007. [Google Scholar]
  43. Quezada-Gaibor, D.; Torres-Sospedra, J.; Nurmi, J.; Koucheryavy, Y.; Huerta, J. Cloud Platforms for Context-Adaptive Positioning and Localisation in GNSS-Denied Scenarios—A Systematic Review. Sensors 2021, 22, 110. [Google Scholar] [CrossRef] [PubMed]
  44. Myeong, S.; Park, J.; Lee, M. Research Models and Methodologies on the Smart City: A Systematic Literature Review. Sustainability 2022, 14, 1687. [Google Scholar] [CrossRef]
  45. He, Q.; He, H. A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining. Sustainability 2020, 13, 101. [Google Scholar] [CrossRef]
  46. Roy, P.; Kumar, R. Onion Encrypted Multilevel Security Framework for Public Cloud. In Proceedings of the 2022 2nd International Conference on Power Electronics IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 21–22 January 2022; pp. 1–5. [Google Scholar]
  47. Kandias, M.; Virvilis, N.; Gritzalis, D. The insider threat in cloud computing. In Proceedings of the 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, 8–9 September 2011; pp. 93–103. [Google Scholar]
  48. Singh, V.; Pandey, S. Cloud computing: Vulnerability and threat indications. In Performance Management of Integrated Systems and Its Applications in Software Engineering; Springer: Berlin/Heidelberg, Germany, 2020; pp. 11–20. [Google Scholar]
  49. Sharma, A.; Jha, P.; Singh, S. Data control in public cloud computing: Issues and challenges. Recent Adv. Comput. Sci. Commun. (Former. Recent Pat. Comput. Sci.) 2021, 14, 564–579. [Google Scholar] [CrossRef]
  50. Puri, G.S.; Tiwary, R.; Shukla, S. A review on cloud computing. In Proceedings of the 2019 9th International Conference on Cloud Computing, Data Science Engineering (Confluence), Noida, India, 10–11 January 2019; pp. 63–68. [Google Scholar]
  51. Chang, Y.-W.; Hsu, P.-Y.; Huang, S.-H.; Chen, J. Determinants of switching intention to cloud computing in large enterprises. Data Technol. Appl. 2019, 54, 16–33. [Google Scholar] [CrossRef]
  52. Islam, M.; Reza, S. The Rise of Big Data and Cloud Computing. Internet Things Cloud Comput. 2019, 7, 45. [Google Scholar] [CrossRef]
  53. Khajeh-Hosseini, A.; Greenwood, D.; Sommerville, I. Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. In Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, 5–10 July 2010; pp. 450–457. [Google Scholar]
  54. Akande, A.O.; April, N.A.; van Belle, J.-P. Management issues with cloud computing. In Proceedings of the ICCC’13: 2013 The Second International Conference on Innovative Computing and Cloud Computing, Wuhan, China, 1–2 December 2013; pp. 119–124. [Google Scholar]
  55. Nishad, L.S.; Paliwal, J.; Pandey, R.; Beniwal, S.; Kumar, S. Security, privacy issues and challenges in cloud computing: A survey. In Proceedings of the ICTCS’16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, 4–5 March 2016; pp. 1–7. [Google Scholar]
  56. Habib, S.M.; Ries, S.; Muhlhauser, M. Cloud computing landscape and research challenges regarding trust and reputation. In Proceedings of the 2010 7th International Conference on Ubiquitous Intelligence Computing and 7th International Conference on Autonomic Trusted Computing, Xi’an, China, 26–29 October 2010; pp. 410–415. [Google Scholar]
  57. Everett, C. Cloud computing—A question of trust. Comput. Fraud. Secur. 2009, 6, 5–7. [Google Scholar] [CrossRef]
  58. Verma, A.; Kaushal, S. Cloud computing security issues and challenges: A survey. In Proceedings of the First International Conference, ACC 2011, Kochi, India, 22–24 July 2011; pp. 445–454. [Google Scholar]
  59. Pearson, S.; Benameur, A. Privacy, security and trust issues arising from cloud computing. In Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 30 November–3 December 2010; pp. 693–702. [Google Scholar]
  60. Ardagna, D.; Casale, G.; Ciavotta, M.; Pérez, J.F.; Wang, W. Quality-of-service in cloud computing: Modeling techniques and their applications. J. Internet Serv. Appl. 2014, 5, 11. [Google Scholar] [CrossRef]
  61. Nikkhah, H.R.; Sabherwal, R. Information disclosure willingness and mobile cloud computing collaboration apps: The impact of security and assurance mechanisms. Inf. Technol. People, 2021; Online Ahead of Print. [Google Scholar] [CrossRef]
  62. Attaran, M.; Attaran, S.; Celik, B.G. Promises and challenges of cloud computing in higher education: A practical guide for implementation. J. High. Educ. Theory Pract. 2017, 17, 20–38. [Google Scholar]
  63. Qasem, Y.A.M.; Abdullah, R.; Jusoh, Y.Y.; Atan, R.; Asadi, S. Cloud Computing Adoption in Higher Education Institutions: A Systematic Review. IEEE Access 2019, 7, 63722–63744. [Google Scholar] [CrossRef]
  64. Alharthi, A.; Yahya, F.; Walters, R.J.; Wills, G. An overview of cloud services adoption challenges in higher education institutions. In Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics—ESaaSA, Lisbon, Portugal, 20–22 May 2015. [Google Scholar]
  65. González-Martínez, J.A.; Bote-Lorenzo, M.L.; Gómez-Sánchez, E.; Cano-Parra, R. Cloud computing and education: A state-of-the-art survey. Comput. Educ. 2015, 80, 132–151. [Google Scholar] [CrossRef]
  66. Sultan, N. Cloud computing for education: A new dawn? Int. J. Inf. Manag. 2010, 30, 109–116. [Google Scholar] [CrossRef]
  67. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A.; Stoica, I. Above the Clouds: A Berkeley View of Cloud Computing; Technical Report UCB/EECS-2009–28; EECS Department, University of California: Berkeley, CA, USA, 2009. [Google Scholar]
  68. Catteddu, D.; Hogben, G. An SME Perspective on Cloud Computing—Survey; Technical Report; European Network and Information Security Agency: Athens, Greece, 2009. [Google Scholar]
  69. Suganya, V.; Shanthi, A.L. Mobile Cloud Computing Perspectives and Challenges. Int. J. Innov. Res. Adv. Eng. 2014, 2, 71–76. [Google Scholar]
  70. Sahu, I.; Pandey, U. Mobile cloud computing: Issues and challenges. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; pp. 247–250. [Google Scholar]
  71. Ranjith, D.; Srinivasan, J. Identity security using authentication and authorization in cloud Computing. Int. J. Comput. Organ. Trends 2013, 3, 122–129. [Google Scholar]
  72. Neware, R.; Khan, A. Cloud computing digital forensic challenges. In Proceedings of the Informing Science IT Education Conference (InSITE), Tampa, FL, USA, 29 June–25 July 2015; pp. 1090–1092. [Google Scholar]
  73. Dykstra, J. Seizing electronic evidence from cloud computing environments. In Cloud Technology: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2015; pp. 2033–2062. [Google Scholar]
  74. Almulla, S.; Iraqi, Y.; Jones, A. A state-of-the-art review of cloud forensics. J. Digit. Forensics Secur. Law 2014, 9, 2. [Google Scholar] [CrossRef]
  75. Alex, M.E.; Kishore, R. Forensic model for cloud computing: An overview. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 1291–1295. [Google Scholar]
  76. Habib, S.M.; Hauke, S.; Ries, S.; Mühlhäuser, M. Trust as a facilitator in cloud computing: A survey. J. Cloud Comput. Adv. Syst. Appl. 2012, 1, 19. [Google Scholar] [CrossRef]
  77. Makhlouf, R. Cloudy transaction costs: A dive into cloud computing economics. J. Cloud Comput. 2020, 9, 1–11. [Google Scholar] [CrossRef]
  78. Fan, Q.; Liu, L. A survey of challenging issues and approaches in mobile cloud computing. In Proceedings of the 2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Guangzhou, China, 16–18 December 2016; pp. 87–90. [Google Scholar]
  79. Satyanarayanan, M. Avoiding dead batteries. IEEE Pervasive Comput. 2005, 4, 2–3. [Google Scholar] [CrossRef]
  80. Ghaffari, F.; Gharaee, H.; Arabsorkhi, A. Cloud security issues based on people, process and technology model: A survey. In Proceedings of the 2019 5th International Conference on Web Research (ICWR), Tehran, Iran, 24–25 April 2019; pp. 196–202. [Google Scholar]
  81. Pavithra, S.; Ramya, S.; Prathibha, S. A survey on cloud security issues and blockchain. In Proceedings of the 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), Chennai, India, 21–22 February 2019; pp. 136–140. [Google Scholar]
  82. Charanya, R.; Aramudhan, M. Survey on access control issues in cloud computing. In Proceedings of the 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), Pudukkottai, India, 24–26 February 2016; pp. 1–4. [Google Scholar]
  83. Yimam, D.; Fernandez, E.B. A survey of compliance issues in cloud computing. J. Internet Serv. Appl. 2016, 7, 1–12. [Google Scholar] [CrossRef]
  84. Ramachandra, G.; Iftikhar, M.; Khan, F.A. A Comprehensive Survey on Security in Cloud Computing. Procedia Comput. Sci. 2017, 110, 465–472. [Google Scholar] [CrossRef]
  85. Kumar, P.; Kumar, R. Issues and challenges of load balancing techniques in cloud computing: A survey. ACM Comput. Surv. (CSUR) 2019, 51, 1–35. [Google Scholar] [CrossRef]
  86. Mastelic, T.; Oleksiak, A.; Claussen, H.; Brandic, I.; Pierson, J.-M.; Vasilakos, A.V. Cloud computing: Survey on energy efficiency. Acm Comput. Surv. 2014, 47, 1–36. [Google Scholar] [CrossRef]
  87. Choubey, R.; Dubey, R.; Bhattacharjee, J. A survey on cloud computing security, challenges and threats. Int. J. Comput. Sci. Eng. (IJCSE) 2011, 3, 1227–1231. [Google Scholar]
  88. Farid, M.; Latip, R.; Hussin, M.; Hamid, N.A.W.A. A Survey on QoS Requirements Based on Particle Swarm Optimization Scheduling Techniques for Workflow Scheduling in Cloud Computing. Symmetry 2020, 12, 551. [Google Scholar] [CrossRef]
  89. Wooditch, A.; Johnson, N.J.; Solymosi, R.; Ariza, J.M.; Langton, S. Measures of Association for Nominal and Ordinal Variables. In A Beginner’s Guide to Statistics for Criminology and Criminal Justice Using R; Springer: Berlin/Heidelberg, Germany, 2021; pp. 209–225. [Google Scholar]
  90. Ahmad, A.; Khan, S.U.; Khan, H.U.; Khan, G.M.; Ilyas, M. Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client’s Side Approach. IEEE Access 2021, 9, 81828–81840. [Google Scholar] [CrossRef]
Figure 1. SLR Process.
Figure 1. SLR Process.
Sustainability 14 09809 g001
Figure 2. Graphical representation of challenges across both periods.
Figure 2. Graphical representation of challenges across both periods.
Sustainability 14 09809 g002
Figure 3. Graphical presentation of year-wise analysis.
Figure 3. Graphical presentation of year-wise analysis.
Sustainability 14 09809 g003
Figure 4. Graphical presentation of author’s continent.
Figure 4. Graphical presentation of author’s continent.
Sustainability 14 09809 g004
Figure 5. Graphical representation of the challenges across publication venue.
Figure 5. Graphical representation of the challenges across publication venue.
Sustainability 14 09809 g005
Table 1. Outcomes of the search string as per database.
Table 1. Outcomes of the search string as per database.
Search StringLibraryInitial ResultsInitial SelectionFinal Selection
((“Public cloud”) AND (“Challenges OR risks OR barriers OR problems”))IEEE Xplore30447532
Springer Link11644215
Science Direct15763914
ACM2843510
Cite Seer28132
Google Scholar27,49611725
Total33,59232198
Table 2. Challenges identified through SLR.
Table 2. Challenges identified through SLR.
s.noChallengePaper IDFreq%
C1Lack of security1,2,3,4,5,6,7,8,9,10,11,14,15,17,19,22,23,24,25,26,28,29,30,31,32,33,34,35,36,38,40,41,42,43,46,47,50,51,52,56,57,58,
60,61,63,64,66,67,73,74,75,76,81,82,83,85,86,87,90,92,93,
95,96,98
6465
C2Lack of privacy1,2,3,8,9,11,15,17,21,23,26,33,35,36,39,41,42,43,46,47,29,
50,51,52,55,59,60,61,64,66,67,73,74,76,80,82,85,86,87,88,
89,90,95,96,98
4445
C3Data loss or leakages2,8,9,11,13,20,21,25,28,29,31,34,37,38,41,42,43,47,48,49,50,
51,52,54,56,62,63,64,65,66,73,77,79,81,83,84,87,89,90,95,96
4142
C4Data and service availability2,4,5,6,8,11,18,25,27,31,34,36,38,40,42,43,45,47,48,50,52,
54,57,63,64,65,66,67,68,73,74,77,81,83,84,86,87,88,89,90
4041
C5Perceived Industry Pressure2,5,12,14,15,17,20,23,25,27,29,30,35,36,38,41,44,45,47,49,
51,54,57,60,63,64,65,66,70,71,72,75,77,79,81,83,87,89,93,
97
4041
C6Geographical Dispersion2,3,5,6,8,12,17,25,27,31,34,37,38,40,42,43,45,47,48,50,53,
54,57,63,64,65, 67,69,72,74,77,81,83,84,86,89,90,95
3839
C7Compliance and legal aspects2,5,11,17,22,23,25,29,34,38,39,40,41,43,47,49,50,51,52,63,
64,66,70,72,77,79,80,81,85,86,87,88,89,90,95
3536
C8lack of user control2,11,13,16,19,22,25,27,28,34,35,37,38,42,43,47,49,50,51,52,
55,5658,62,63,70,72,77,78,79,81,82,85,87,92
3536
C9Lack of accepted standards2,8,12,13,17,20,21,25,30,34,37,38,41,43,44,48,50,53,59,61,
62,63,66,70,71,72,75,77,81,85,86,87,88,95
3435
C10Lack of Customer Trust1,2,3,5,8,12,17,20,21,25,26,31,36,39,40,42,46,47,52,59,61,
63,68,69,70,74,77,81,82,84,87,88,93
3334
C11Lack of Quality of service1,5,7,8,12,13,16,17,23,24,25,28,35,37,39,45,53,54,57,60,64,65,69,70,71,72,75,77,79,84,87,943233
C12Lack of awareness/ Lack of Customer Support/ lack of understanding2,8,12,14,17,20,21,22,25,26,30,36,40,41,42,46,47,56,58,60,
63,64,65,71,74,76,77,81,82,87,94
3132
C13Training and Education2,8,16,17,25,26,28,34,37,38,42,47,52,53,60,62,63,66,67,68,
69,73,77,80,83,86.87,88,90,95
3031
C14Lack of Communication Coordination1,2,5,9,12,13,15,18,24,27,32,35,43,44,48,52,55,56,59,62,65,81,85,86,90,93,952728
C15Lack of Reliability2,8,17,22,24,25,26,28,32,36,41,42,45,53,57,58,62,65,66,67,
77,79,85,86,87,94
2627
C16SLA breach2,5,12,17,23,27,29,36,38,41,49,51,57,63,64,65,66,70,75,77,
79,81,83,87,89
2526
C17Poor bandwidth8,16,17,25,26,34,52,53,60,62,63,66,67,68,69,777,80,83,86.87,88,902323
C18Lack of Standard interface1,2,10,20,31,35,38,46,54,58,62,70,74,77,79,81,85,86,87,88,
91
2121
C19Authentication and Authorization2,5,8,10,13,20,23,24,25,31,34,37,43,50,63,66,77,79,80,81,87,
91
2121
C20Multi tenancy2,5,24,25,37,38,47,63,70,72,77,81,84,87,88,961515
C21Vendor lock-in5,26,36,38,52,64,65,75,77,81,84,85,87,88.961515
C22Loss Of Governance2,5,8,11,34,36,42,47,52,54,58,77,81,85,871313
C23Interoperability2,5,8,10,17,35,37,53,65,77,921111
C24Hidden cost2,3,6,8,26,27,43,44,46,54,57,72,821010
C25Malicious insider 2,5,6,10,35,65,81,93,9899
C26Insecure or incomplete data deletion5,10,24,48,77,8166
C27Lack of Cultural Differences8,34,55,67,9355
C28Lack of Focus on key Business Processes42,63,75,9144
C29Power consumption1,2,8,16,29,6733
Table 3. Comparison of the past surveys related with our SLR findings.
Table 3. Comparison of the past surveys related with our SLR findings.
S.noC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18C19
[80]---------------
[35]---------------
[81]-------------------
[82]----------------
[78]----------------
[76]---------------
[83]--------------
[84]----------------
[55]-------------
[85]-----------------
[86]-----------------
[87]--------------
[88]----------------
Table 4. Analysis of the challenges based on year.
Table 4. Analysis of the challenges based on year.
S.NOChallengeOccurrence in Slr (N = 98)Chi-Square Test
(Linear-by-Linear Association)
a = 0.05, df = 1
From 2010–2015 (N = 38)From 2016–2021 (N = 60)X2p
Freq%Freq%
1Lack of security246340670.1250.724
2Lack of privacy143730501.6120.204
3Data loss or leakages143726430.4020.526
4Data and service availability164225420.0020.966
5Perceived Industry Pressure184723380.7730.379
6Geographical Dispersion143724400.0970.756
7Compliance and legal aspects153920330.3780.539
8lack of user control102625422.3640.124
9Lack of accepted standards153920330.3780.539
10Lack of Customer Trust143719320.2760.599
11Lack of Quality of service143718300.4900.484
12Lack of awareness/Lack of Customer Support/lack of understanding113020330.2050.651
13Training and Education102620330.5340.465
14Lack of Communication Coordination38244011.8920.001
15Lack of Reliability92417280.2550.613
16SLA breach133412202.4470.118
17Poor bandwidth82114230.0690.793
18Lack of Standard interface113010172.0630.151
19Authentication and Authorization92413220.0540.817
Table 5. Challenges occurrence in each year from 2010 to 2021.
Table 5. Challenges occurrence in each year from 2010 to 2021.
Challenge2010
(N = 3)
2011
(N = 8)
2012
(N = 9)
2013
(N = 7)
2014
(N = 9)
2015
(N = 2)
2016
(N = 11)
2017
(N = 7)
2018
(N = 9)
2019
(N = 10)
2020
(N = 17)
2021
(N = 6)
YNYNYNYNYNYNYNYNYNYNYNYN
Lack of security2135725254208343727310742
Lack of privacy123536343611472563649833
Data loss or leakages0353185227117434458221522
Data and service availability1226455236116561545531406
Perceived Industry Pressure1262633418117434096441333
Geographical Dispersion1226543427116552456421515
Compliance and legal aspects1235544309206525365531415
lack of user control1226362518118325545541315
Lack of accepted standards1262541627024716365551224
Lack of Customer Trust2144362527115625363761106
Lack of Quality of service1244362545024734274641315
Lack of awareness/Lack of Customer Support/lack of understanding1244281627116525275531424
Training and Education2117282536024716634641315
Lack of Communication Coordination0317190718024743544661115
Lack of Reliability1226282527022916635521515
SLA breach1253462509115634094601706
Poor bandwidth2117192527023807542841306
Lack of Standard interface0344372527023816272811615
Authentication and Authorization0344192527024516274621506
Table 6. Analysis based on the author’s continent.
Table 6. Analysis based on the author’s continent.
S.NOChallengeOccurrence in Slr (N = 98)Chi-Square Test
(Linear-by-Linear Association)
a = 0.05, df = 1
ASIA (N = 51)Other Continent (N = 47)X2p
Freq%Freq%
1Lack of security356929620.5120.474
2Lack of privacy214123490.5890.443
3Data loss or leakages234717360.7990.371
4Data and service availability193722470.9080.341
5Perceived Industry Pressure203921450.2970.586
6Geographical Dispersion173321451.3130.252
7Compliance and legal aspects193716340.1090.742
8lack of user control173318380.2600.610
9Lack of accepted standards193716340.1090.742
10Lack of Customer Trust152918380.8560.355
11Lack of Quality of service173315320.0220.882
12Lack of awareness/ Lack of Customer Support/ lack of understanding173314300.1410.708
13Training and Education183512261.0860.297
14Lack of Communication Coordination152912260.1830.669
15Lack of Reliability142712260.0460.831
16SLA breach112214300.8610.354
17internet quality issues13259190.5590.455
18Lack of Standard interface112210210.0010.972
19Authentication and Authorization15297152.9310.087
Table 7. Analysis based on publication venue.
Table 7. Analysis based on publication venue.
S.NOChallengeOccurrence in SLR (N = 98)Chi-Square Test
(Linear-by-Linear Association)
a = 0.05, df = 1
Journal
(N = 64)
Conference
(N = 34)
X2p
Freq%Freq%
1Lack of security446920590.9560.328
2Lack of privacy325012351.9210.166
3Data loss or leakages253915440.2320.630
4Data and service availability294512350.9060.341
5Perceived Industry Pressure264115440.1100.740
6Geographical Dispersion264112350.2630.608
7Compliance and legal aspects243811320.2540.615
8lack of user control223413380.1430.706
9Lack of accepted standards213314410.6700.413
10Lack of Customer Trust213312350.0610.806
11Lack of Quality of service162516474.8630.027
12Lack of awareness/ Lack of Customer Support/lack of understanding193012350.3190.572
13Training and Education21339260.4160.519
14Lack of Communication and Coordination152312351.5480.213
15Lack of Reliability17279260.0010.992
16SLA breach142211321.2700.260
17Poor bandwidth14228240.0350.853
18Lack of Standard interface16255151.3830.240
19Authentication and Authorization14228240.0350.853
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khan, M.J.; Ullah, F.; Imran, M.; Khan, J.; Khan, A.; AlGhamdi, A.S.; Alshamrani, S.S. Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing. Sustainability 2022, 14, 9809. https://doi.org/10.3390/su14169809

AMA Style

Khan MJ, Ullah F, Imran M, Khan J, Khan A, AlGhamdi AS, Alshamrani SS. Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing. Sustainability. 2022; 14(16):9809. https://doi.org/10.3390/su14169809

Chicago/Turabian Style

Khan, Muhammad Janas, Fasee Ullah, Muhammad Imran, Jahangir Khan, Arshad Khan, Ahmed S. AlGhamdi, and Sultan S. Alshamrani. 2022. "Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing" Sustainability 14, no. 16: 9809. https://doi.org/10.3390/su14169809

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop