Cloud Computing – Way Towards Transformation

  • Ved Pal Singh Banarsidas Chandiwala Institute of professional studies, Dwarka, New Delhi- 110075
Keywords: Cloud Computing, Software, Security, Education, Digital, Class room


Under “digital India” programme many digital campaigns are initiated by the government transforming lives and empowering the society in many diversified ways. Digital India is the result of many technological developments and innovations aiming at, remodelling the economy and creating a knowledgeable and digitally empowered society. In view of this, the education sector has seen dramatic changes, the education sector have been increasingly driven and dominated by internet and technology, challenging the Guru- Shishya system of class room based teaching. The traditional education system is inadequate to meet the challenges of the modern day requirements, where things are dynamic and evolving. Thus, there is a need to transform the education system which can acclimatize to the changes of the modern world. Turbulences in the education sector has been brought by the  emergence of cloud computing technology, which took the universal education system by  storm, reshaping and recreating the processes related to, teaching, administration and learning. This paper deliberate on the concept of “cloud computing”, a promising application which is giving new dimensions to our education system. The work also discuses about its architecture the major role this technology playing in revamping the education sector and its pros and cons. Cloud computing has gained popularity due to its potential to facilitate information access, storage and transfer.


Alonso–Calvo, R., J. Crespo, M. Garc'ia–Remesal, A. Anguita, and V. Maojo (2010) “On Distributing Load in Cloud Computing: A Real Application for Very-large Image Datasets”, Procedia Computer Science (1)1, pp. 2669– 2677, doi: 10.1016/j.procs.2010.04.300.
American_Society_for_Quality (2006) “Idea Creation Tools―Affinity Diagrams,” (current June 20, 2011).
Anthes, G. (2010) “Security in the Cloud,” Communications of the ACM (53)11, p. 16.
Armando, F. (2011) “Cloud Computing―What’s in It for Me as a Scientist?” Science (331)6016, p. 406.
Armbrust, M., A. Fox, R., Griffith, A.D., Joseph, R.,Katz, A.,Konwinski, et al. (2010) “A View of Cloud Computing,” Communications of the ACM (53)4, pp. 50–58.
Aslam, U., I. Ullah, and S. Ansari (2010) “Open Source Private Cloud Computing,” Interdisciplinary Journal of Contemporary Research In Business (2)7, p. 399.
Avetisyan, A.I., R. Campbell, I. Gupta, M.T. Heath, S.Y. Ko, G.R. Ganger, et al. (2010) “Open Cirrus: A Global Cloud Computing Testbed,” Computer (43)4, pp. 35–43.
Banerjee, P., R. Friedrich, C. Bash, P. Goldsack, B.A. Huberman, J. Manley, et al. (2011) “Everything as a Service: Powering the New Information Economy,” Computer (44)3, pp. 36–43.
Barki, H., S. Rivard, and J. Talbot (1993) “A Keyword Classification Scheme for IS Research Literature: An Update,” MIS Quarterly, June, pp. 209–225.
Barnhill, D.S. (2010) “Cloud Computing and Stored Communications: Another Look at Quon v. Arch Wireless,” (Privacy Law) (Annual Review of Law and Technology), Berkeley Technology Law Journal (25), pp. 621–648.
Bellovin, S.M. (2011) “Clouds from Both Sides, IEEE Security & Privacy (9)3, pp. 88–88.
Beloglazov, A., J. Abawajy, and R. Buyya (2011) “Energy-aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future Generation Computer Systems (28)5, pp. 755768, doi: 10.1016/j.future.2011.04.017.
Berl, A., E. Gelenbe, M. di Girolamo, G. Giuliani, H. de Meer, M. Dang, et al. (2010) “Energy-Efficient Cloud Computing,” The Computer Journal (53)7, p. 1045.
Blumenthal, M.S. (2010) “Hide and Seek in the Cloud,” IEEE Security & Privacy (8)2, pp. 57–58.
Böhm, A., and C.–C. Kanne (2011) “Demaq/Transscale: Automated Distribution and Scalability for Declarative Applications”, Information Systems (36)3, pp. 565–578, doi: 10.1016/
Borenstein, N., and J. Blake (2011) “Cloud Computing Standards: Where’s the Beef?” IEEE Internet Computing (15)3, p. 74.
Breiter, G., and M. Behrendt (2009) “Life Cycle and Characteristics of Services in the World of Cloud Computing,” IBM Journal of Research and Development (53)4, pp. 3:1–3:8.
Bret, M. (2009) “In Clouds Shall We Trust?” IEEE Security & Privacy (7)5, pp. 3–3. Bristow, R., T. Dodds, R. Northam, and L. Plugge (2010) “Cloud Computing and the Power to Choose,” EDUCAUSE Review (45)3, p. 14.
Brown, M. (2009) “The NetGens 2.0: Clouds on the Horizon,” EDUCAUSE Review (44)1, p. 66. Brynjolfsson, E., P. Hofmann, and J. Jordan (2010) “Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model,” Communications of the ACM (53)5, p. 32.
Bulla, Husnhal (2016), “Adoption of cloud computing in education system: A survey”, International Journal Of Engineering Science And Computing 6(6), p. 6374-6380
Bungo, J. (2011) “Embedded Systems Programming in the Cloud: A Novel Approach for Academia,” IEEE Potentials (30)1, pp. 17–23.
Buyya, R., C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic (2009) “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems (25)6, pp. 599–616.
Byun, E.–K., Y.–S. Kee, J.–S. Kim, and S. Maeng, S. (2011) “Cost Optimized Provisioning of Elastic Resources for Application Workflows”, Future Generation Computer Systems (27)8, pp. 1011-1026, doi: 10.1016/j.future.2011.05.001.
Calero, J.M.A., N. Edwards, J. Kirschnick, L. Wilcock, and M. Wray (2010) “Toward a Multi-Tenancy Authorization System for Cloud Services,” IEEE Security & Privacy (8)6, pp. 48–55.
Calvo, R.A., S. T., O’Rourke, J. Jones, K. Yacef, and P. Reimann (2011) “Collaborative Writing Support Tools on the Cloud,” Learning Technologies, IEEE Transactions (4)1, pp. 88–97.
Campbell–Kelly, M. (2009) “The Rise, Fall, and Resurrection of Software as a Service,” Communications of the ACM (52)5, p. 28.
Cervone, H.F. (2010) “An Overview of Virtual and Cloud Computing,” OCLC Systems and Services (26)3, p. 162.
Chakraborty, R., S. Ramireddy, T. Raghu, and H. Rao (2010) “The Information Assurance Practices of Cloud Computing Vendors,” IT Professional (12)4, p. 29.
Cooper, B. (2010) “The Prickly Side of Building Clouds,” IEEE Internet Computing (14)6, pp. 64–67.
Crai–Wood, K. (2010) “Definition of Cloud Computing, Incorporating NIST and G-Cloud Views,” http://www (current Apr. 23, 2010).
Currie, C. (2008) “Painting the Clouds,” EDUCAUSE Review (43)6, p. 28.
Cusumano, M. (2010) “Technology Strategy and Management: Cloud Computing and SaaS as New Computing Platforms,” Communications of the ACM (53)4, pp. 27–29.
Deelman, E. (2010) “Grids and Clouds: Making Workflow Applications Work in Heterogeneous Distributed Environments,” The International Journal of High Performance Computing Applications (24)3, p. 284.
Deng, Y., and B. Pung (2011) “Conserving Disk Energy in Virtual Machine Based Environments by Amplifying Bursts,” Computing. Archives for Informatics and Numerical Computation (91)1, p. 3.
Deniz Helvacioglu Kuyucu, A. (2011) “The Playground of Cloud Computing in Turkey,” Procedia Computer Science (3), pp. 459–463, doi: 10.1016/j.procs.2010.12.077.
Diffin, J., F. Chirombo, and D. Nangle (2010) “Cloud collaboration: Using Microsoft Sharepoint as a Tool to Enhance Access Services,” Author abstract (Report), Journal of Library Administration (50), pp. 570(511).
Dougherty, B., J. White, and D.C. Schmidt (2011) “Model-driven Auto-scaling of Green Cloud Computing Infrastructure,” Future Generation Computer Systems (28)2, pp. 371-378, doi: 10.1016/j.future.2011.05.009.
Douglis, F. (2009) “Staring at Clouds,” IEEE Internet Computing (13)3, p. 4.
Ercan, T. (2010) “Effective Use of Cloud Computing in Educational Institutions” [doi: 10.1016/j.sbspro.2010.03.130], Procedia―Social and Behavioral Sciences (2)2, pp. 938–942.
Erdogmus, H. (2009) “Cloud Computing: Does Nirvana Hide Behind the Nebula?” IEEE Software (26)2, pp. 4–6.
Garg, S.K., C.S. Yeo, A. Anandasivam, and R. Buyya (2011) “Environment-conscious Scheduling of HPC Applications on Distributed Cloud-oriented Data Centers,” Journal of Parallel and Distributed Computing (71)6, pp. 732–749, doi: 10.1016/j.jpdc.2010.04.004.
Geer, D. (2009) “The OS Faces a Brave New World,” Computer (42)10, pp. 15–17. Gentry, C. (2010) “Computing Arbitrary Functions of Encrypted Data,” Communications of the ACM (53)3, p. 97.
Glaser, B., and A. Strauss (1967) “The Discovery of Grounded Theory: Strategies for Qualitative Research,” Chicago, IL: Aldine Publishing Company. Gold, S. (2009) “Artificial Reality,” Infosecurity (6)3, pp. 38–41, doi: 10.1016/S1754-4548(09)70062-2.
Golden, B. (2009) “Cloud Computing: ‘Be Prepared,’” EDUCAUSE Review (44)4, p. 64.
Goscinski, A., and M. Brock (2010) “Toward Dynamic and Attribute Based Publication, Discovery and Selection for Cloud Computing,” Future Generation Computer Systems (26)7, pp. 947–970, doi: 10.1016/j.future.2010.03.009.
Guzzo, R.A., S.E. Jackson, and R.A. Katzell (1987) “Meta-analysis Analysis,” Research in Organizational Behavior (9), pp. 407–442.
Han, Y. (2010) “On the Clouds: A New Way of Computing,” Information Technology and Libraries (29)2, p. 87.
Hayes, B. (2008) “Cloud Computing,” Communications of the ACM (9)3, p. 51. Hewitt, C. (2008) “ORGs for Scalable, Robust, Privacy-friendly Client Cloud Computing,” IEEE Internet Computing (12)5, p. 96.
Hofmann, P., and D. Woods (2010) “Cloud Computing: The Limits of Public Clouds for Business Applications,” IEEE Internet Computing (14)6, p. 90.
Huff, S.L., M.C. Munro, and B.H.Martin,(1988) “Growth Stages of End User Computing,” Communications of the ACM (31)5, pp. 542–550.
Hwang, K., and D. Li (2010) “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing (14)5, p. 14. Hwang, M.I., and R.G. Thorn (1999) “The Effect of User Engagement on System Success: A Meta-analytical Integration of Research Findings,” Information & Management (35), pp. 229–236.
Iosup, A., S. Ostermann, M.N. Yigitbasi, R. Prodan, T. Fahringer, and D.H.J. Epema (2011) “Performance Analysis of Cloud Computing Services for Many-tasks Scientific Computing,” Parallel and Distributed Systems, IEEE Transactions (22)6, pp. 931–945.
Iqbal, W., M.N. Dailey, D. Carrera, and P. Janecek (2011) “Adaptive Resource Provisioning for Read Intensive Multitier Applications in the Cloud,” Future Generation Computer Systems (27)6, pp. 871–879, doi: 10.1016/j.future.2010.10.016.
Ivanova, M., and G. Ivanov (2010) “Cloud Computing for Authoring Process Automation,” Procedia―Social and Behavioral Sciences (2)2, pp. 3646–3651, doi: 10.1016/j.sbspro.2010.03.567.
Jaeger, T., and J. Schiffman (2010) “Outlook: Cloudy with a Chance of Security Challenges and Improvements,” IEEE Security & Privacy (8)1, pp. 77–80.
Jann, J., N. Dubey, R.S. Burugula, and P. Pattnaik (2010) “AHAFS Subsystem for Enhancing Operating System Health in the Cloud Computing Era,” IBM Journal of Research and Development (54)5, pp. 6:1–6:11.
Jiang, G. (2010) “Rain or Shine: Fair and Other Non-infringing Uses in the Context of Cloud Computing,” Journal of Legislation (36), pp. 395–422.
Jordan, J. (2011) “Climbing Out of the Box and into the Cloud: Building Web-scale for Libraries,” Author abstract (Report), Journal of Library Administration (51), pp. 3(15).
Katz, R. (2009) “Tech Titans Building Boom,” IEEE Spectrum (46)2, p. 40.
Katzan Jr., H. (2010a) “The Education Value of Cloud Computing,” Contemporary Issues in Education Research, (3)7, p. 37.
Katzan Jr., H. (2010b) “On an Ontological View of Cloud Computing,” Journal of Service Science (3), p. 1.
King, J. (2010) “Clearing the Air on Cloud Computing,” EDUCAUSE Review (45)3, p. 64.
Kirschnick, J., J.M. Alcaraz Calero, L. Wilcock, and N. Edwards (2010) “Toward an Architecture for the Automated Provisioning of Cloud Services,” Communications Magazine, IEEE (48)12, pp. 124–131.
Kleinrock, L. (2005) “A Vision of the Internet,” ST Journal of Research (2)1, pp. 4–5.
Kong, X., C. Lin, Y. Jiang, W. Yan, and X. Chu (2011) “Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction," Journal of Network and Computer Applications (34)4, pp. 1068–1077, doi: 10.1016/j.jnca.2010.06.001.
Kousiouris, G., T. Cucinotta, and T. Varvarigou (2011) “The Effects of Scheduling, Workload Type and Consolidation Scenarios on Virtual Machine Performance and Their Prediction Through Optimized Artificial Neural Networks,” Journal of Systems and Software (84)8, pp. 1270-1291, doi: 10.1016/j.jss.2011.04.013.
Lackermair, G. (2011) “Hybrid Cloud Architectures for the Online Commerce,” Procedia Computer Science (3), pp. 550–555, doi: 10.1016/j.procs.2010.12.091.
Lagar-Cavilla, H., J. Whitney, R. Bryant, P. Patchin, M. Brudno, E. de Lara, et al. (2011) “SnowFlock: Virtual Machine Cloning as a First-class Cloud Primitive,” ACM Transactions on Computer Systems (29)1, p. 1.
Lawton, G. (2008a) “Developing Software Online With Platform-as-a-Service Technology,” Computer (41)6, pp. 13– 15.
Lawton, G. (2008b) “Moving the OS to the Web,” Computer (41)3, pp. 16–19. Leavitt, N. (2009) “Is Cloud Computing Really Ready for Prime Time?” Computer (42)1, pp. 15–20.
Leiba, B. (2009) “Having One’s Head in the Cloud,” IEEE Internet Computing (13)5, p. 4.
Levy, Y., and T.J. Ellis (2006) “A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research,” Informing Science Journal (9), pp. 181–211.
Malawski, M., J. Meizner, M. Bubak, and P. Gepner (2011) “Component Approach to Computational Applications on Clouds,” Procedia Computer Science (4), pp. 432–441, doi: 10.1016/j.procs.2011.04.045.
Marston, S., Z. Li, S., Bandyopadhyay J. Zhang, and A. Ghalsasi (2011) “Cloud Computing―The Business Perspective,” Decision Support Systems (51)1, p. 176.
Mattmann, C., D. Crichton, A. Hart, S. Kelly, and S. Hughes (2010) “Experiments with Storage and Preservation of NASA's Planetary Data via the Cloud,” IT Professional (12)5, p. 28.
Nevin, R. (2009) “Supporting 21st Century Learning Through Google Apps,” Teacher Librarian (37)2, p. 35.
Ngai, E.W.T., and F.K.T. Wat (2002) “A Literature Review and Classification of Electronic Commerce Research,” Information & Management (39)5, pp. 415–429, doi: 10.1016/S0378-7206(01)00107-0.
Nicolae, B., G. Antoniu, L. Bougé, D. Moise, and A. Carpen–Amarie (2011) “BlobSeer: Next-generation Data Management for Large Scale Infrastructures,” Journal of Parallel and Distributed Computing (71)2, pp. 169– 184, doi: 10.1016/j.jpdc.2010.08.004.
Owens, D. (2010) “Securing Elasticity in the Cloud,” Communications of the ACM (53)6, p. 46.
Owunwanne, D., and R. Goel (2010) “Radio Frequency Identification (RFID) Technology: Gaining A Competitive Value Through Cloud Computing,” International Journal of Management and Information Systems (14)5, p. 157.
Pallis, G. (2010) “Cloud Computing: The New Frontier of Internet Computing,” IEEE Internet Computing (14)5, p. 70.
Palmer, B., K. Bubendorfer, and I. Welch (2010) “A Protocol for Verification of an Auction Without Revealing Bid Values,” Procedia Computer Science (1)1, pp. 2649–2658, doi: 10.1016/j.procs.2010.04.298.
Pamies–Juarez, L., P. García–López, M. Sánchez–Artigas, and B. Herrera (2011) “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures,” Computer Networks (55)5, p. 1100.
Pandey, S., W. Voorsluys, S. Niu, A. Khandoker, and R. Buyya (2011) “An Autonomic Cloud Environment for Hosting ECG Data Analysis Services,” Future Generation Computer Systems(28)1, pp. 147-154, doi: 10.1016/j.future.2011.04.022.
Sultan (2010), “Cloud Computing For Education: A New Dawn?”, International journal of information management, 30(2), p.109-116
Ramakrishnan, L., J.S. Chase, D. Gannon, D. Nurmi, and R. Wolski (2011) “Deadline-sensitive Workflow Orchestration Without Explicit Resource Control,” Journal of Parallel and Distributed Computing (71)3, pp. 343–353, doi: 10.1016/j.jpdc.2010.11.010.
Robert, F. (2009) “Library in the Clouds,” OCLC Systems and Services (25)3, p. 156.
Robey, F., and M.L. Markus (1998) “Beyond Rigor and Relevance: Producing Consumable Research About Information Systems,” Information Resources Management Journal (11)1, pp. 7–15.
Rochwerger, B., D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, et al. (2011) “Reservoir―When One Cloud Is Not Enough,” Computer (44)3, pp. 44–51.
Rodero–Merino, L., L.M. Vaquero, V. Gil, F. Galán, J. Fontán, R.S. Montero, et al. (2010) “From Infrastructure Delivery to Service Management in Clouds,” Future Generation Computer Systems (26)8, pp. 1226–1240, doi: 10.1016/j.future.2010.02.013
Sabherwal, R., A. Jeyaraj, and C. Chowa (2006) “Information System Success: Individual and Organizational Determinants,” Management Science (52)12, p. 1849.
Schaffer, H. (2009) “X as a Service, Cloud Computing, and the Need for Good Judgment,” IT Professional (11)5, p. 4.
Scornavacca, E., S.J. Barnes, and S.L. Huff (2006) “Mobile Business Research Published in 2000–2004: Emergence, Current Status, and Future Opportunities,” Communications of the Association for Information Systems (17) Article 28, pp. 635–646.
Voas, Zhang (2009) “Cloud Computing State Of The Art And Research Challenges, J internet seve appl,”(2010), 7-18
Wheeler, B., and S. Waggener (2009) “Above Campus Services: Shaping the Promise of Cloud Computing for Higher Education,” EDUCAUSE Review (44)6, p. 52.
Winans, T., and J. Brown (2009) “Moving Information Technology Platforms to the Clouds: Insights into IT Platform Architecture Transformation,” Journal of Service Science (2)2, p. 23.
Wolfswinkel, J.F., E. Furtmueller, and C.P.M. Wilderom (2011) “Using Grounded Theory as a Method for Rigorously Reviewing Literature,” European Journal of Information Systems advance online publication 29 Nov., doi: 10.1057/ejis.2011.51
Woo, M., and M. Dieckmann (2010) “The Multiple Personalities of Cloud Computing,” EDUCAUSE Review (45)3, p. 12.
Xu, B., C. Zhao, E. Hu, and B. Hu (2011) “Job Scheduling Algorithm Based on Berger Model in Cloud Environment,” Advances in Engineering Software (42)7, pp.419-425 doi: 10.1016/j.advengsoft.2011.03.007.
Zhang, Q., L. Cheng, and R. Boutaba (2010) “Cloud Computing: State-of-the-art and Research Challenges,” Journal of Internet Services and Applications (1)1, pp. 7–18.
Zhang, T., Z. Du, Y. Chen, X. Ji, and X. Wang (2011) Typical Virtual Appliances: An Optimized Mechanism for Virtual Appliances Provisioning and Management,” Journal of Systems and Software (84)3, p. 377.
Zhang, X., A. Kunjithapatham, S. Jeong, and S. Gibbs (2011) “Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing,” Mobile Networks and Applications (16)3, p. 270.