Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3157-3161 3157 www.etasr.com Ramzan et al.: An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries Case Study of Pakistan Muhammad Ramzan Department of Computer Science & IT University of Sargodha, Sargodha, Pakistan School of Science and Engineering University of Management and Technology, Lahore, Pakistan mramzansf@gmail.com Muhammad Shaoib Farooq School of Systems and Technology University of Management and Technology, Lahore, Pakistan shoaib.farooq@umt.edu.pk Ammara Zamir Department of Computer Science University of Wah Punjab, Pakistan ammara.zameer@uow.edu.pk Waseem Akhtar Department of Computer Science & IT The University of Lahore Lahore, Pakistan wassimalix@gmail.com Mahwish Ilyas Department of Computer Science & IT University of Sargodha Sargodha, Pakistan mahwishilyas@gmail.com Hikmat Ullah Khan Department of Computer Science COMSATS Institute of Information Technology, Wah Cantt, Pakistan hikmat.ullah@ciitwah.edu.pk Abstract—In the modern era companies seek the use of modern technologies in order to upgrade their infrastructure and enhance their business growth. The use of business intelligence, data science and cloud computing (CC) has become an integral part of business. Different factors play important role in the adoption of cloud services. An organization willing to adopt cloud services should consider them. This paper explores the factors and addresses the issues in implementing and deploying CC in telecom companies. In addition, this study also shares the benefits of utilizing CC which is a novel technical pattern which can change the use of different associations of information technology as a service. CC concentrates on the idea of definition, security problems, service models and infrastructures of its development. The important point is to analyze how this paradigm should be adopted in telecom industries and its results. This research study presents a comparative analysis of adaptation of CC by various telecom industries. The results identify certain limitations which also play their role for adaptation of CC in telecom companies. Keywords-cloud computing; telecom industry; IaaS; SaaS; benefits of cloud computing I. INTRODUCTION The continuous increase in the data volume captured by social media and multimedia has brought forth an intense flow of data in structured and unstructured format. This data production is referred to as big data. Big data is seeking attention from government, academic institutions and industry. The progress in data storage gave rise to data mining technologies including classification methods [1, 2], social web analysis [3-6], sentiment analysis [7, 8], scientometrics [9, 10] and cloud computing (CC). CC is the big shift in technology and provides an effective platform for big data computation. CC is a paradigm of information technology that allows clients and companies to get the required quantity of computing resources. CC has many advantages that attract individuals and enterprises to store and process their data on cloud platforms. These advantages are virtualization, scalability, parallel processing and security. CC reduces the cost of automation and infrastructure [11]. Small and large companies are moving towards CC due to its efficacy, automatic software update, capital-expenditure fee, document control, security and competitiveness. CC provides large data storage and computing services through huge data centers. CC is among the top 5 influential technologies on a global basis [12]. Sixty percent of small and large business purchases are based on cloud services, and 30% of businesses purchased more than five cloud services [13]. CC provides service-based low cost IT solutions. Companies can globalize their operations. CC services provide scalability and elasticity which increase business flexibility [14]. CC has different limitations along with its advantages, especially related to security issues [15] such as data leakage, and unauthorized access. Companies are interested in shifting their business on cloud. Security risks, privacy threats, national, and internal regulations are preventing organizations from adopting CC and implement it to avail new opportunities. Organizations need to take into account all factors which are acting as a barrier for CC adoption. This paper focuses on studying CC in telecom industry. Two things are addressed in this paper: The study of the level of knowledge, which identifies the issues of CC and its performance and to show the results, which come from CC utilization in different companies. With help from this study IT professionals and researchers can Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3157-3161 3158 www.etasr.com Ramzan et al.: An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries identify the barriers in adopting CC in telecom industry. The study has been carried out in Pakistan telecom industry. II. RELATED WORK In this section CC benefits, challenges, risks and limitations in their adoption in the IT field are discussed. National institute of standards and technology (NIST), defined CC as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.Cloud computing is developed through hardware, virtualization, distributed computing and service delivery over the internet. Using CC, business can utilize computing services on low-cost [16]. Transferring business towards cloud reduces the cost of IT resources [17]. CC eliminates traditional boundaries in business. CC provides services in three categories: infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). These models are used to match the computing demand, deploy and integrate applications, provide user access to applications using a client (web browser) respectively. Different CC models exist for deployment. The public cloud is provided for all industries. Private cloud is used by a particular organization. Hybrid cloud uses the services of both public and private cloud [18, 19]. Still, the concept of CC is not well known and misunderstood [20] while CC is not well established for deployment [21, 22]. Nowadays emphasis is given on the advancement of knowledge related to IT services [23]. There is a need to enhance the knowledge of IT services including CC services [24]. CC services across different industries need to be explored in future. This involves the issues related to technical and organizational issues on adoption of CC services [24]. A business that needs to adopt CC should consider its risks, opportunities, and challenges [17, 25]. Business challenges need to make a strategy to decide how to use different transformed services [26]. IT managers must have comprehensive knowledge of organizational structure, interdependencies, processes and habits to make decisions about the choices of organizational structures [27]. III. RESEARCH METHODOLOGY This section identifies and discusses the issues in the selection of CC and its benefits in telecom sector. In this study, quantitative and qualitative techniques are applied. The main purpose of the quantitative approach is to improve the knowledge about different types of CC applications in the field of telecom and also to improve the quantitative approach in different phases. In 2011 different telecom industry managers were requested, to participate in meetings regarding the improvement of different quantitative phases. 17 people responded in two meetings and two main ideas were presented: research and concepts of CC and their different applications in the telecom field. On these meetings, different applications of CC in the telecom field were identified and are still concerning different telecom companies: How to measure the security of different companies in telecom industry. How to measure the different result in CC environments. How to improve the quantitative phase. In quantitative phase enough data were collected and analyzed regarding different CC applications and different tests were applied. On the basis of the test results, various issues were identified. Fifteen questions about these issues emerged which belong to three categories: The first group of questions relates to the employees of the company, the total sales, and the years the company is active. The second group is about the company’s knowledge about CC in telecom field. The third group is related to all barriers that were faced. Surveys were conducted in all telecom industries by using random sampling in October 2011 to December 2011. In these surveys the decision makers targeted the IT managers. Interviews were also conducted in companies with no IT department. The data set obtained from the responses was composed of 83% IT managers, 9.6% managing directors excluding the IT managers, and 7.4% owners. To get better responses the sample was divided into two different categories: The 1st category includes the available IT managers and the 2nd category includes the unavailable IT managers. The mean of the factor scores of these two categories is compared by using the ANOVA. The result obtained after using the ANOVA showed no main difference. It was concluded that in any survey the respondents’ position did not matter. After getting 94 responses, the main features of both phases, quantitative and qualitative, were identified and are shown in Table I. TABLE I. FEATURES USED IN QUALITATIVE AND QUANTITATIVE PHASE By using SPSS the collected data were statistically processed and two aims were addressed. The first one was the degree of information on CC and the second was the result received from the use of CC. For computing the group differences, statistic methods were used. ANOVA test is one approach which is used for the appropriateness of the test, and for the variance of the group. By using ANOVA, assumptions of parameters were also checked. In the same type of samples the statistical evaluation is obtained by using the ANOVA test, for industrial telecom with and without CC. For different dimensions dependent and independent variables were found. By using the dependent variables the consequences of the CC Staff Interval Year/month Rate N Avg. 0-9 >18 16.5 35 10-50 >60 59 50-249 >19 18 Sum 100% 94.5 Sale Periodic sale (mill. euro) %age Rate N Avg. 0-0.5 More than 12 11 1.8 mll 0.5-1 50% 48 More than 1 39% 37.5 Sum 100% 94.5 Years Interval % Rate N Avg. 0-9 14.9% 14 24 10-20 51.1% 47.5 More than 20 34% 32 Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3157-3161 3159 www.etasr.com Ramzan et al.: An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries on telecom were identified. Aforementioned literature shows the benefits of the utilization of CC, but there is unavailability of quantitative analyzed results. The results obtained by the implementation of the CC, are not to be used as financial and economic variables because there are some issues which affect the results that may or may not be related to CC. In the review of the literature the following points are noted: The effort to reduce the cost of software and hardware. The effort to access the improved IT resources. The concentration on the main business point of view. In different group meetings it was shown that the main barrier of adoption of CC is related to security. This part consists of how cloud computing improved security in different telecom industries. TABLE II. IT COST REDUCTION Features Range of Values F1 Costs of hardware have been reduced in the previous two years F2 Costs of software have been reduced in the previous two years F3 Costs of IT people have been reduced in the previous two years Alpha value : 0.829 TABLE III. LEVEL OF IT RESOURCES USED AND ORGANIZATIONAL ISSUES Characteristics The range of less value T1 Scalability, flexibility, accessibility, enhanced in the previous two years T2 In the previous two years IT resources increased T3 Costs of IT people have minimized in the previous two years T4 Security issues are minimized in the last two years Alpha value : 0.72 TABLE IV. CC UTILIZATION Identify Implemented CC Concept %age for Yes %age for No %age for Yes %age for No %age for Yes 19.5 80.5 11.60 88.40 195 IV. RESULTS The results are divided into two sections. In the first section all elements regarding different barriers faced when implementing CC were identified, while in the second section all effects that occurred while using CC in telecom industry were identified. A. Barriers to CC Implementation in Telecom Industry Companies and academic sector know the benefits of CC. There are two main concerns: The first is to understand CC in the context of usage in the organization and the attitude of telecom industry in adoption of CC and the second one regards the elements that should be contained in different telecom companies when utilizing CC. On the basis of the survey, a small ratio of companies is aware of the concepts of CC. Only 18 different companies (19.15% of the total) are aware of CC. Only 11 companies (11.70%) have implemented CC services. The survey results show that 80.85% of the companies do not know about the CC concept. The CC characteristics are explained, as shown in Table VI. TABLE V. ORGANIZATION LAUNCH OF THE CC CONCEPT The idea of CC Interested or not for in applying it %age for Yes %age for No 55.5 4.5 TABLE VI. ORGANIZATIONS NOT IMPLEMENTING CC Used value Significant and not significant Avg. Value The problem in data surety 6.37 Data loses while transferring to some other party 6.48 CC Advantages 6.14 How to use services with their value 6.08 Lock-in data, not easy for the client to modify a new supplier 7.87 Privacy of data, protection with the position of given data 5.46 A number of companies started to use CC in their organization: 55.26% of the companies utilized CC services. Some factors were identified on the basis of which different companies rejected or did not show their interest to utilize CC. An important barrier to the utilization of CC in the organization is the unavailability of IT managers. B. Effects of CC Use in the Telecom Industry Table VIII shows the association of the different used variables in which the highest level of significance is<0.01. Secondly, as stated in the given methodology portion, the investigation of different models is ANOVA, which was made to detect the presence of important statistics among the uses of CC for every attribute of the scales (for the variables that are dependent and independent on the test). C. Effect of CC Use In Cost Reduction Table IX shows us that companies that use CC have improved behavior in all attributes. The test significance value is less than 0.01, proving the relationship between the usage of CC and IT decreasing costs. D. Effect of Using CC on Organizational problems and IT Resources Table X shows that all companies that use CC acquire significantly better behavior. But the association is statistically better in the main three attributes: ease of access, scalability and augmented flexibility in the utilization of IT. Accessibility of resources related to IT and problems that are related to security are reduced. V. DISCUSSION AND FUTURE WORK CC is a novel technological IT organizational model. The addition of technical progress can modernize the organization. CC analysis shows that the main things on which this topic concentrates are its concepts, its main attributes, different exploitation model, main issues related to security and different services from the technological view. However, there is a lack of CC research for use in companies, identifying different barriers to its use and the identification of the main factors used for the assessment of the effect by implementing CC. This is important for the telecom field which is important in the Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3157-3161 3160 www.etasr.com Ramzan et al.: An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries economic field for any company. Empirical qualitative and quantitative research methodology is used to identify the obstacles faced for its implementation in telecom industries. The effects or benefits of using CC in telecom companies are investigated. In this regard it is shown that most of telecom companies have small knowledge about the usage of CC, but when these telecom companies acquire that knowledge, they have shown their interest on implementing CC. This shows that the ignorance of CC is the main cause of not implementing it. This study is beneficial for those who want to bring the telecom closer to CC because the obstacles companies face while adapting CC are identified. These obstacles are organized hierarchically, according to their importance in telecom industry. The telecom companies identified that the two most important barriers for using CC are security issues and transferring data to a third party. A third barrier is the unawareness of the managers on how to calculate the results produced by CC. Another barrier is the benefit of cost by using CC. Other barriers identified include quality, availability of services, and requirements for data protection. TABLE VII. DIFFERENT PRODUCTION LEVEL FOR MINIMIZING COST Bilateral Pearson association Descriptive figures Characteristics cl-T1 cl-T2 cl-T3 Avg. Std Min Max Scalability & ease of use costs minimized in the previous two years 1 4.404 1.712 1 7 Access to previously unavailable IT improved the previous two years 0.6 0.791 1 4.476 1.521 1 7 Increased resources 0.676 0.735 0.586 3.380 1.72 1 7 Issues related to security minimized in the previous two years 0.535 3.678 1.663 1 7 TABLE VIII. LEVEL USED FOR ORGANIZATIONAL PROBLEMS Bilateral Pearson association Descriptive figures Characteristics Rl-T1 Rl-T2 Rl-T3 Rl-T4 Avg. Std Min Max Scalability & ease of use costs minimized in the previous two years 1 4.450 1.3 1 7 Access to previously unavailable IT improved the previous two years 0.6 0.791 1 4.296 1.672 1 7 Increased resources 0.676 0.735 0.586 1 3.487 1.420 1 7 Issues related to security minimized in the previous two years 0.53 3.678 1.663 1 7 TABLE IX. ANOVA OF MINIMIZATION COST By using CC Avg. r-IT 1 c-IT 2 c-IT 3 Y 5.45 5.93 5.5 N 3.36 2.82 3.23 Value of F 9.15 13.37 13.37 implication 0.007 0.002 0.002 TABLE X. ANOVA OF ORGANIZATIONAL PROBLEMS WHILE USING CC CC utilization Avg. r-IT 1 c-IT 2 c-IT 3 c-IT 4 Y 5.64 5.78 3.46 5.54 N 3.32 2.86 3.42 2.43 Value of F 9.42 11.23 5.46 15.54 implication 0.006 0.001 0.118 0.001 The second objective is investigating the main effects that arise while using CC in different companies. On the basis of sampled companies the result concluded as follows while using CC: 1) Cost reduction for hardware, software and IT resource persons, 2) flexibility and scalability in the uses of IT and 3) access to IT resources that are not available to the companies without CC. The companies that are using CC have their security issues reduced. This is an important thing to notice, companies identified that using of CC increases security issues, but actually the companies that are using CC increase the level of their IT security. REFERENCES [1] M. Farooq, H. U. Khan, T. A. Malik, S. M. S. Shah, “A Novel Approach for Ranking Authors in an Academic Network”, International Journal of Computer Science and Information Security, Vol. 14, No. 7, pp. 617- 623, 2016 [2] M. A. Alghobiri, H. U. Khan, T. A. Malik, S. Iqbal, “A comprehensive framework for the semantic cache systems”, International Journal of Advanced and Applied Sciences, Vol. 3, No. 10, pp. 72-78, 2016 [3] A. Mahmood, H. U. Khan, Zahoor-ur-Rehman, W. Khan, “Query based information retrieval and knowledge extraction using Hadith datasets”, 13th International Conference on Emerging Technologies, Islamabad, Pakistan, December 27-28, 2017 [4] H. U. Khan, A. Daud, T. A. Malik, “MIIB: A Metric to identify top influential bloggers in a community”, PloS one, Vol. 10, No. 9, 2015 [5] H. U. Khan, A. Daud, “Finding the top influential bloggers based on productivity and popularity features”. New Review of Hypermedia and Multimedia, Vol. 23, No. 3, pp. 189-206, 2017 [6] H. U. Khan, “Mixed-sentiment classification of web forum posts using lexical and non-lexical features”, Journal of Web Engineering, Vol. 16, No. 1-2, pp. 161-176, 2017 [7] U. Ishfaq, H. U. Khan, K. Iqbal, “Identifying the influential bloggers: a modular approach based on sentiment analysis”, Journal of Web Engineering, Vol. 16, No. 5-6, pp. 505-523, 2017 [8] M. Alghobiri, U. Ishfaq, H. Khan, T. A. Malik, “Exploring the role of sentiments in identification of active and influential bloggers”, 4th International Conference on Computer Science and Communication Engineering, Durres, Albania, November 6-7, 2015 [9] M. Farooq, H. U. Khan, A. Shahzad, S. Iqbal, A. U. Akram, “Finding the top conferences using novel ranking algorithm”, International Journal of Advanced and Applied Sciences, Vol. 4, No. 6, pp. 148-152, 2017 [10] M. Farooq, H. U. Khan, S. Iqbal, E. U. Munir, A. Shahzad, “DS-Index: Ranking Authors Distinctively in an Academic Network”, IEEE Access, Vol. 5, pp. 19588-19596, 2017 [11] C. W. Lu, C. M. Hsieh, C. H. Chang, C. T. Yang, “An improvement to data service in cloud computing with content sensitive transaction analysis and adaptation”, IEEE 37th Annual Computer Software and Applications Conference Workshops, Japan, pp. 463-468, July 22-26, 2013 [12] L. Kappelman, E. McLean, J. Luftman, V. Johnson, “Key Issues of IT Organizations and Their Leadership: The 2013 SIM IT Trends Study”, MIS Quarterly Executive, Vol. 12, No. 4, 2013 [13] J. Avrane-Chopard, T. Bourgault, A. Dubey, L. Moodley, Big business in small business: Cloud services for SMBs, RECALL Νο. 25, McKinsey & Company, 2014 Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3157-3161 3161 www.etasr.com Ramzan et al.: An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries [14] W. Venters, E. A. Whitley, “A critical review of cloud computing: researching desires and realities”, Journal of Information Technology, Vol. 27, Νο. 3, pp. 179-197, 2012 [15] J. Aikat, A. Akella, J. S. Chase, A. Juels, M. Κ. Reiter, T. Ristenpart, V. Sekar, M. Swift, “Rethinking security in the era of cloud computing”, IEEE Security & Privacy, Vol. 15, No. 3, pp. 60-69, 2017 [16] S. Asadi, M. Nilashi, A. R. C. Husin, E. Yadegaridehkordi, “Customers perspectives on adoption of cloud computing in banking sector”, Information Technology and Management, Vol. 18, Νο. 4, pp. 305-330, 2017 [17] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, A. Ghalsasi, “Cloud computing—The business perspective”, Decision support systems, Vol. 51, Νο. 1, pp. 176-189, 2011 [18] P. Mell, T. Grance, “The NIST definition of cloud computing”, Communications of the ACM, Vol. 53, No. 6, 2011 [19] S. Saini, S. Kaur, “Cloud Computing-An Emerging Technology and Review of Hybrid Models”, International Journal of Engineering and Management Research, Vol. 7, No. 3, pp. 82-85, 2017 [20] J. Luftman, H. S. Zadeh, B. Derksen, M. Santana, E. H. Rigoni, Z. D. Huang, “Key information technology and management issues 2012– 2013: an international study”, Journal of Information Technology, Vol. 28, No. 4, pp. 354-366, 2013 [21] M. C. Lacity, P. Reynolds, “Cloud Services Practices for Small and Medium-Sized Enterprises”, MIS Quarterly Executive, Vol. 13, No. 1, pp. 31-44, 2014 [22] M. C. Lacity, S. Khan, A. Yan, L. P. Willcocks, “A review of the IT outsourcing empirical literature and future research directions”, Journal of Information Technology, Vol. 25, No. 4, pp. 395-433, 2010 [23] E. Fielt, T. Bohmann, A. Korthaus, S. Conger, G. Gable, “Service management and engineering in information systems research”, The Journal of Strategic Information Systems, Vol. 22, No. 1, pp. 46-50, 2013 [24] I. R. Bardhan, H. Demirkan, P. Kannan, R. J. Kauffman, R. Sougstad, “An interdisciplinary perspective on IT services management and service science”, Journal of Management Information Systems, Vol. 26, No. 4, pp. 13-64, 2010 [25] V. Chang, Y. H. Kuo, M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds”, Future Generation Computer Systems, Vol. 57, pp. 24-41, 2016 [26] N. Su, R. Akkiraju, N. Nayak, R. Goodwin, “Shared services transformation: Conceptualization and valuation from the perspective of real options”, Decision Sciences, Vol. 40, No. 3, pp. 381-402, 2009 [27] S. Schneider, A. Sunyaev, “Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing”, Journal of Information Technology, Vol. 31, No. 1, pp. 1- 31, 2016 .