Cover page and Table of Contents: PDF (size: 826KB)
Full Text (PDF, 826KB), PP.40-47
Views: 0 Downloads: 0
Cloud computing, requirement engineering, requirement elicitation methods, Pakistan IT industry
In cloud computing, requirements engineering is a greatly under-researched topic. Requirement elicitation is a key activity that helps in assemble the requirements of a system from different users, customers and stakeholders. Cloud services providers need methods to correctly elicit requirements from consumers, as the consumers of cloud services are more diverse and there occur some conflictions in the non-functional requirement of some kinds of consumers. Sometimes eliciting security requirements is an important task, because the cloud services are acquired by potential cloud consumers are secure for them to use. Both literature and market surveys are performed on different elicitation approaches that are followed by CSPs to fetch consumer requirements, recommendations and data from cloud service providers and from consumers of cloud computing services. This study aims to discuss the elicitation methods being used by cloud providers in Pakistan IT industry, and the resulting feedback of the consumers by these methods. This would lead to determine current elicitation methods are sufficient or there is a need to design a new elicitation method that can sufficiently provide with more customer satisfaction. We have used semi-structured interviews and questionnaires to gather information about the elicitation techniques that are used by cloud providers to elicit consumer requirements. This study is conducted in Pakistan IT industry. Somehow, this research enlightens the trend and scope of cloud computing in Pakistan. This study would be beneficial for cloud providers adequately gather their consumer requirements and enhance the knowledge of elicitation techniques that are used by cloud providers.
Muhammad Imran Manzoor, Momina Shaheen, Hudaibia Khalid, Aimen Anum, Nisar Hussain, M. Rehan Faheem, " Requirement Elicitation Methods for Cloud Providers in IT Industry", International Journal of Modern Education and Computer Science(IJMECS), Vol.10, No.10, pp. 40-47, 2018. DOI:10.5815/ijmecs.2018.10.05
R. Colomo-Palacios, E. Fernandes, M. Sabbagh, and A. de A. Seco, “Human and intellectual capital management in the cloud: Software vendor perspective,” J. Univers. Comput. Sci., vol. 18, no. 11, pp. 1544–1557, 2012.
V. Inukollu, S. Arsi, and S. Ravuri, “Security Issues Associated With Big Data in Cloud Computing,” Int. J. Netw. Secur. Its Appl., vol. 6, no. 3, pp. 45–56, 2014.
S. M. Parikh, N. M. Patel, and H. B. Prajapati, “Resource Management in Cloud Computing: Classification and Taxonomy,” 2017.
M. Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing for securing big data storage in cloud computing,” Inf. Sci. (Ny)., vol. 380, pp. 101–116, 2017.
L. Ren, L. Zhang, L. Wang, F. Tao, and X. Chai, “Cloud manufacturing: key characteristics and applications,” Int. J. Comput. Integr. Manuf., vol. 30, no. 6, pp. 501–515, 2017.
I. Zikra, “Model-based requirements for integrating cloud services,” CEUR Workshop Proc., vol. 1612, pp. 65–72, 2016.
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing - The business perspective,” Decis. Support Syst., vol. 51, no. 1, pp. 176–189, 2011.
P. Mell, T. Grance, and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology.”
D. Wentzlaff et al., “An operating system for multicore and clouds,” Proc. 1st ACM Symp. Cloud Comput. - SoCC ’10, p. 3, 2010.
S. Jones, Z. Irani, U. Sivarajah, and P. E. D. Love, “Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies,” Inf. Syst. Front., pp. 1–24, 2017.
S. Applications, “IBM Research Report A Collaborative Requirement Elicitation Technique for SaaS Applications A Collaborative Requirement Elicitation Technique for,” vol. 25081, 2010.
H. M. Sabi, F. M. E. Uzoka, K. Langmia, F. N. Njeh, and C. K. Tsuma, “A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa,” Inf. Syst. Front., pp. 1–24, 2017.
B. T. Bresnahan and P. L. Yin, “Adoption of New Information and Communications Technologies in the Workplace Today,” Innov. Policy Econ., vol. 17, no. 1, pp. 95–124, 2017.
B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions,” Futur. Gener. Comput. Syst., 2017.
M. Kassab, “The changing landscape of requirements engineering practices over the past decade,” 2015 IEEE Fifth Int. Work. Empir. Requir. Eng., no. January, pp. 1–8, 2015.
I. Todoran, N. Seyff, and M. Glinz, “How Do Cloud Providers Elicit Consumer Requirements ?,” p. 2014.
I. Todoran and M. Glinz, “Towards bridging the communication gap between consumers and providers in the cloud,” Proc. WICSA/ECSA 2012 Companion Vol. - WICSA/ECSA ’12, p. 78, 2012.
J. Vijayashree, P. U. Ivy, and J. Jayashree, “Requirements Elicitation Framework for Cloud Applications,” vol. 3, no. 1, pp. 729–733, 2015.
K. Beckers, I. Côté, L. Goeke, S. Güler, and M. Heisel, “A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain,” Int. J. Secur. Softw. Eng., vol. 5, no. 2, pp. 20–43, 2014.
N. Ferreira, N. Santos, R. J. Machado, and D. Gaševi, “Derivation of Process-Oriented Logical Architectures : An Elicitation Approach for Cloud Design *,” pp. 44–58, 2012.
“Cloud Computing Consumer Protocol ACS Cloud Discussion Paper July 2013,” 2013.
S. Zardari and R. Bahsoon, “Cloud adoption: A goal-oriented requirements engineering approach,” Proc. - Int. Conf. Softw. Eng., pp. 29–35, 2011.
N. Boulila, A. Hoffmann, and A. Herrmann, “Using Storytelling to Record Require ments: Elements for an Effective Requirements Elicitation Approach,” pp. 9–16, 2011.
I. T. Koitz and M. Glinz, “StakeCloud Tool: From cloud consumers’ search queries to new service requirements,” 2015 IEEE 23rd Int. Requir. Eng. Conf. RE 2015 - Proc., pp. 286–287, 2015.
I. Todoran and M. Glinz, “Quest for Requirements: Scrutinizing Advanced Search Queries for Cloud Services with Fuzzy Galois Lattices,” 2014 IEEE World Congr. Serv., no. iii, pp. 234–241, 2014.
K. Beckers, S. Faßbender, and H. Schmidt, “An integrated method for pattern-based elicitation of legal requirements applied to a cloud computing example,” Proc. - 2012 7th Int. Conf. Availability, Reliab. Secur. ARES 2012, no. August, pp. 463–472, 2012.