scholarly journals Justice vs Control in Cloud Computing: A Conceptual Framework for Positioning a Cloud Service Provider’s Privacy Orientation

Author(s):  
Valerie Lyons

Abstract The continued rise in frequency and magnitude of cloud-based privacy breaches brings to the fore the challenges experienced by cloud service providers (CSPs) in balancing the need to maximize profit with the need to maintain data privacy. With a backdrop of the ineffectiveness of regulatory approaches to protecting privacy, this chapter explores privacy from a non-regulatory perspective—instead exploring a CSP’s approach to privacy as dynamics of control and justice. We apply control theory to represent the CSP’s compliance with privacy legislation and power over data, and we apply justice theory to represent the CSP exceeding compliance. Control theories, such as social contract theory, have frequently been applied to explore privacy challenges between organizations and consumers, as too have justice theories e.g. procedural and distributive justice. However, few studies have combined these theoretical concepts to provide a balanced view of these tensions in the cloud computing landscape. Integrating concepts from these theories, we construct a framework that can help to explain and position a CSP’s privacy orientation. Four key privacy orientations emerge in our framework, namely: Risk Managers, Integrators, Citizens and Warriors. We discuss the implications of each privacy orientation for CSPs. Our framework will enable future research to further understand, explore and compare the impact and effectiveness of each privacy orientation.

2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


Author(s):  
Y. Kiran Kumar ◽  
R. Mahammad Shafi

<span lang="EN-US">Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers.  Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud. </span>


2020 ◽  
Vol 34 (2) ◽  
pp. 23-46
Author(s):  
Kimberly Swanson Church ◽  
Pamela J. Schmidt ◽  
Kemi Ajayi

ABSTRACT To engage theory and practice of cloud computing in business, the third annual Journal of Information Systems Conference (JISC) brought together 29 academic researchers and 14 practitioners. This commentary reviews and synthesizes discussions and insights provided by three keynote presentations and panel discussions. In addition to sharing insights from the conference, this commentary identifies major themes, incorporates relevant current literature, and suggests potential research questions expressed by practitioners. The JISC emphasized the impact of the rapid maturing of cloud computing services on accounting information systems (AIS). Several recurring themes emerged throughout the conference: (1) rapid growth and evolution of cloud managed services, (2) security, privacy, and risk in the cloud ecosystem, (3) impact of cloud computing for data analytics, and (4) emerging and disruptive financial technologies and trends for the cloud. Most of the discussion surrounding these themes predominantly focused on the perspectives of cloud assurance and cloud service providers.


Author(s):  
Sumit Kumar ◽  
Himani Sharma ◽  
Gurpreet Singh

As cloud computing services become popular, it is important for cloud service providers (CSPs) to ensure their duty to society by reducing the impact on the environment due to their operations. CSPs use higher amounts of energy because of the large power demand to run datacenters (DCs). The transient development of cloud computing models has led to the establishment of multiple DCs worldwide. Energy efficiency of ICT and CO2 emissions is a major issue in cloud computing. Scientists are constantly working on this issue to find a solution. Among other options, there is well-known virtualization that is accepted by IT organizations to reduce CO2 emissions and power usage. The basic goal of this paper is to present important methods of VM placement used for measurement of PUE in distributed DCs and with varying carbon emission rates. Finally, we present an analysis of several open stack techniques with ACO, DVFS, ECE, and Two-phase Carbon Aware techniques.


Author(s):  
Sapana Sanjay Bhuskute ◽  
◽  
Sujata Kadu ◽  

Federated cloud computing is the advancement in the area of the general cloud computing paradigm. In a federated cloud environment, multiple cloud service providers share their computing assets, servers, and various facilities to fulfill customer demands. Federated cloud computing terminology consists of the aggregation of services considered by interoperability characteristics and creates the integration of several cloud service providers regardless of any geographical location. It improves the performance, utilization of facilities, minimizes response time and pricing model by partial subcontracting various computing resources and facilities from the nearby cost-efficient province. Customers also get profited from service level agreements signed between the cloud service providers through intermediator cloud brokers. This work aims to survey the federated cloud environment, its various architectural types, advantages associated with the federation, challenges associated with a federated cloud environment, and future research directions in the federated cloud computing research area.


2018 ◽  
Vol 33 (3) ◽  
pp. 93-115 ◽  
Author(s):  
Lei Gao ◽  
Alisa G. Brink

ABSTRACT Cloud computing is increasingly popular across all sectors and offers users unparalleled scalability, elasticity, and flexibility. However, the rapid transition toward cloud computing has raised privacy and confidentiality concerns. Cloud service providers can access users' data, and private information may be accidentally or deliberately disclosed or used for unauthorized purposes. Privacy policies are intended to provide users with information about privacy practices and their privacy options. This study performs content analysis of the privacy policies of 47 cloud service providers who offer services to business users. This analysis identifies what information is collected and why, to whom the information is disclosed, and what measures are in place for data security, data retention, and data complaints. Additionally, we investigate the readability, uncertainty language, and linguistic tone of cloud service privacy policies. Our results offer implications for cloud service users, providers, and policymakers, and provide directions for future research. Data Availability: Data are available upon request.


2016 ◽  
Vol 65 (1/2) ◽  
pp. 33-51 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The purpose of this paper is to explore the perceptions of librarians engaged in Indian academic libraries towards cloud computing. Design/methodology/approach – A structured questionnaire was used to collect responses from the library professionals engaged in Indian academic libraries. Overall, 339 respondents participated in the survey. Descriptive survey method was used in the study. Findings – The findings of the study reveal that library professionals are using cloud-computing tools in their daily works. They want to adopt cloud computing in the libraries to improve library services and avoid redundancy of works. Ubiquitous availability, economy and the various service layers are the core drivers of its adoption in the libraries. The respondents showed their concern over security and data privacy in cloud. Practical implications – The study establishes the fact that the benefits of cloud computing are inadequate to convince the libraries to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – The paper provides the perceptions of library professionals in response to the adoption of cloud computing.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 311
Author(s):  
Mohith Lalita Kumar Parvataneni ◽  
Eswara Sai Nath Adusumalli ◽  
Rajeshbabu. C

Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage.


Author(s):  
David Livingston ◽  
Ezra Kirubakaran ◽  
Eben Priya David

Cloud Computing is an excellent technology for Micro Medium and Small Enterprises, which operate under budget shortage for setting up their own Information Technology infrastructure that requires capital investment on resources such as computers, storage and networking devices.  Now-a-days, major Cloud Providers like Google and Amazon provide cloud services to its customers for managing their email, contact list, calendar, documents, and their own websites.  MSME can take advantage of the cloud-based solutions offered by various Cloud Service Providers for equipping their own employees in doing their day to day activities more effectively and on the cloud.  Though cloud computing promotes less expensive and collaborative work environment among a group of employees, it involves risks in keeping the resources such as computing and data secured.  Different mechanisms are available for securing the data on the cloud among which encryption of data using cryptographic algorithm is the widely used one.  Among various encryption symmetric algorithms, Advanced Encryption Standard is the more secured symmetric encryption algorithm for implementing data privacy on the cloud.  In this paper, the authors have discussed some of the issues involved in adopting the cloud in an organization and proposed solutions that will benefit an organization while uploading and managing data in files and databases on the cloud.


Sign in / Sign up

Export Citation Format

Share Document