Standard Contracts for Cloud Services

2021 ◽  
pp. 49-99
Author(s):  
Johan David Michels ◽  
Christopher Millard ◽  
Felicity Turton

This chapter reviews the main issues that cloud contracts typically cover and what their terms provide. It examines whether approaches vary significantly between providers, and assesses how terms have changed over the past ten years. The approach is largely empirical. The chapter presents the results of a survey of the standard Terms of Service (ToS) under which providers offered cloud computing services in 2019. It looks at general terms relating to the contract, such as duration, termination, and variation clauses. The chapter then considers terms relating to the allocation of responsibility, liability, and intellectual property (IP) between customer and provider. It analyses these terms from the perspective of English law, and where relevant, European law.

2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Author(s):  
Louay Karadsheh ◽  
Samer Alhawari

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.


2011 ◽  
Vol 1 (2) ◽  
pp. 29-40 ◽  
Author(s):  
Louay Karadsheh ◽  
Samer Alhawari

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.


Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2021 ◽  
Vol 11 (18) ◽  
pp. 8496
Author(s):  
Salah T. Alshammari ◽  
Khalid Alsubhi

Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


TEM Journal ◽  
2020 ◽  
pp. 915-923 ◽  
Author(s):  
Ekkachat Baikloy ◽  
Prasong Praneetpolgrang ◽  
Nivet Jirawichitchai

The research objectives were: 1) to develop cyber resilient model, 2) to develop the cyber resilient capability maturity model and 3) to develop self-assessment model for cyber resilient capability of cloud computing services which are qualitative and applicative research. Referring to the cybersecurity concept from National Institute of Standards and Technology (NIST) from the in-depth interview, focusgroup discussion was developed with cybersecurity experts and data collection from cloud services providers. It was found that trend of cyber-attacks was violent with smarter method. The authors had synthesized the concept of cyber resilient capability maturity model for cloud computing services including developed application for cloud services providers to evaluate their organization in order to improve the better cybersecurity level in cloud computing services and the cyber resilient capability maturity model in the future.


2016 ◽  
pp. 709-734
Author(s):  
Konstantinos Koumaditis ◽  
George Pittas ◽  
Marinos Themistocleous ◽  
George Vassilacopoulos ◽  
Andriana Prentza ◽  
...  

Healthcare organisations are forced to reconsider their current business practices and embark on a cloud adoption journey. Cloud-Computing offers important benefits that make it attractive for healthcare (e.g. cost effective model, big data management etc.). Large Information Technology (IT) companies are investing big sums in building infrastructure, services, tools and applications to facilitate Cloud-Computing for healthcare organisations, practitioners and patients. Yet, many challenges that such integration projects contain are still in the e-health research agenda like design and technology requirements to handle big volume of data, ensure scalability and user satisfaction to name a few. The purpose of this chapter is (a) to address the Cloud-Computing services for healthcare in the form of a Personal Healthcare record (PHR) and (b) demonstrate a multidisciplinary project. In doing so, the authors aim at increasing the awareness of this important endeavour and provide insights on Cloud-Computing e-health services for healthcare organisations.


Author(s):  
Anil Aggarwal

Cloud services are becoming part of every company’s “right”mare. They know it is the future but are afraid to jump on the cloud computing bandwagon. This may be due to lack of standardization, evolving technology, and/or fear of loss of privacy and security. However, every emerging technology has its root in early adopters who defy the common wisdom, take chances, and help it to evolve into something marketable. They get the first advantage before it becomes a norm. History is full of such examples: e-commerce, m-commerce, online banking, check in through kiosk, et cetera. Companies who were early adopters still have an advantage over late adopters. Amazon.com and eBay are prime examples of this. As technology evolves, it transfers from “push” to “pull” cycle. Cloud services are in their infancy and still evolving around “push” cycle. The number of companies offering cloud services is multiplying exponentially. This chapter presents a systems approach to cloud computing services. Specifically, it examines issues in the context of the system development life cycle (SDLC). For completeness purposes, the chapter discusses issues in relation to SDLC; however, in practice, each user has to customize this approach to suit their own application(s).


Sign in / Sign up

Export Citation Format

Share Document