scholarly journals Legal issues in clouds: towards a risk inventory

Author(s):  
Karim Djemame ◽  
Benno Barnitzke ◽  
Marcelo Corrales ◽  
Mariam Kiran ◽  
Ming Jiang ◽  
...  

Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the legal issues surrounding risk assessment in cloud computing. Specifically, it analyses risk regarding data protection and security, and presents the requirements of an inherent risk inventory. The usefulness of such a risk inventory is described in the context of the OPTIMIS project.

2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


10.29007/9gjv ◽  
2019 ◽  
Author(s):  
Faghmie Davids ◽  
Jean-Paul Van Belle

This research investigates how the business strategy factors for South African organizations either support or impede moving business capabilities to a Cloud Computing (CC) environment. In particular, the research considers larger organizations within the investment services industry. By performing a qualitative study the research investigates the various business and Information Technology (IT) strategies. The various CC options are then explored to draw a correlation between the business strategy factors and CC. It concludes that cloud computing offers no competitive differentiation for South African investment services organisations. For these organisations, their existing business models remains profitable. Business strategy, therefore, has no compelling reason to consider cloud computing. South African investment services organizations align with their business strategies through the service-level method, which cause the IT departments to focus on stability and reliability.


Web Services ◽  
2019 ◽  
pp. 769-787
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Mohd. Akbar ◽  
Mohammad Suaib ◽  
Mohd. Shahid Husain ◽  
Saurabh Shukla

The cloud computing environment is one of the most promising technologies in the development of computing resources. The cloud service providers provide almost every resource for computing to their users through the internet. With all its advantages, cloud computing has major security issues. Especially in the case of public clouds, anyone can misuse the services for performing unlawful activities. The traditional approaches used for cyber forensics and network forensics are not adequate for the cloud environment because of many technical constraints. There is a need for setting up effective countermeasures that can help an investigator to identify and track unlawful activities happened in a cloud environment. Cloud forensics is an emerging area of research where the researchers aim to provide effective digital forensic techniques that help in the investigation of digital crimes in a cloud environment. The cloud environment helps to extract data even from devices that are not physically accessible. However, cloud forensics is not as easy as it seems; a lot of the success depends on the cloud service model implemented in the context. Getting the support of cloud service providers in accessing the potential sources of evidence necessary for investigation is also a major concern. Another critical aspect of cloud forensics is dealing with legal issues. This chapter discusses the basic concepts of cloud forensics, its challenges, and future directions.


2021 ◽  
Vol 11 (2) ◽  
pp. 1386-1399
Author(s):  
Ramya K.

With the advent of cloud computing, the affinity between business and technology had increased manifold, allowing users to access IT resources at their convenience through the pay-per-use scheme. With such huge demand surging day to day, the cloud environment must cater to the user requirements flawlessly and also should be rewarding to the providers of cloud service. To maintain its high level of efficiency, there are several challenges that the cloud environment should tackle. One amongst those challenges is the balancing of load. It is one of the primary features of cloud computing that focuses on avoiding the overloading of nodes where there may be idle nodes or nodes with lesser load present at the same juncture. By keeping an effective check on the load several the Quality of Service (QoS) parameters including response time, throughput, resource utilization, energy consumption, cost etc., can be improved, adding to better performance of the entire cloud environment. Even distribution of load among datacenters will contribute to optimal energy consumption and keeps a check on carbon emissions. In this paper we have presented a methodical review on literature pertaining to load balancing strategies that had been proposed in the cloud environment. We had made in-depth analyses of available load balancing techniques and had come up with their advantages, limitations along with the challenges to be addressed by researchers for developing efficient load balancing strategies in the near future. We had also suggested prospective insights about the aspects in load balancing that could be applied in the cloud environment.


Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Nobo Chowdhury ◽  
K. M. Aslam Uddin ◽  
Sadia Afrin ◽  
Apurba Adhikary ◽  
Fazly Rabbi

Cloud computing is an information technology archetype which has been used significantly for providing various services through Internet. It ensures easier access to resources and high-level services. The working procedure of cloud systems must be scheduled, so as to efficiently provide services to people. The goal of task scheduling is to acquire best system throughput and to allocate various computing resources to applications. The unpredictable situation increases with the size of the task and becomes high potential to solve effectively. Numerous intellectual methods are recommended to clarify this situation in the territory of scheduling of cloud computing. In this research, a comparative analysis has been conducted for different types of existing scheduling algorithms in the cloud environment with their respective parameters.  


Biometrics ◽  
2017 ◽  
pp. 1-19
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


2020 ◽  
Vol 12 (2) ◽  
pp. 47-63
Author(s):  
Sathiyamoorthy E. ◽  
Karthikeyan P

Cloud computing is a trending area of information technology (IT). In a cloud environment, the Cloud service provider (CSP) provides all the functionalities to the users or customers in terms of services. With the rapid development of cloud computing, the performance of any cloud environment relies on the quality of services (QoS) at the time of providing the services. A service level agreement (SLA) increases the confidence of the user or customer to use the cloud services in a cloud environment. There should be negotiation between the CSP and users to achieve a strong SLA. Many existing SLA models are already developed. However, these models do not concentrate to maintain the quality in a long-time duration period. To solve this issue, a novel SLA model has been proposed in this article by using Fuzzy logic. Both the theoretical and simulation results show the proficiency of the proposed scheme over the existing schemes in a cloud computing environment.


2021 ◽  
Vol 12 (3) ◽  
pp. 1-16
Author(s):  
Teo Lo Piparo ◽  
Georg Hodosi ◽  
Lazar Rusu

The cloud archetype is fundamentally dynamic for both service customer and service provider. From the provider's perspective, resources are removed and/or added irregularly and urgently together with updating of service level agreements (SLAs). However, this dynamical behavior makes contracting sophisticated. Yet, there is a lack of knowledge on how to handle these dynamics contractually. To address this knowledge gap, the authors have investigated “how to improve SLA management with dynamic SLA iterations.” For this reason, a model for cloud computing SLA negotiation is proposed to facilitate the buying organization in determining uncertainty by analyzing attributes of asset specificity and risks associated with them. Survey research has been used for testing the model. The respondents rationalized the SLA negotiation with a better cognitive understanding in all phases within the model. The study's findings could support cloud service buying organizations to minimize the risks with ever-changing requirements.


Sign in / Sign up

Export Citation Format

Share Document