scholarly journals Users versus Cloud Service Providers, on the Trust, Threats, Confidentiality and Reliability in Using Cloud Computing Services

Author(s):  
OKONKWO NGOZI U ◽  
DR. MRS A.AJIBOLA
2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2019 ◽  
Vol 8 (4) ◽  
pp. 12522-12528

The purpose of the study was to explore the Cloud computing Practicing level, Cloud computing Satisfaction level and the Preferred Cloud service provider among the Online Business SMEs (OBSMEs) in Sri Lanka that have adopted Cloud services. Prior studies have shown that SMEs significantly benefit due to the adoption of Cloud computing services. The study was conducted among 260 randomly selected OBSMEs using self-administered questionnaires from managerial and ICT professionals who were capable of making ICT decision at OBSMEs under this study. However only 247 questionnaires were returned with complete data required for the purpose of analysis. A descriptive analysis was used to analyse the data. The findings have revealed that 31% of the OBSMEs are frequently Practicing Cloud computing for their ICT needs, while 69% of them relies on Cloud computing for their different ICT needs usually. Findings reveals that 35% of the OBSMEs are moderately Satisfied in this study, while 61% of OBSMEs have been reported that they are very Satisfied with Cloud computing services, at the same time 4% of the OBSMEs are reported that they have extremely Satisfied with Cloud computing services. In the context of OBSMEs it has been reported that 78% of the Cloud service providers are rendering reliability of services and OBSMEs are very satisfied, while 12% of the OBSMEs are moderately satisfied with the reliability of services and other 10% of the OBSMEs are extremely satisfied with the reliability of services provided by Cloud Service Providers in Sri Lanka. This study extends the existing body of knowledge by providing empirical support for explaining cloud computing adoption by OBSME in Sri Lanka. The study add value for various parties engaging in promoting the adoption of cloud computing among various business industries in Sri Lanka. Therefore, the researchers are able to recommend that cloud computing technology is playing a significant role for the improvement of business industries in Sri Lanka and the software vendors, policy makers and technological service providers should consider the findings of this study if they have intention to adopt this technology in future. Moreover, the findings of this research would assist and enhance service providers to consider their investment in information technology when adopting and implementing Cloud computing in Sri Lanka.


The proliferation of Cloud Computing has opened new and attractive offerings for consumers. Cloud Service Providers promote and market packages of cloud computing services that cater to diverse opportunities and user applications. While this has obvious advantages, there are certain factors that are a cause for concern. Monitoring the underlying infrastructure that supports the entire fabric of cloud computing is an aspect that requires a great deal of attention. The aspect of monitoring takes on a great deal of significance when performance and robustness of cloud service on offer is taken into consideration. Although research has been conducted into various cloud computing monitoring techniques, there is scope and room yet for an integrated cloud monitoring solution that can fulfill the requirements of cloud administrators to ensure optimal performance of the underlying infrastructure of a cloud computing network. In this paper, we propose a unified monitoring model that is essentially a composite framework involving hardware and network layers. Studies conducted during our experiments suggest that our unified cloud monitoring approach can significantly aid in reducing overall carbon emissions while helping meeting compliance and audit norms by ensuring that the underlying cloud infrastructure is monitored closely


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


2020 ◽  
Vol 34 (2) ◽  
pp. 23-46
Author(s):  
Kimberly Swanson Church ◽  
Pamela J. Schmidt ◽  
Kemi Ajayi

ABSTRACT To engage theory and practice of cloud computing in business, the third annual Journal of Information Systems Conference (JISC) brought together 29 academic researchers and 14 practitioners. This commentary reviews and synthesizes discussions and insights provided by three keynote presentations and panel discussions. In addition to sharing insights from the conference, this commentary identifies major themes, incorporates relevant current literature, and suggests potential research questions expressed by practitioners. The JISC emphasized the impact of the rapid maturing of cloud computing services on accounting information systems (AIS). Several recurring themes emerged throughout the conference: (1) rapid growth and evolution of cloud managed services, (2) security, privacy, and risk in the cloud ecosystem, (3) impact of cloud computing for data analytics, and (4) emerging and disruptive financial technologies and trends for the cloud. Most of the discussion surrounding these themes predominantly focused on the perspectives of cloud assurance and cloud service providers.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2016 ◽  
Vol 30 (3) ◽  
pp. 173-189 ◽  
Author(s):  
Pamela J. Schmidt ◽  
Jason T. Wood ◽  
Severin V. Grabski

ABSTRACTCloud computing services are finding rapid adoption as organizations seek cost reduction, technical expertise, flexibility, and adaptable mechanisms to attain advantages in fast-moving business environments. The related considerations of governance, audit, and assurance of cloud computing services might be inadvertently overlooked in a rush to adopt these cloud services. This paper focuses on cloud computing governance and audit issues by presenting research questions informed by both practice and research. A cloud computing ecosystem is presented and an IT Governance framework (Wilkin and Chenhall 2010) is referenced as a means to structure research questions. Key issues of risk, security, monitoring, control, and compliance should be considered early in the cloud services decision process. The tight coupling of intercompany operations between the cloud client and cloud provider(s) forms an interdependent, operationally coupled ecosystem. Planned governance is needed to achieve a well-governed, functional, and secure cloud computing environment. The audit role is complicated when the organization's financial data and/or critical applications are hosted externally with a cloud service provider that may use other cloud service providers.


2020 ◽  
Vol 8 (5) ◽  
pp. 4124-4232

Picking up public cloud service providers is now becoming a harder task in an enterprise organization. This paper will help in reducing more hesitation to choose a public cloud service provider. This paper is highlighting computation, storage, and infrastructure is important to service features that have an impact when choosing cloud service providers. Compare these three (AWS, Microsoft Azure, GCP) CSPs concerning service, price, advantages, and highlight significant service features. Studies discuss the primary reason to choose a CSP that normally enhance features, familiarity with the brand, suitable for organization and security parameters considered when choosing CSP. Amazon Web Services proved its leadership by maintaining about 33% share in the market throughout for several quarters irrespective of the market size increased by a factor of 3. Microsoft has shown prominent performance in SaaS. Since 2008, after introducing PaaS in the form of Google App Engine, Google is continuously enhancing its cloud computing services of Google Cloud Platform.


2018 ◽  
Vol 33 (3) ◽  
pp. 93-115 ◽  
Author(s):  
Lei Gao ◽  
Alisa G. Brink

ABSTRACT Cloud computing is increasingly popular across all sectors and offers users unparalleled scalability, elasticity, and flexibility. However, the rapid transition toward cloud computing has raised privacy and confidentiality concerns. Cloud service providers can access users' data, and private information may be accidentally or deliberately disclosed or used for unauthorized purposes. Privacy policies are intended to provide users with information about privacy practices and their privacy options. This study performs content analysis of the privacy policies of 47 cloud service providers who offer services to business users. This analysis identifies what information is collected and why, to whom the information is disclosed, and what measures are in place for data security, data retention, and data complaints. Additionally, we investigate the readability, uncertainty language, and linguistic tone of cloud service privacy policies. Our results offer implications for cloud service users, providers, and policymakers, and provide directions for future research. Data Availability: Data are available upon request.


Sign in / Sign up

Export Citation Format

Share Document