scholarly journals Analyzing the Important Factors for Cloud Service Provider Selection among the IT firms in Turkey

Author(s):  
Ediz Şaykol ◽  
Ayşe Seçil Başer ◽  
Kazim Sari

Cloud computing, as being one of the trendy topics, provides mechanisms for the companies to meet all the information technology and management requirements at a desired performance level with reduced upfront investments. From the economical perspective, it creates a positive impact by helping them focus on their own business. With this positive impact, it causes a huge increase on the number of user firms, and many service providers try to provide solutions based on the user firms’ needs. There are studies on identifying the factors that are used in selecting cloud service solutions in the literature. Having examined the pivotal points among the Information Technology (IT) sector in Turkey, we conducted a survey among the managers of various firms to gather information about their cloud service provider and the factors that provision their choice. Since that decision is very strategic, and once decided it is very hard to alter, it is worth analyzing the set of factors that are used in the survey further in order to identify the most important ones and help new companies for their selection. We provide statistical evaluations based on the results of the survey in this study.

2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2021 ◽  
Author(s):  
Rebecca Parry

Behind technology service suppliers lie companies that are subject to the risk of business failure due to market conditions and trading risks. Such failures could suddenly stop customers accessing services or content, with potentially devastating business and personal impacts, given the rising importance of digital economies. The risk can be illustrated by reference to cloud computing insolvencies but similar issues may affect other service providers. The insolvency of a cloud service provider would be likely to present problems of access to infrastructure, platforms, services and data and insolvency laws are not always designed to enable a managed closedown of a business, which would be needed to enable replacement services to be sourced and data recovered. This cybersecurity risk has barely been touched upon in literature, since it lies at the intersection between law and computer science, both areas requiring high levels of specialist understanding, and this chapter is part of initial attempts to identify the threats presented.


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


Author(s):  
Alexander Herzfeldt ◽  
Sebastian Floerecke ◽  
Christoph Ertl ◽  
Helmut Krcmar

With the increasing maturity of cloud technologies and the growing demand from customers, the cloud computing ecosystem has been expanding continuously with both incumbents and new entrants, whereby it has become more distributed and less transparent. For cloud service providers previously focusing on growth strategies, it is now necessary to shift the attention to providing service efficiently, as well as profitably. Based on 14 explorative interviews with cloud service experts, the relationship between cloud service provider profitability and value facilitation, which stands for the capability to build up resources in advance of future customer engagements, is investigated. The results indicate a positive relationship between cloud service profitability and value facilitation and deliver valuable insights for both researchers and practitioners. In particular, guidelines on how to design profitable cloud service offerings are discussed.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


Author(s):  
Alexander Herzfeldt ◽  
Sebastian Floerecke ◽  
Christoph Ertl ◽  
Helmut Krcmar

With the increasing maturity of cloud technologies and the growing demand from customers, the cloud computing ecosystem has been expanding continuously with both incumbents and new entrants, whereby it has become more distributed and less transparent. For cloud service providers previously focusing on growth strategies, it is now necessary to shift the attention to providing service efficiently, as well as profitably. Based on 14 explorative interviews with cloud service experts, the relationship between cloud service provider profitability and value facilitation, which stands for the capability to build up resources in advance of future customer engagements, is investigated. The results indicate a positive relationship between cloud service profitability and value facilitation and deliver valuable insights for both researchers and practitioners. In particular, guidelines on how to design profitable cloud service offerings are discussed.


Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


Sign in / Sign up

Export Citation Format

Share Document