scholarly journals Legal issues in clouds: towards a risk inventory

Author(s):  
Karim Djemame ◽  
Benno Barnitzke ◽  
Marcelo Corrales ◽  
Mariam Kiran ◽  
Ming Jiang ◽  
...  

Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the legal issues surrounding risk assessment in cloud computing. Specifically, it analyses risk regarding data protection and security, and presents the requirements of an inherent risk inventory. The usefulness of such a risk inventory is described in the context of the OPTIMIS project.

2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


10.29007/9gjv ◽  
2019 ◽  
Author(s):  
Faghmie Davids ◽  
Jean-Paul Van Belle

This research investigates how the business strategy factors for South African organizations either support or impede moving business capabilities to a Cloud Computing (CC) environment. In particular, the research considers larger organizations within the investment services industry. By performing a qualitative study the research investigates the various business and Information Technology (IT) strategies. The various CC options are then explored to draw a correlation between the business strategy factors and CC. It concludes that cloud computing offers no competitive differentiation for South African investment services organisations. For these organisations, their existing business models remains profitable. Business strategy, therefore, has no compelling reason to consider cloud computing. South African investment services organizations align with their business strategies through the service-level method, which cause the IT departments to focus on stability and reliability.


Web Services ◽  
2019 ◽  
pp. 769-787
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Mohd. Akbar ◽  
Mohammad Suaib ◽  
Mohd. Shahid Husain ◽  
Saurabh Shukla

The cloud computing environment is one of the most promising technologies in the development of computing resources. The cloud service providers provide almost every resource for computing to their users through the internet. With all its advantages, cloud computing has major security issues. Especially in the case of public clouds, anyone can misuse the services for performing unlawful activities. The traditional approaches used for cyber forensics and network forensics are not adequate for the cloud environment because of many technical constraints. There is a need for setting up effective countermeasures that can help an investigator to identify and track unlawful activities happened in a cloud environment. Cloud forensics is an emerging area of research where the researchers aim to provide effective digital forensic techniques that help in the investigation of digital crimes in a cloud environment. The cloud environment helps to extract data even from devices that are not physically accessible. However, cloud forensics is not as easy as it seems; a lot of the success depends on the cloud service model implemented in the context. Getting the support of cloud service providers in accessing the potential sources of evidence necessary for investigation is also a major concern. Another critical aspect of cloud forensics is dealing with legal issues. This chapter discusses the basic concepts of cloud forensics, its challenges, and future directions.


2021 ◽  
Vol 11 (2) ◽  
pp. 1386-1399
Author(s):  
Ramya K.

With the advent of cloud computing, the affinity between business and technology had increased manifold, allowing users to access IT resources at their convenience through the pay-per-use scheme. With such huge demand surging day to day, the cloud environment must cater to the user requirements flawlessly and also should be rewarding to the providers of cloud service. To maintain its high level of efficiency, there are several challenges that the cloud environment should tackle. One amongst those challenges is the balancing of load. It is one of the primary features of cloud computing that focuses on avoiding the overloading of nodes where there may be idle nodes or nodes with lesser load present at the same juncture. By keeping an effective check on the load several the Quality of Service (QoS) parameters including response time, throughput, resource utilization, energy consumption, cost etc., can be improved, adding to better performance of the entire cloud environment. Even distribution of load among datacenters will contribute to optimal energy consumption and keeps a check on carbon emissions. In this paper we have presented a methodical review on literature pertaining to load balancing strategies that had been proposed in the cloud environment. We had made in-depth analyses of available load balancing techniques and had come up with their advantages, limitations along with the challenges to be addressed by researchers for developing efficient load balancing strategies in the near future. We had also suggested prospective insights about the aspects in load balancing that could be applied in the cloud environment.


Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Nobo Chowdhury ◽  
K. M. Aslam Uddin ◽  
Sadia Afrin ◽  
Apurba Adhikary ◽  
Fazly Rabbi

Cloud computing is an information technology archetype which has been used significantly for providing various services through Internet. It ensures easier access to resources and high-level services. The working procedure of cloud systems must be scheduled, so as to efficiently provide services to people. The goal of task scheduling is to acquire best system throughput and to allocate various computing resources to applications. The unpredictable situation increases with the size of the task and becomes high potential to solve effectively. Numerous intellectual methods are recommended to clarify this situation in the territory of scheduling of cloud computing. In this research, a comparative analysis has been conducted for different types of existing scheduling algorithms in the cloud environment with their respective parameters.  


Biometrics ◽  
2017 ◽  
pp. 1-19
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


2021 ◽  
Vol 7 ◽  
pp. e509
Author(s):  
Muhammad Usman Sana ◽  
Zhanli Li

In the last decade, cloud computing becomes the most demanding platform to resolve issues and manage requests across the Internet. Cloud computing takes along terrific opportunities to run cost-effective scientific workflows without the requirement of possessing any set-up for customers. It makes available virtually unlimited resources that can be attained, organized, and used as required. Resource scheduling plays a fundamental role in the well-organized allocation of resources to every task in the cloud environment. However along with these gains many challenges are required to be considered to propose an efficient scheduling algorithm. An efficient Scheduling algorithm must enhance the implementation of goals like scheduling cost, load balancing, makespan time, security awareness, energy consumption, reliability, service level agreement maintenance, etc. To achieve the aforementioned goals many state-of-the-art scheduling techniques have been proposed based upon hybrid, heuristic, and meta-heuristic approaches. This work reviewed existing algorithms from the perspective of the scheduling objective and strategies. We conduct a comparative analysis of existing strategies along with the outcomes they provide. We highlight the drawbacks for insight into further research and open challenges. The findings aid researchers by providing a roadmap to propose efficient scheduling algorithms.


Author(s):  
Sapana Sanjay Bhuskute ◽  
◽  
Sujata Kadu ◽  

Federated cloud computing is the advancement in the area of the general cloud computing paradigm. In a federated cloud environment, multiple cloud service providers share their computing assets, servers, and various facilities to fulfill customer demands. Federated cloud computing terminology consists of the aggregation of services considered by interoperability characteristics and creates the integration of several cloud service providers regardless of any geographical location. It improves the performance, utilization of facilities, minimizes response time and pricing model by partial subcontracting various computing resources and facilities from the nearby cost-efficient province. Customers also get profited from service level agreements signed between the cloud service providers through intermediator cloud brokers. This work aims to survey the federated cloud environment, its various architectural types, advantages associated with the federation, challenges associated with a federated cloud environment, and future research directions in the federated cloud computing research area.


Sign in / Sign up

Export Citation Format

Share Document