scholarly journals Liability within the scope of Cloud Computing services

2021 ◽  
Vol 18 (4) ◽  
pp. 9-22
Author(s):  
Katarzyna Chałubińska-Jentkiewicz

The issue of acquiring large amounts of data and creating large sets of digital data, and then processing and analyzing them (Big Data) for the needs of generating artificial intelligence (AI) solutions is one of the key challenges to the development of economy and national security. Data have become a resource that will determine the power and geopolitical and geoeconomic position of countries and regions in the 21st century.The layout of data storage and processing in distributed databases has changed in recent years. Since the appearance of hosting services in the range of ICT services, we are talking about a new type of ASP (Applications Service Providers) – provision of the ICT networks as part of an application). Cloud Computing is therefore one of the versions of the ASP services. The ASP guarantees the customer access to a dedicated application running on a server. Cloud Computing, on the other hand, gives the opportunity to use theresources of a shared infrastructure for many users simultaneously (Murphy n.d.). The use of the CC model is more effective in many aspects. Cloud Computing offers the opportunity to use three basic services: data storage in the cloud (cloud storage), applications in the cloud (cloud applications) and computing in the cloud (compute cloud). Website hosting and electronic mail are still the most frequently chosen services in Cloud Computing. The article attempts to explain the responsibility for content stored in the Cloud Computing.

Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2016 ◽  
pp. 823-848 ◽  
Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


2020 ◽  
Vol 9 (1) ◽  
pp. 52-56
Author(s):  
P. K. Paul ◽  
Bashiru Aremu ◽  
P. S. Aithal ◽  
Ricardo Saavedra ◽  
Ripu Ranjan Sinha

Cloud computing is one of the emerging areas and components within the Information Technology space. Cloud Computing is a kind of virtualization techniques which is achieved by the internet and similar services. Cloud Computing is growing rapidly within Information Technology. This is responsible for the creation of a healthy virtual information technology infrastructure. Cloud Computing is very much important for distributing IT Infrastructure for the concerned organizations and its branches or sister organizations. Cloud Computing is rapidly moving towards the government and public sectors as well due to its benefits and opportunities. Cloud Computing is also called as Virtualization Technology. Within the support of Cloud Computing, there are many service models and types that are emerging viz. Software, Applications, Platforms and Operating Systems, Hardware and infrastructure, Contents and Information, etc. The emerging other technologies are also increasing and many of them relate to the Cloud Computing viz. Big Data, Analytics, Internet of Things (IoT), etc. The market of the cloud also depends on various other things and it is important to note that, apart from the existing established IT organizations and companies, there are many new specially dedicated cloud service providers also emerging rapidly. Cloud Computing Services and its emergence including the current market scenario is provided in this paper including some of the companies and their basic services as well.


Author(s):  
Santosh Kumar ◽  
Ali Imam Abidi ◽  
Sanjay Kumar Singh

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user&#039;s creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Info ◽  
2015 ◽  
Vol 17 (1) ◽  
pp. 54-67 ◽  
Author(s):  
Joseph Kwame Adjei

Purpose – The purpose of this paper is to explain the role of trust in cloud computing services based on empirical evidence from interviewing executives of financial institutions in Ghana. The paper answers the questions: what is the role of trust in cloud computing service acquisition, and what policies promote trusted cloud computing services? Design/methodology/approach – This is an explanatory paper that is based on literature review and empirical data on exploring reasons for cloud computing service acquisitions. A combination of interviews and focus group discussions was used as methods for data collection. Information technology and electronic banking executives of five major commercial banks in Accra, Ghana, between January and July 2013 were interviewed. A total of ten respondents were interviewed, two in each of the selected banks. A purposive sampling technique was used in the selection of informants. This approach allows the selection of qualified informants to ensure extensiveness and diversity of opinion. Findings – Although previous literature proffers various factors as key to cloud computing adoption, uses or provisioning, this study brings trust to the fore as an imperative for cloud computing service acquisition by financial institutions. It also shows that trust increases if users perceive that cloud computing service providers act in honesty and in users’ interest, making trust a fundamental factor that informs financial institutions’ decision to acquire cloud computing services. Research limitations/implications – The research introduces a new dimension about the widely held perceptions of the factors that influence adoption of cloud computing services. Practical implications – Developers of cloud computing solutions that are targeted at corporate users must focus on systems that enhances their trustworthiness, as it is a primary criteria for user buy-in. Similarly, any trust-building effort by cloud computing service providers minimizes users’ concerns and pushes the services providers closer to the trust threshold. Originality/value – The paper outlines the trust factors that are imperative for cloud computing uses by financial institutions. This is one of the pioneering papers that address trust issues in cloud computing from the perspective of financial institutions.


Sign in / Sign up

Export Citation Format

Share Document