51视频

Computer Science and Information Technology Vol. 2(5), pp. 232 - 237
DOI: 10.13189/csit.2014.020502
Reprint (PDF) (288Kb)


Towards a Good Cloud Computing Provider Other Than Choosing through Data Security and Privacy Capability Factor


Duncan Waga 1, Kefa Rabah 2,*
1 Jaramogi Oginga Odinga University of Science and Technology, Kenya
2 Kabarak University, Kenya

ABSTRACT

Cloud computing (CC) is the assumed miracle solution for establishments who are keen on cost effective automation and is brought to a users door step through cloud computer service providers. There are many areas where a user should consider when selecting a vendor for a cloud services solution, from the vendor鈥檚 infrastructure and computing architecture framework to the jurisdiction within which the solution resides. In as much as its uptake is sky rocketing, there is a major challenge in selecting a provider who fits the bill. Most practitioners falsely believe that as long as a data security and privacy is mitigated then all is well. There are many other factors that users should confirm with the provider of their ability before any contract is signed of which this paper discusses. Issues to do with Intellectual property, jurisdiction, and portability of content are mentioned. Disappointed users with failed projects who end up with court cases are also included in the paper.

KEYWORDS
Cloud Computing, Cost Effective Automation, Cloud Providers, Cloud Vendors, Data Security and Privacy, Jurisdiction, Intellectual Property, Portability

Cite This Paper in IEEE or APA Citation Styles
(a). IEEE Format:
[1] Duncan Waga , Kefa Rabah , "Towards a Good Cloud Computing Provider Other Than Choosing through Data Security and Privacy Capability Factor," Computer Science and Information Technology, Vol. 2, No. 5, pp. 232 - 237, 2014. DOI: 10.13189/csit.2014.020502.

(b). APA Format:
Duncan Waga , Kefa Rabah (2014). Towards a Good Cloud Computing Provider Other Than Choosing through Data Security and Privacy Capability Factor. Computer Science and Information Technology, 2(5), 232 - 237. DOI: 10.13189/csit.2014.020502.