Cloud Computing in a Realm of Ever-Increasing Diverse Consumer Expectations Towards Security Challenges that Impact Consumer’s Loyalty: A Data Driven Approach
DOI:
https://doi.org/10.18311/jmmf/2023/33760Keywords:
Cloud Computing, Security Expectation, Consumer Loyalty, Data, CSP, Data location1.Abstract
Cloud computing had become the new paradigm of the future, as it is the most widely used of all the technologies which are available, allowing consumers to readily maneuver their innovative digital demands. In this study, it is revealed that consumers’ expectations are more inclined towards data security and challenges associated with it but, data storage location was not found too much of importance in consumers mind. Furthermore, terms of service agreement between consumer and cloud service provider with declaration of rights was found to be having an anchoring effect on consumer loyalty. This security level perception in consumers mind was a raised due threat created by cyber hackers, data leaks, data misuse and extortion that frequently happened now and then, these events had spurred negative security and threat perception in minds of consumers. The sample size used in the study for consumer survey is 147. The sample unit consist of consumers and employees working on cloud platforms, regular users of cloud services. Consumers are however expecting a robust security measures with more security practices and also expect more clarity in service agreements terms and conditions, as it clear from our study that 32.3% consumers tend to read those lengthy instruction manuals and also those long cloud service providers service agreements, due to which they end up with correct choices. Results confirms that addressing diverse consumer’s expectation towards security challenges positively influences consumer’s loyalty.
Downloads
Metrics
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Singh, R. (2021): Cloud computing and Covid-19. 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, 552–557. https://doi.org/ 10.1109/ICSPC51351.2021.9451792
Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $500 Billion in 2022. (n.d.). Retrieved May 28, 2022, from https://www.gartner.com/en/ newsroom/press-releases/2022-04-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-reach-nearly-500-billion-in-2022 (accessed May 28, 2022).
Rob Barry and Dustin Volz. (n.d.). Ghosts in the Clouds: Inside China’s Major Corporate Hack. Retrieved May 23, 2022, from https://robbarry.org/assets/pdfs/Ghosts in the Clouds.pdf
Popoviæ, K., & Hocenski, •. (2010): Cloud computing security issues and challenges.
Zissis, D., & Lekkas, D. (2012): Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/ J.FUTURE.2010.12.006
Vemula, D. H. L., Khichi, T., Murugesan, G., Valderrama-Plasencia, L., Salazar-Gonzales, M., & Ventayen, R. J. M. (2022): Role of cloud computing and its impact on consumer behavior in financial sector. Materials Today: Proceedings, 51, 2190–2193. https://doi.org/10.1016/ J.MATPR.2021.11.146
Chen, Y., Paxson, V., & Katz, R. H. (2010): What’s New About Cloud Computing Security? http://www.eecs.berkeley.edu/ Pubs/TechRpts/2010/EECS-2010-5.html.
Lee, J. H., Park, M. W., Eom, J. H., and Chung, T. M. (2011, February): Multi-level intrusion detection system and log management in cloud computing. In 13th International Conference on Advanced Communication Technology (ICACT2011) (pp. 552-555). IEEE.
Khan, A. W., Khan, M. U., Khan, J. A., Ahmad, A., Khan, K., Zamir, M., Kim, W. and Ijaz, M. F. (2021): Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach.IEEE Access, 9, 107309–107332.
Vatsa, M., Rastogi, S., Tiwari, A., & Jain, S. (2021): Impacts of Cloud Computing in Digital Marketing. Proceedings of the 5th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2021, 1170–1174.
Jyothi, R. N. S., Sireesha, J., Mahitha, A., Ruchitha, B. and Deepthi, E. (2022): Protection and Saving of Delicate Data by using Cloud Computing. 2022 International Conference on Electronics and Renewable Systems (ICEARS), 1660– 1667. https://doi.org/10.1109/ICEARS53579.2022.9752329.
Alshammari, M. M. (2020): Psychological Dimensions in Trust-Based Models in Cloud Computing. Proceedings -2020 19th Distributed Computing and Applications for Business Engineering and Science, DCABES 2020, 87–91. https://doi.org/10.1109/DCABES50732.2020.00031
Aljumah, A., & Ahanger, T. A. (2018): Fog computing and security issues: A review. 2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings, 237–239. https://doi.org/ 10.1109/ICCCC.2018.8390464
Hay, B., Nance, K., & Bishop, M. (2011): Storm clouds rising: Security challenges for IaaS cloud computing. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.1109/ HICSS.2011.386
Rodero-Merino, L., Vaquero, L. M., Caron, E., Muresan, A., & Desprez, F. (2012): Building safe PaaS clouds: A survey on security in multitenant software platforms. Computers & Security, 31(1), 96–108. https://doi.org/ 10.1016/J.COSE.2011.10.006
Hawedi, M., Talhi, C., & Boucheneb, H. (2018): Security as a Service for Public Cloud Tenants(SaaS). Procedia Computer Science, 130, 1025–1030. https://doi.org/ 10.1016/J.PROCS.2018.04.143
Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062
Tiwari, P. K., & Mishra, B. (2012): Cloud computing security issues, challenges and solution. International journal of emerging technology and advanced engineering, 2(8), 306-310.
Ahmed, A.A., & Hussan, M.I.T. (2018): Adnaan Arbaaz Ahmed, B.Tech Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus. Guru Nanak Institutions Technical Campus, 7(4). https:// www.researchgate.net/publication/33968866.
Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062
Doshi, R., & Kute, V. (2020): A Review Paper on Security Concerns in Cloud Computing and Proposed Security Models. International Conference on Emerging Trends in Information Technology and Engineering, Ic-ETITE 2020. https://doi.org/10.1109/IC-ETITE47903.2020.37
Barona, R., & Anita, E. A. M. (2017): A survey on data breach challenges in cloud computing security: Issues and threats. Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017. https://doi.org/10.1109/ICCPCT.2017.8074287.