Abstract
This chapter shifts focus to the technology and discusses the use of cloud computing and how this is a trend that has many positive aspects for its users. However, the idea of trust comes into play because cloud computing technology is a very abstract concept for many users, and details of its operation are often not revealed. The chapter discusses the technology overall, but quickly shifts focus to a specific example and explores the interaction between a cloud provider and a cloud user from the perspective of trust. Trust between the two interacting parties can affect the user positive experience. This is even a bigger factor when considering a recurring interaction, or an interaction that is continuous over time. The chapter focuses mainly on the perspective of the user. The cloud provider is also significant in the discussion, as well as the elements of chance and overall policy. The overall aim is to discuss the motivation for an interaction that will provide a positive experience for the user and a positive payoff for the cloud service provider, as the interaction progresses in time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Antoniou J (2019) Using game theory to address new security risks in the IoT. In: ‘Game Theory, the Internet of Things and 5G Networks’, part of the: ‘EAI/Springer Innovations in Communication and Computing’ book series, Springer, https://doi.org/10.1007/978-3-030-16844-5_2
Bello SA, Wakil GA (2014) Flexible pricing models for cloud services. Tans Netw Commun 2(5). https://doi.org/10.14738/tnc.25.281
Chang, V., Bacigalupo, D., Wills, G., De Roure, D. (2010). A categorisation of cloud computing business models. In Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, Melbourne, VIC, 2010, pp 509–512
Chang V, Walters RJ, Wills G (2013) The development that leads to the cloud computing business framework. Int J Inf Manag 33(3):524–538. ISSN 0268-4012, https://doi.org/10.1016/j.ijinfomgt.2013.01.005
Hashizume K, Rosado DG, Fernandez-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(5) Springer, https://doi.org/10.1186/1869-0238-4-5
McLelland R, Hackett Y, Hurley G, Collins D (2014) Agreements between cloud service providers and their clients: a review of contract terms. In Proceedings of Arxius i Industries Culturals conference, Girona, October 2014
Hsu P-F, Ray S, Li-Hsieh Y-Y (2014) Examining cloud computing adoption intention, pricing mechanism, and deployment model. Int J Inf Manag 34(4):474–488. ISSN 0268-4012
Perez-Botero D, Szefer J, Lee RB (2013) Characterizing hypervisor vulnerabilities in cloud computing servers. Proceedings of the 2013 International Workshop on security in Cloud Computing, pp 3–10, https://doi.org/10.1145/2484402.2484406
Szefer J, Keller E, Lee RB (2011) Eliminating the hypervisor attack surface for a more secure Cloud. Proceedings of the 18th ACM Conference on Computer and Communications Security, pp 401–412., https://doi.org/10.1145/2046707.2046754
Wall M (2016) Can we Trust Cloud Providers to keep our data safe?, Technology of Business, BBC News, published on 29 April 2016. [Online] https://www.bbc.com/news/business-36151754
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Antoniou, J. (2021). Cloud Computing: Considering Trust as Part of the User Quality of Experience. In: Quality of Experience and Learning in Information Systems. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-52559-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-52559-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52558-3
Online ISBN: 978-3-030-52559-0
eBook Packages: EngineeringEngineering (R0)