Cloud Computing in a Realm of Ever-Increasing Diverse Consumer Expectations Towards Security Challenges that Impact Consumer’s Loyalty: A Data Driven Approach

Jump To References Section

Authors

  • Research Scholar 1*, Associate professor 2 , Department of Management Studies, Ramaiah Institute of Technology, Bengaluru, Karnataka, India 560054. ,IN
  • Research Scholar 1*, Associate professor 2 , Department of Management Studies, Ramaiah Institute of Technology, Bengaluru, Karnataka, India 560054. ,IN

DOI:

https://doi.org/10.18311/jmmf/2023/33760

Keywords:

Cloud Computing, Security Expectation, Consumer Loyalty, Data, CSP, Data location1.

Abstract

Cloud computing had become the new paradigm of the future, as it is the most widely used of all the technologies which are available, allowing consumers to readily maneuver their innovative digital demands. In this study, it is revealed that consumers’ expectations are more inclined towards data security and challenges associated with it but, data storage location was not found too much of importance in consumers mind. Furthermore, terms of service agreement between consumer and cloud service provider with declaration of rights was found to be having an anchoring effect on consumer loyalty. This security level perception in consumers mind was a raised due threat created by cyber hackers, data leaks, data misuse and extortion that frequently happened now and then, these events had spurred negative security and threat perception in minds of consumers. The sample size used in the study for consumer survey is 147. The sample unit consist of consumers and employees working on cloud platforms, regular users of cloud services. Consumers are however expecting a robust security measures with more security practices and also expect more clarity in service agreements terms and conditions, as it clear from our study that 32.3% consumers tend to read those lengthy instruction manuals and also those long cloud service providers service agreements, due to which they end up with correct choices. Results confirms that addressing diverse consumer’s expectation towards security challenges positively influences consumer’s loyalty.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Downloads

Published

2023-05-24

How to Cite

P, R., & T, M. (2023). Cloud Computing in a Realm of Ever-Increasing Diverse Consumer Expectations Towards Security Challenges that Impact Consumer’s Loyalty: A Data Driven Approach. Journal of Mines, Metals and Fuels, 71(3), 464–472. https://doi.org/10.18311/jmmf/2023/33760

Issue

Section

Articles

 

References

Singh, R. (2021): Cloud computing and Covid-19. 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, 552–557. https://doi.org/ 10.1109/ICSPC51351.2021.9451792

Gartner Forecasts Worldwide Public Cloud End-User Spending to Reach Nearly $500 Billion in 2022. (n.d.). Retrieved May 28, 2022, from https://www.gartner.com/en/ newsroom/press-releases/2022-04-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-reach-nearly-500-billion-in-2022 (accessed May 28, 2022).

Rob Barry and Dustin Volz. (n.d.). Ghosts in the Clouds: Inside China’s Major Corporate Hack. Retrieved May 23, 2022, from https://robbarry.org/assets/pdfs/Ghosts in the Clouds.pdf

Popoviæ, K., & Hocenski, •. (2010): Cloud computing security issues and challenges.

Zissis, D., & Lekkas, D. (2012): Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/ J.FUTURE.2010.12.006

Vemula, D. H. L., Khichi, T., Murugesan, G., Valderrama-Plasencia, L., Salazar-Gonzales, M., & Ventayen, R. J. M. (2022): Role of cloud computing and its impact on consumer behavior in financial sector. Materials Today: Proceedings, 51, 2190–2193. https://doi.org/10.1016/ J.MATPR.2021.11.146

Chen, Y., Paxson, V., & Katz, R. H. (2010): What’s New About Cloud Computing Security? http://www.eecs.berkeley.edu/ Pubs/TechRpts/2010/EECS-2010-5.html.

Lee, J. H., Park, M. W., Eom, J. H., and Chung, T. M. (2011, February): Multi-level intrusion detection system and log management in cloud computing. In 13th International Conference on Advanced Communication Technology (ICACT2011) (pp. 552-555). IEEE.

Khan, A. W., Khan, M. U., Khan, J. A., Ahmad, A., Khan, K., Zamir, M., Kim, W. and Ijaz, M. F. (2021): Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach.IEEE Access, 9, 107309–107332.

Vatsa, M., Rastogi, S., Tiwari, A., & Jain, S. (2021): Impacts of Cloud Computing in Digital Marketing. Proceedings of the 5th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2021, 1170–1174.

Jyothi, R. N. S., Sireesha, J., Mahitha, A., Ruchitha, B. and Deepthi, E. (2022): Protection and Saving of Delicate Data by using Cloud Computing. 2022 International Conference on Electronics and Renewable Systems (ICEARS), 1660– 1667. https://doi.org/10.1109/ICEARS53579.2022.9752329.

Alshammari, M. M. (2020): Psychological Dimensions in Trust-Based Models in Cloud Computing. Proceedings -2020 19th Distributed Computing and Applications for Business Engineering and Science, DCABES 2020, 87–91. https://doi.org/10.1109/DCABES50732.2020.00031

Aljumah, A., & Ahanger, T. A. (2018): Fog computing and security issues: A review. 2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings, 237–239. https://doi.org/ 10.1109/ICCCC.2018.8390464

Hay, B., Nance, K., & Bishop, M. (2011): Storm clouds rising: Security challenges for IaaS cloud computing. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.1109/ HICSS.2011.386

Rodero-Merino, L., Vaquero, L. M., Caron, E., Muresan, A., & Desprez, F. (2012): Building safe PaaS clouds: A survey on security in multitenant software platforms. Computers & Security, 31(1), 96–108. https://doi.org/ 10.1016/J.COSE.2011.10.006

Hawedi, M., Talhi, C., & Boucheneb, H. (2018): Security as a Service for Public Cloud Tenants(SaaS). Procedia Computer Science, 130, 1025–1030. https://doi.org/ 10.1016/J.PROCS.2018.04.143

Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062

Tiwari, P. K., & Mishra, B. (2012): Cloud computing security issues, challenges and solution. International journal of emerging technology and advanced engineering, 2(8), 306-310.

Ahmed, A.A., & Hussan, M.I.T. (2018): Adnaan Arbaaz Ahmed, B.Tech Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus. Guru Nanak Institutions Technical Campus, 7(4). https:// www.researchgate.net/publication/33968866.

Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016): Data security in cloud computing. 5th International Conference on Future Generation Communication Technologies, FGCT 2016, 55–59. https://doi.org/10.1109/ FGCT.2016.7605062

Doshi, R., & Kute, V. (2020): A Review Paper on Security Concerns in Cloud Computing and Proposed Security Models. International Conference on Emerging Trends in Information Technology and Engineering, Ic-ETITE 2020. https://doi.org/10.1109/IC-ETITE47903.2020.37

Barona, R., & Anita, E. A. M. (2017): A survey on data breach challenges in cloud computing security: Issues and threats. Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017. https://doi.org/10.1109/ICCPCT.2017.8074287.

Most read articles by the same author(s)