Mobile Computing - Technology and Applications 2018
DOI: 10.5772/intechopen.74459
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of Cloud Lock-in Challenges

Abstract: This chapter reviews key concepts and terminologies needed for understanding the complexity of the vendor lock-in problem being investigated in this book. Firstly, we present aspects of cloud computing that contribute to vendor lock-in and briefly introduce existing results from cloud-related areas of computer science that contributes to understanding and tackling vendor lock-in. Secondly, we explore the literature on proprietary lock-in risks in cloud computing environments to identify its causes (i.e., restr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Vendors' lock-in reliance is also an aspect that need examination as the analysts may excessively depend on the basis or the system of the particular provider which is ineffective and a matter which does not allow innovation in technology handling. [14], [15] On the contrary to the specific viewpoint of the Secure confirmation and section control systems, the matter is very serious as it affects the integrity of the information. Examples of common login tasks include the use of weak username-password combinations which can be used to crack passwords, while the lax controls on information can also lead to unauthorized access and alterations.…”
Section: Iiliterature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Vendors' lock-in reliance is also an aspect that need examination as the analysts may excessively depend on the basis or the system of the particular provider which is ineffective and a matter which does not allow innovation in technology handling. [14], [15] On the contrary to the specific viewpoint of the Secure confirmation and section control systems, the matter is very serious as it affects the integrity of the information. Examples of common login tasks include the use of weak username-password combinations which can be used to crack passwords, while the lax controls on information can also lead to unauthorized access and alterations.…”
Section: Iiliterature Reviewmentioning
confidence: 99%
“…This happens when a company announces their own proprietary solution for technology which hampers the user from switching to another supplier. [14], [15]…”
Section: Vendor Lock-inmentioning
confidence: 99%
“…Users who experience difficulty transferring data between cloud providers raise concerns regarding vendor lock-in and highlight the challenge of data portability. Selecting cloud services that actively promote data portability and conform to open standards is advised in order to solve this problem [71], [72]. Users can help to ensure more seamless data migration procedures by giving priority to these features.…”
Section: Data Portability and Vendor Lock-inmentioning
confidence: 99%
“…[3] examined cloud computing migration from a business perspective. [4] created a model for classifying lock-in risk factors. Literature shows that vendor lock-in may introduce risks to a system in the following areas:…”
Section: Vendor Lock-in In Cloud-based Software Productsmentioning
confidence: 99%