• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Lock-In in Cloud Computing Services

By Abhishek Ghosh January 20, 2013 9:54 pm Updated on January 20, 2013

Lock-In in Cloud Computing Services

Advertisement

Lock-In happens in cloud as in any other sector, the service provider cloud sometimes make the transition out of their platform more difficult than it could be. As like we wrote in Lock in Effect in Todays Technology and Gadgets, the basic target is actually the same for creating Lock-in in Cloud Computing services. A way in which they implement this Lock-in is through the security checks. The goal of security controls is to restrict access to data : this fact makes it easier for a service provider to invoke the safety requirements as an excuse for the fact that they are not able to provide pieces of data fundamental to allow a smooth transition.

 

Lock-In happens in cloud : Checking The Points Again

 

It is important to ask some questions about how security controls are designed so that one can prevent the lock-in in the cloud for a particular cloud service provider. Here are some questions to consider and some strategy to maintain the services that rent and can release and are platform-agnostic. We have divided in to – Who owns your data, Data return policy, Ways of access the data, Ways for access to resources and the cloud computing service model specific points.

 

Lock-In in Cloud Computing Services : The ownership and management of data

 

Who owns your data : An important argument for the ownership of data sent to the service provider. Unless you have agreed by contract that the possession of the data is specifically yours, the answer to who owns them may be less clear than you think. A good service provider recognizes that your data without the need for this to be explicitly requested by the client, but not all do so. It therefore good practice to establish by contract that the ownership of data your remains for the duration of the relationship.

Advertisement

---

Will the service provider will return the data to you ? : Assuming that you have ownership of the data, the question now is how and in what format your service provider will back you these data. One of the problems that can occur is that the data will be returned in a format that is easy to use. Then specify in the contract the format in which you want the data will be returned. Perform tests to verify that the provider can actually meet your requirements.

You can access the data ? : Make sure that any security checks applied to the data – such as encryption – not prevent you from making logical access to data even when you have the physical property. For example, if the data is encrypted you have access to the keys to decrypt them? Also in this case it is necessary to test the processes to be sure of being able to seamlessly access data. Pay attention to database structures that might have cryptography applied to particular elements of the column, as these may not be immediately visible in export and may require intervention by the service provider to provide the keys if encryption is performed at the application level.

How you access to the resources : In the case of IaaS (Infrastructure-as-a-Service), the data in question include virtual images, make sure you have the ability to access at the administrative level is the underlying OS applications. It is not always trivial to gain access when we do not know the administrator password, even when we have physical access. So if your ISP returns the VM images make sure that you can get access to the OS and application level services performed.

Access to user data : You may need additional information in addition to data for your services continue uninterrupted. For example, if your provider uses a datastore that contains information about users (their ID, authentication information), you too need the this information. Make sure you can get back the data as well as user information, as these data could be stored in a separate place than the application data. Test processes that support a smooth transition is a sound strategy to avoid the lock-in of the cloud provider, which is always around the corner.

 

Choice of service model and Lock-In in Cloud Computing Services

 

Lock-In in Cloud Computing Services

 

Understanding Cloud Computing Service Models and Deployment is important for Lock-in. Depending on the type of cloud service you need, it will also change the risk of lock-in. Depending on whether you choose Software-as-a-Service, Platform-as-a-Service or Infrastructure-as-a-Service also changes also the company or individual’s dependence on the cloud service. Obviously it also also depends on the quality of the supplier, but it is certainly less risky to use a service that use a service like IaaS over PaaS or SaaS, in the SaaS the risk of lock-in is significantly higher.

In an IaaS service we have greater flexibility and control of resources, while already PaaS services are likely to close your applications within their platform. Applications designed for a particular PaaS provider can not be transported without radical changes. An IaaS provider as Rackspace Cloud Unmanaged Server gives you the opportunity to go back to migration to cloud any stage and allows for greater portability between providers as the Operating System as well as the server images are compatible with exact setup as most are Free Softwares under GNU GPL or derivatives.

 

Abhishek-Ghosh Tagged With data lock in cloud computing , lock service computing , what is data lock-in in cloud computing

This Article Has Been Shared 360 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Lock-In in Cloud Computing Services

  • Cloud Computing : How it can be your solution

    Cloud Computing becoming more and more in our everyday life and as business solution. Here are some examples on how Cloud Computing can be your solution too.

  • Cloud Computing Open Standards and Interfaces

    Cloud Computing Open Standards and Interfaces promises more flexibility in the cloud. The article explains the benefits of open standards and interfaces.

  • Email Management is the Next Big Aspect of Cloud Computing

    Email Management is the Next Big Aspect of Cloud Computing, a system that we are carrying for past 30 years, maybe their use has changed, has been intensified.

  • Which CDN is Best for Serving Static Contents and Streaming

    Which CDN is Best has one answer – Akamai. Akamai is the global standard and used by IBM to Microsoft. You have to find someone using their infrastructure.

  • Multiple Server Swift Installation : Outline

    Multiple Server OpenStack Swift Installation appears a bit confusing to the new users who wants to create an cloud instance for storage. Here are some tips.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What Online Casinos Have No Deposit Bonus in Australia March 30, 2023
  • Four Foolproof Tips To Never Run Out Of Blog Ideas For Your Website March 28, 2023
  • The Interactive Entertainment Serving as a Tech Proving Ground March 28, 2023
  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023
  • Advantages of Cloud Server Over Dedicated Server for Hosting WordPress March 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Lock-In in Cloud Computing Services," in The Customize Windows, January 20, 2013, March 31, 2023, https://thecustomizewindows.com/2013/01/lock-in-in-cloud-computing-services/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT