• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Lock-In in Cloud Computing Services

By Abhishek Ghosh January 20, 2013 9:54 pm Updated on January 20, 2013

Lock-In in Cloud Computing Services

Advertisement

Lock-In happens in cloud as in any other sector, the service provider cloud sometimes make the transition out of their platform more difficult than it could be. As like we wrote in Lock in Effect in Todays Technology and Gadgets, the basic target is actually the same for creating Lock-in in Cloud Computing services. A way in which they implement this Lock-in is through the security checks. The goal of security controls is to restrict access to data : this fact makes it easier for a service provider to invoke the safety requirements as an excuse for the fact that they are not able to provide pieces of data fundamental to allow a smooth transition.

 

Lock-In happens in cloud : Checking The Points Again

 

It is important to ask some questions about how security controls are designed so that one can prevent the lock-in in the cloud for a particular cloud service provider. Here are some questions to consider and some strategy to maintain the services that rent and can release and are platform-agnostic. We have divided in to – Who owns your data, Data return policy, Ways of access the data, Ways for access to resources and the cloud computing service model specific points.

 

Lock-In in Cloud Computing Services : The ownership and management of data

 

Who owns your data : An important argument for the ownership of data sent to the service provider. Unless you have agreed by contract that the possession of the data is specifically yours, the answer to who owns them may be less clear than you think. A good service provider recognizes that your data without the need for this to be explicitly requested by the client, but not all do so. It therefore good practice to establish by contract that the ownership of data your remains for the duration of the relationship.

Advertisement

---

Will the service provider will return the data to you ? : Assuming that you have ownership of the data, the question now is how and in what format your service provider will back you these data. One of the problems that can occur is that the data will be returned in a format that is easy to use. Then specify in the contract the format in which you want the data will be returned. Perform tests to verify that the provider can actually meet your requirements.

You can access the data ? : Make sure that any security checks applied to the data – such as encryption – not prevent you from making logical access to data even when you have the physical property. For example, if the data is encrypted you have access to the keys to decrypt them? Also in this case it is necessary to test the processes to be sure of being able to seamlessly access data. Pay attention to database structures that might have cryptography applied to particular elements of the column, as these may not be immediately visible in export and may require intervention by the service provider to provide the keys if encryption is performed at the application level.

How you access to the resources : In the case of IaaS (Infrastructure-as-a-Service), the data in question include virtual images, make sure you have the ability to access at the administrative level is the underlying OS applications. It is not always trivial to gain access when we do not know the administrator password, even when we have physical access. So if your ISP returns the VM images make sure that you can get access to the OS and application level services performed.

Access to user data : You may need additional information in addition to data for your services continue uninterrupted. For example, if your provider uses a datastore that contains information about users (their ID, authentication information), you too need the this information. Make sure you can get back the data as well as user information, as these data could be stored in a separate place than the application data. Test processes that support a smooth transition is a sound strategy to avoid the lock-in of the cloud provider, which is always around the corner.

 

Choice of service model and Lock-In in Cloud Computing Services

 

Lock-In in Cloud Computing Services

 

Understanding Cloud Computing Service Models and Deployment is important for Lock-in. Depending on the type of cloud service you need, it will also change the risk of lock-in. Depending on whether you choose Software-as-a-Service, Platform-as-a-Service or Infrastructure-as-a-Service also changes also the company or individual’s dependence on the cloud service. Obviously it also also depends on the quality of the supplier, but it is certainly less risky to use a service that use a service like IaaS over PaaS or SaaS, in the SaaS the risk of lock-in is significantly higher.

In an IaaS service we have greater flexibility and control of resources, while already PaaS services are likely to close your applications within their platform. Applications designed for a particular PaaS provider can not be transported without radical changes. An IaaS provider as Rackspace Cloud Unmanaged Server gives you the opportunity to go back to migration to cloud any stage and allows for greater portability between providers as the Operating System as well as the server images are compatible with exact setup as most are Free Softwares under GNU GPL or derivatives.

 

Abhishek-Ghosh Tagged With data lock in cloud computing , lock service computing , what is data lock-in in cloud computing

This Article Has Been Shared 170 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Lock-In in Cloud Computing Services

  • Cloud Computing : How it can be your solution

    Cloud Computing becoming more and more in our everyday life and as business solution. Here are some examples on how Cloud Computing can be your solution too.

  • Cloud Computing Open Standards and Interfaces

    Cloud Computing Open Standards and Interfaces promises more flexibility in the cloud. The article explains the benefits of open standards and interfaces.

  • Email Management is the Next Big Aspect of Cloud Computing

    Email Management is the Next Big Aspect of Cloud Computing, a system that we are carrying for past 30 years, maybe their use has changed, has been intensified.

  • Which CDN is Best for Serving Static Contents and Streaming

    Which CDN is Best has one answer – Akamai. Akamai is the global standard and used by IBM to Microsoft. You have to find someone using their infrastructure.

  • Multiple Server Swift Installation : Outline

    Multiple Server OpenStack Swift Installation appears a bit confusing to the new users who wants to create an cloud instance for storage. Here are some tips.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (21K Followers)
  • Twitter (5.3k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Why Not to Use Your Host for Email Marketing March 5, 2021
  • What You Need to Know About the Microservices March 4, 2021
  • Fix Missing/Bad FileProvider for Freshchat (Android error code 354) March 3, 2021
  • Basics of Data Protection on the Internet March 2, 2021
  • What is Standard Software February 28, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Lock-In in Cloud Computing Services," in The Customize Windows, January 20, 2013, March 6, 2021, https://thecustomizewindows.com/2013/01/lock-in-in-cloud-computing-services/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy