provided at a provider's website. Our contention is
that being transparent can be a business advantage,
and that cloud customers who are concerned with,
e.g., privacy of the data they put into the cloud, will
choose providers who can demonstrate transparency
over providers who cannot.
Our study increases the body of knowledge on the
criteria needed for more accountable and transparent
cloud services, and confirms the results from previous
studies on these criteria. The list of requirements in
Table 2 complements, in part, the existing criteria.
An area for future research is to further evaluate
how cloud providers currently make the information
required by cloud customers available. In addition,
what are the effects of having transparent services in
terms of costs and benefits to cloud customers and
providers. Besides, we plan to increase the number of
participants responding to our interview guide and
adding strength to the evidence provided in this paper.
Another aspect we would like to investigate, is if the
results will be different for users of the different types
of services (e.g., SaaS vs IaaS).
ACKNOWLEDGEMENTS
This paper is based on joint research in the EU FP7
A4CLOUD project, grant agreement no: 317550.
REFERENCES
AbuKhousa, E., Mohamed, N., and Al-Jaroodi, J., “e-health
cloud: Opportunities and challenges,” Future Internet,
vol. 4, no. 3, pp. 621–645, 2012.
Ahuja, S. P., Mani, S. and Zambrano, J., “A Survey of the
State of Cloud Computing in Healthcare,” Network and
Communication Technologies, vol. 1, no. 2, p. 12,
2012.
Alnemr, R., Pearson, S., Leenes, R., and Mhungu, R.,
“COAT: Cloud Offerings Advisory Tool”. Proc. of the
2014 IEEE International Conference on Cloud
Computing Technology and Science (CloudCom 2014)
95-100, 2014.
Azraoui, M., Elkhiyaoui, K., Önen, M., Bernsmed, K.,
Sendor, J., and Santana de Oliveira, A., “A-PPL: An
accountability policy language”, in DPM, 9th
International Workshop on Data Privacy Management,
10 September 2014.
Bernsmed, K., Tountopoulos, V., Brigden, P., Rübsamen,
T., Felici, M., Wainwright, N., Santana De Oliveira, A.,
Sendor, J., Sellami, M., and Royer, J.-C., “Consolidated
use case report”, A4Cloud Deliverable D23.2, October
2014 http://www.a4cloud.eu/sites/default/files/D23.2%
20Consolidated%20use%20case%20report.pdf.
Cruzes, D. S. and Dybå, T., Recommended Steps for
Thematic Synthesis in Software Engineering. ESEM
2011: 275-284, 2011.
Durkee, D., Why cloud computing will never be free.
Commun. ACM 53(5): 62-69 , 2010.
Felici, M., Koulouris, T. and Pearson, S., “Accountability
for Data Governance in Cloud Ecosystems”, Proc. of
the 2013 IEEE International Conference on Cloud
Computing Technology and Science (CloudCom
2013), 2013.
Fischer-Hübner, S., Angulo, J., and Pulls, T., “How can
Cloud Users be Supported in Deciding on, Tracking and
Controlling How their Data are Used?”, Privacy and
Identity Management for Emerging Services and
Technologies, IFIP Advances in Information and
Communication Technology Vol. 421, 2014, pp 77-92.
Gavrilov, G. and Trajkovik V., “Security and privacy issues
and requirements for healthcare cloud computing,” in
Proceedings of ICT Innovations, 2012.
Hon, W.K., Millard, C. and Walden, I., “Negotiating Cloud
Contracts - Looking at Clouds from Both Sides Now”
(May 9, 2012). 16 STAN. TECH. L. REV. 81 (2012);
Queen Mary School of Law Legal Studies Research
Paper No. 117/2012.
Jaatun, M.G., Bernsmed, K., and Undheim, A.: "Security
SLAs – an idea whose time has come?", Proc. CD-
ARES, Prague, LNCS Volume 7465, pp 123-130, 2012.
Jaatun, M.G., Pearson, S., Gittler, F., and Leenes, R.,
“Towards Strong Accountability for Cloud Service
Providers”, Proc. of the 2014 IEEE International
Conference on Cloud Computing Technology and
Science (CloudCom 2014), 2014.
Khorshed, M. T., Ali, A.S. and Wasimi, S.A.: A survey on
gaps, threat remediation challenges and some thoughts
for proactive attack detection in cloud computing.
Future Gener. Comput. Syst. 28(6), 833–851 (2012).
Kuo, A. M.-H., “Opportunities and challenges of cloud
computing to improve health care services,” J. Med.
Internet Res., vol. 13, no. 3, p. e67, 2011.
Onwubiko, C., (2010) "Security Issues to Cloud
Computing", in Cloud Computing: Principles, Systems
& Applications, (Eds) Nick Antonopoulos and Lee
Gillam, Springer-Verlag, August, 2010.
Paquette S., Jaegar, P. T. and Wilson, S. C. Identifying the
security risks associated with governmental use of
cloud computing, Journal of Government Information
Quarterly 27, pages 245-253, April, 2010.
Pauley, W.A., “Cloud Provider Transparency: An
Empirical Evaluation,” IEEE Security & Privacy (8)6,
pp. 32– 39, 2010.
Rodrigues, J. J., Torre, I. de la, Fernandez, G., and Lopez-
Coronado, M., “Analysis of the security and privacy
requirements of cloud-based electronic health records
systems,” J. Med. Internet Res., vol. 15, no. 8, p. e186,
2013.
Yang, H. and Tate, M., "A Descriptive Literature Review
and Classification of Cloud Computing Research,"
Communications of the Association for Information
Systems: Vol. 31, Article 2, 2012.
CloudProviderTransparency-AViewfromCloudCustomers
39