Article citationsMore >>

Chiregi, M., & Navimipour, N. J. (2016). Trusted services identification in the cloud environment using the topological metrics. Karbala International Journal of Modern Science, 2(3), 203-210.

has been cited by the following article:

Article

Trust and Continuous Deployment of Cloud Computing: A Quantitative Analysis

1Department of Computer Science, Software Development and Security, University of Maryland University College, Largo, USA


Journal of Computer Sciences and Applications. 2018, Vol. 6 No. 2, 69-74
DOI: 10.12691/jcsa-6-2-3
Copyright © 2018 Science and Education Publishing

Cite this paper:
Kunle Elebute. Trust and Continuous Deployment of Cloud Computing: A Quantitative Analysis. Journal of Computer Sciences and Applications. 2018; 6(2):69-74. doi: 10.12691/jcsa-6-2-3.

Correspondence to: Kunle  Elebute, Department of Computer Science, Software Development and Security, University of Maryland University College, Largo, USA. Email: princekay123@gmail.com

Abstract

In recent time, many studies have investigated the criteria that should guide a user when selecting a trustworthy cloud service provider. Similarly, factors influencing the user’s decision to adopt cloud computing have been exhaustively discussed. However, it is still unclear if there is a correlation between a user’s trust in the capability of a cloud provider and the user’s decision to continuously deploy cloud computing. Using a multinomial logistic regression, this study analyzed responses from 176 information technology managers who were currently using cloud computing as at the time of the study. Results from the data analysis indicated a negative relationship between a user’s trust in the capability of a cloud provider and the user’s decision to continuously deploy cloud computing. Consequently, a cloud user who does not trust the capability of a cloud provider will be unwilling to continuously deploy cloud computing regardless of the benefits of the cloud platform. This study recommended a synergy between cloud users and cloud providers to bridge trust gaps and develop security plans and policies that will effectively tackle cyber-threats.

Keywords