Cloud Computing Data Breaches A socio-technical review of literature

被引:0
作者
Kolevski, David [1 ]
Michael, Katina [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
来源
2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT) | 2015年
关键词
cloud computing; socio-technical; security; privacy; regulation; literature review; SECURITY ISSUES; PRIVACY; CHALLENGES; FRAMEWORK; PROTECTION; LIMITS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.
引用
收藏
页码:1486 / 1495
页数:10
相关论文
共 62 条
[1]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[2]   How much privacy do clouds provide? An Australian perspective [J].
Adrian, Angela .
COMPUTER LAW & SECURITY REVIEW, 2013, 29 (01) :48-57
[3]   Bridging the gap between legal and technical contracts [J].
Arenas, Alvaro ;
Wilson, Michael ;
Crompton, Shirley ;
Cojocarasu, Dana ;
Mahler, Tobias ;
Schubert, Lutz .
IEEE INTERNET COMPUTING, 2008, 12 (02) :13-19
[4]  
Australian Law Reform Commission, 2008, Report No 108., V2, P1572
[5]  
Baset Salman A., 2012, Operating Systems Review, V46, P57, DOI 10.1145/2331576.2331586
[6]  
Baun C, 2011, CLOUD COMPUTING: WEB-BASED DYNAMIC IT SERVICES, P1, DOI 10.1007/978-3-642-20917-8
[7]   Opportunities and risks of software-as-a-service: Findings from a survey of IT executives [J].
Benlian, Alexander ;
Hess, Thomas .
DECISION SUPPORT SYSTEMS, 2011, 52 (01) :232-246
[8]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[9]  
Chen D., 2012, P 2012 INT C COMP SC
[10]  
Chorafas DimitrisN., 2011, Cloud computing strategies