Data Risks in the Cloud

Cloudsourcing involves considerably greater risks to data than do insourcing or conventional outsourcing. A generic data risk assessment identifies key concerns in relation to harm arising from threats impinging on vulnerabilities in the cloud. Guidance is provided as to appropriate safeguards to address those risks. Most services lack those safeguards, implying that individuals and user organisations need to be far more careful in their use of cloud services.

[1]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..

[2]  Roger Clarke The Cloudy Future of Consumer Computing , 2011, Bled eConference.

[3]  J. Initiative SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .

[4]  Roger Clarke,et al.  A Framework for the Evaluation o f CloudSourcing Proposals , 2012, Bled eConference.

[5]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[6]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[7]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[8]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[9]  David K. Chiabi European Telecommunications Standards Institute , 2015 .

[10]  David Molnar,et al.  Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud , 2010, WEIS.

[11]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[12]  Indrit Troshani,et al.  Cloud Nine? An Integrative Risk Management Framework for Cloud Computing , 2011, Bled eConference.

[13]  Roger Clarke,et al.  Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.

[14]  Alexander Benlian,et al.  Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development , 2012, ICIS.

[15]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[16]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[17]  Ralf Steinmetz,et al.  European Conference on Information Systems ( ECIS ) Summer 10-6-2011 TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS : SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION , 2017 .

[18]  Susan P. Williams,et al.  Managing Information Risks and Protecting Information Assets in a Web 2.0 Era , 2010, Bled eConference.

[19]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[20]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[21]  Donald Firesmith,et al.  Specifying Reusable Security Requirements , 2004, J. Object Technol..

[22]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[23]  Roger Clarke How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..

[24]  Roger Clarke,et al.  A Framework for the Evaluation of CloudSourcing Proposals , 2012 .

[25]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .