Dimensions Of Security Threats In Cloud Computing: A Case Study

Even though cloud computing, as a model, is not new, organizations are increasingly implementing it because of its large-scale computation and data storage, flexible scalability, relative reliability, and cost economy of services. However, despite its rapid adoption in some sectors and domains, it is evident from research and statistics, that security-related threats are the most noticeable barrier to its widespread adoption. To investigate the reasons behind these threats, the authors used available literature to identify and aggregate information about IS security threats in cloud computing. Based on this information, the authors explored the dimensions of the nature of threat by interviewing a cloud computing practitioner in an organization that uses both the private and public cloud deployment models. From these findings, the authors found that IS security threats in cloud computing must be defined at different levels; namely, at the business and technical level, as well as from a generic and cloud-specific threat perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix (CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully comprehend the concerns so that they can make relevant decisions while availing cloud computing services.

[1]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[2]  James P. Lawler,et al.  A Case Study Of Determinants Of An Effective Cloud Computing Strategy , 2012, BIS 2012.

[3]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.

[4]  R. Stake Qualitative Case Studies. , 2005 .

[5]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[6]  R. Yin Case Study Research: Design and Methods , 1984 .

[7]  Katie Wood,et al.  Exploring security issues in cloud computing , 2012, UKAIS.

[8]  Jawaharlal Darda,et al.  Survey On Cloud Computing , 2013 .

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[11]  Sankalp Jain,et al.  PRIVATE CLOUD INITIATIVES USING BIOINFORMATICS RESOURCES AND APPLICATIONS FACILITY (BRAF) , 2012, CloudCom 2012.

[12]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[13]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[14]  Mary Tate,et al.  A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..

[15]  Tanveer A. Zia,et al.  An empirical study of challenges in managing the security in cloud computing , 2011, AISM 2011.

[16]  Mathias Mujinga,et al.  Cloud computing concerns in developing economies , 2011 .