Clustering Goal-Driven Security Factors for Protecting Data in Cloud Storage using Exploratory Factor Analysis (EFA): An Empirical Study

The purpose of this paper is to explore the important security factors for protecting data in cloud storage from the perspective of security practitioners. The study consist of 43 security variables (or indicator items) from a survey participated by security practitioners in Malaysia. Exploratory factor analysis (EFA) is conducted to understand the clusters of variables (or indicator items) and the inter-relationships constructing the security factors (or components). Most of the respondents are from public sector organisations (government and higher education organisations) in Malaysia. The clusters of variables resulting from this analysis can be used as a reference for security practitioners planning to produce security policies to protect data stored in a cloud storage. The top security factors identified from this study are shown in terms of policy implementation and controls in confidentiality, integrity, availability, non-repudiation, authenticity, reliability, accountability and auditability of data services in cloud storage.

[1]  An Gie Yong,et al.  A Beginner's Guide to Factor Analysis: Focusing on Exploratory Factor Analysis , 2013 .

[2]  Polly Yeung,et al.  SPSS survival manual. A step by step guide to data analysis using IBM SPSS (5th ed) [Book Review] , 2014 .

[3]  Andreia Malucelli,et al.  An analysis of the factors determining software product quality: A comparative study , 2016, Comput. Stand. Interfaces.

[4]  J. Pallant SPSS survival manual : a step-by-step guide to data analysis using SPSS version 15 , 2007 .

[5]  H. Kaiser An index of factorial simplicity , 1974 .

[6]  Riccardo Scandariato,et al.  The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models , 2017, IEEE Transactions on Reliability.

[7]  Curtis R. Cook,et al.  Use of Factor Analysis to Develop OOP Software Complexity Metrics , 1994 .

[8]  Gary B. Wills,et al.  Goal-based security components for cloud storage security framework: a preliminary study , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).

[9]  Carl J. Huberty,et al.  Multivariate Analysis of Variance and Covariance , 2000 .

[10]  G. B. Wills,et al.  Factor Analysis: Investigating Important Aspects for Agile Adoption in Malaysia , 2012, 2012 Agile India.

[11]  J. Hair Multivariate data analysis : a global perspective , 2010 .

[12]  Robert Russell,et al.  A Beginner's Guide , 2016 .

[13]  Parimal Mukhopadhyay Multivariate Analysis of Variance and Covariance , 2008 .

[14]  Andy P. Field,et al.  Discovering Statistics Using Ibm Spss Statistics , 2017 .