Cloud computing data breaches a socio-technical review of literature

David Kolevski, Katina Michael

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.

Original languageEnglish (US)
Title of host publicationProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1486-1495
Number of pages10
ISBN (Electronic)9781467379090
DOIs
StatePublished - Jan 12 2016
Externally publishedYes
Event1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015 - Greater Noida, Delhi, India
Duration: Oct 8 2015Oct 10 2015

Publication series

NameProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015

Conference

Conference1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015
Country/TerritoryIndia
CityGreater Noida, Delhi
Period10/8/1510/10/15

Keywords

  • cloud computing
  • literature review
  • privacy
  • regulation
  • security
  • socio-technical

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Cloud computing data breaches a socio-technical review of literature'. Together they form a unique fingerprint.

Cite this