TY - GEN
T1 - Cloud computing data breaches a socio-technical review of literature
AU - Kolevski, David
AU - Michael, Katina
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/12
Y1 - 2016/1/12
N2 - As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.
AB - As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.
KW - cloud computing
KW - literature review
KW - privacy
KW - regulation
KW - security
KW - socio-technical
UR - http://www.scopus.com/inward/record.url?scp=84966546478&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84966546478&partnerID=8YFLogxK
U2 - 10.1109/ICGCIoT.2015.7380702
DO - 10.1109/ICGCIoT.2015.7380702
M3 - Conference contribution
AN - SCOPUS:84966546478
T3 - Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015
SP - 1486
EP - 1495
BT - Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015
Y2 - 8 October 2015 through 10 October 2015
ER -