Cloud computing data breaches a socio-technical review of literature

David Kolevski, Katina Michael

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.

Original languageEnglish (US)
Title of host publicationProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1486-1495
Number of pages10
ISBN (Electronic)9781467379090
DOIs
StatePublished - Jan 12 2016
Externally publishedYes
Event1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015 - Greater Noida, Delhi, India
Duration: Oct 8 2015Oct 10 2015

Publication series

NameProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015

Conference

Conference1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015
CountryIndia
CityGreater Noida, Delhi
Period10/8/1510/10/15

Fingerprint

Cloud computing
Industry
Data privacy
Availability
Processing

Keywords

  • cloud computing
  • literature review
  • privacy
  • regulation
  • security
  • socio-technical

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Kolevski, D., & Michael, K. (2016). Cloud computing data breaches a socio-technical review of literature. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015 (pp. 1486-1495). [7380702] (Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICGCIoT.2015.7380702

Cloud computing data breaches a socio-technical review of literature. / Kolevski, David; Michael, Katina.

Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015. Institute of Electrical and Electronics Engineers Inc., 2016. p. 1486-1495 7380702 (Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kolevski, D & Michael, K 2016, Cloud computing data breaches a socio-technical review of literature. in Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015., 7380702, Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, Institute of Electrical and Electronics Engineers Inc., pp. 1486-1495, 1st International Conference on Green Computing and Internet of Things, ICGCIoT 2015, Greater Noida, Delhi, India, 10/8/15. https://doi.org/10.1109/ICGCIoT.2015.7380702
Kolevski D, Michael K. Cloud computing data breaches a socio-technical review of literature. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015. Institute of Electrical and Electronics Engineers Inc. 2016. p. 1486-1495. 7380702. (Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015). https://doi.org/10.1109/ICGCIoT.2015.7380702
Kolevski, David ; Michael, Katina. / Cloud computing data breaches a socio-technical review of literature. Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 1486-1495 (Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015).
@inproceedings{b0756caaf5a24f93b3c34a49f1793f3f,
title = "Cloud computing data breaches a socio-technical review of literature",
abstract = "As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.",
keywords = "cloud computing, literature review, privacy, regulation, security, socio-technical",
author = "David Kolevski and Katina Michael",
year = "2016",
month = "1",
day = "12",
doi = "10.1109/ICGCIoT.2015.7380702",
language = "English (US)",
series = "Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1486--1495",
booktitle = "Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015",

}

TY - GEN

T1 - Cloud computing data breaches a socio-technical review of literature

AU - Kolevski, David

AU - Michael, Katina

PY - 2016/1/12

Y1 - 2016/1/12

N2 - As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.

AB - As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised.

KW - cloud computing

KW - literature review

KW - privacy

KW - regulation

KW - security

KW - socio-technical

UR - http://www.scopus.com/inward/record.url?scp=84966546478&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84966546478&partnerID=8YFLogxK

U2 - 10.1109/ICGCIoT.2015.7380702

DO - 10.1109/ICGCIoT.2015.7380702

M3 - Conference contribution

AN - SCOPUS:84966546478

T3 - Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015

SP - 1486

EP - 1495

BT - Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -