scholarly journals Cybersecurity threats in cloud computing

Author(s):  
Julian Jang Jaccard

Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.   

Author(s):  
Julian Jang Jaccard

Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.   


2020 ◽  
pp. 0032258X2096858
Author(s):  
Alexander E Carter ◽  
Mariea Hoy ◽  
Betsy Byrne DeSimone

Despite law enforcement’s best efforts to use social media as a means of community policing, some engagement tactics may lead citizens to disclose personally identifiable information (PII). We coded 200 tweets with the popular #9PMRoutine that tagged @PascoSheriff (Florida) for participant PII. We found numerous postings of adults’ and children’s PII that are problematic including pictures, health information and security-related comments about their routines or vacations. Implications for law enforcement to protect their communities are discussed as well as opportunities to continue to cultivate their online relationships in a more secure forum. We also provide future research directions.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Info ◽  
2016 ◽  
Vol 18 (3) ◽  
pp. 42-57 ◽  
Author(s):  
Daeho Lee ◽  
Dong-Hee Shin

Purpose The purpose of this study is to categorize network neutrality according to its issues under debate and assess the state of the debate based on such organization. In addition, the study discusses the reasons that network neutrality is so difficult to solve and the future research directions that would do so. Design/methodology/approach This study presents a critical review of the current network neutrality issues and summarizes the economic background of each position in the debate. The relevant literature is organized by issue to examine the reasons that the network neutrality debate is so difficult to solve and determine the further study required to solve it. Findings An analysis of the relevant literature suggests that the proponents and opponents of network neutrality disagree on the best methods of developing the Internet. Therefore, future research and regulatory and practitioners’ applications would greatly benefit from a comprehensive review of that literature. Originality/value Network neutrality regulation is receiving increased attention because the development and significant influences of the Internet are becoming more apparent.


Author(s):  
Antonio Miguel Rosado da Cruz ◽  
Sara Paiva

Mobile computing and Cloud computing are two of the most growing technologies in number of users, practitioners and research projects. This chapter surveys mobile technologies and applications, along with cloud computing technologies and applications, presenting their evolution and characteristics. Then, building on mobile devices limitations and mobile apps increasing need of resources, and on the cloud computing ability to overcome those limitations, the chapter presents mobile cloud computing, and characterizes it by addressing approaches to augment mobile devices capabilities. The chapter is settled after some views about future research directions and some concluding remarks.


Author(s):  
Insaf Khelladi ◽  
Sylvaine Castellano

Some firms and industries were not willing to take full advantage of the internet and its endless opportunities, mainly because they rather focused on the inherent risks and challenges. However, when taking into consideration the specificities of the connected generation, the question is not anymore whether to go online or not, but rather to understand how, when, and where, especially in a luxury context. More specifically, the digital natives represent tomorrow's customers. This new market segment represents a main reason for luxury firms to adopt online strategies. Still, further analysis is needed to uncover the main objectives when firms decide to engage in digital activities. The authors herein investigate the concept of e-reputation. The authors expand on their initial study that focused on brand image and social media as determinants of online reputation. Recommendations and future research directions are suggested.


Author(s):  
Md Mahbubur Rahim ◽  
Maryam Jabberzadeh ◽  
Nergiz Ilhan

E-procurement systems that have been in place for over a decade have begun incorporating digital tools like big data, cloud computing, internet of things, and data mining. Hence, there exists a rich literature on earlier e-procurement systems and advanced digitally-enabled e-procurement systems. Existing literature on these systems addresses many research issues (e.g., adoption) associated with e-procurement. However, one critical issue that has so far received no rigorous attention is about “unit of analysis,” a methodological concern of importance, for e-procurement research context. Hence, the aim of this chapter is twofold: 1) to discuss how the notion of “unit of analysis” has been conceptualised in the e-procurement literature and 2) to discuss how its use has been justified by e-procurement scholars to address the research issues under investigation. Finally, the chapter provides several interesting findings and outlines future research directions.


Author(s):  
Ahm Shamsuzzoha

Global business communities are facing tremendous challenges from market places with respect to reduce cost and offer true customized products or services to the end customers. To cope such challenges companies are nowadays considering forming a business network with the objective to achieve several business benefits. However, to execute such business network is not risks free but always facing some problems for its continuation successfully. In such situation, it is necessary to formulate risk mitigation plan and strengthen the resilience within business network. The objective of this article is therefore to identifying and sharing risks within the collaborative business network and proposing necessary mitigating plan and resilience for it. In this research, a framework is also highlighted that provides a structural approach for identifying and assessing potential risks and resilience in business networks and their possible impacts on different levels of collaboration. The study is concluded with future research directions.


Author(s):  
Sylvaine Castellano ◽  
Insaf Khelladi

New opportunities and challenges are emerging thanks to the growing Internet importance and social media usage. Although practitioners have already recognized the strategic dimension of e-reputation and the power of social media, academic research is still in its infancy when it comes to e-reputation determinants in a social networks context. A study was conducted in the sports setting to explore the impact of social networks on the sportspeople's e-reputation. Whereas the study emphasized (1) the influence of social networks' perception on the sportspeople's e-reputation, and the neutral roles of (2) the motives for following sportspeople online, and (3) the negative content on the Internet, additional insights are formulated on maintaining, restoring and managing e-reputation on social networks. Finally, future research directions are suggested on the role of image to control e-reputation.


Sign in / Sign up

Export Citation Format

Share Document