A Review of Security Challenges in Cloud Computing Adoption: A Conceptual Framework on Early Adopters of Cloud Computing as a Technology Model

Author(s):  
Lufungula Osembe ◽  
2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Hanifah Abdul Hamid ◽  
Mokhtar Mohd Yusof

Cloud computing has made a significant transformation of information technology environment as well as the way the business is conducted in any organizations. While its advantages are obvious, its challenges need to be clearly addressed to ensure successful adoption. This article provides an insights of cloud computing adoption in Malaysia at the national level as well as a review of cloud adoption from various fields and domains in Malaysia which led to research direction in the future. Malaysia is being dedicated towards cloud adoption nationally, and keep its good progress to equip itself as a cloud-friendly country. However, security challenges seem to slow down the effort, thus these need to be dealt with properly. 


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


2017 ◽  
Vol 24 (4) ◽  
pp. 814-832 ◽  
Author(s):  
Devesh Kumar ◽  
Harsh Vardhan Samalia ◽  
Piyush Verma

Purpose The purpose of this paper is to evaluate the suitability of cloud computing for small and medium-sized enterprises (SMEs) in India. Design/methodology/approach Literature review is used to identify benefits, challenges, and factors concerning usage and adoption of cloud computing by SMEs. A conceptual framework was developed based on the existing theoretical models and factors identified from the literature. A survey based on questionnaire method was followed to collect data from 121 manufacturing SMEs in India. The conceptual framework was refined by using factor analysis, and multiple regression analysis was used to test the hypotheses. Findings Major benefits of cloud computing for SMEs include cost advantage, easy deployment process, easier access to latest information and communication technologies, automatic updates and upgrades, scalability, flexibility, and improved disaster recovery and back-up capabilities. The concern area includes perceived loss of control, vendor lock-in, security issues, reliability and availability issues, and internet connectivity and speed. The factors that are found significant include perceived benefits, top management support, competitive pressure, and perceived concerns. The model explained 73 percent of cloud computing adoption. Research limitations/implications The study is expected to make significant contribution toward body of knowledge pertaining to information technology adoption in SMEs. Practical implications The study is expected to provide SMEs an insight into real benefits and challenges associated with adopting cloud computing. The model can help SMEs in evaluating their readiness for adopting cloud computing and can ensure successful outcome of cloud computing adoption in SMEs. Providers are also going to be benefited through their enhanced understanding of SMEs’ requirements. Originality/value The proposed framework incorporates all the relevant factors including perceived benefits, perceived concerns, and other organizational and environmental factors to improve model’s predictive power.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 429
Author(s):  
Abdulnoor Saleh ◽  
Sulfeeza Mohd Drus ◽  
Siti Salbiah M. Shariff

Researches in technology adoption among the Middle Eastern countries are more concentrated on e-government, e-commerce, and internet banking domains. Higher education institutions (HEIs) in these countries fall behind their Western counterparts due to the cutting edge technology adopted for research, teaching, and collaboration in the Western countries. One of the Middle Eastern countries, which is the focus of this research, Yemen, still adopt the conventional way of teaching in the HEIs, which could result in failures to accomplish the optimal desired educational performance. Higher education sector in Yemen faces a number of obstacles and challenges in delivering a good education to its entire population in terms of lack of reliable infrastructure; limited financial resources; lack of teaching staff and expertise; and lack of IT personnel to manage the existing restricted IT infrastructure. Cloud computing, a pool of computer-related resources and services, is seen as one of new technologies which can assist in improving educational delivery in Yemen. Thus, this study firstly, identified the factors that influence the cloud computing adoption in general. Then, it categorized these factors into four (4) domains, namely technological, organizational, environmental and individual domains; and lastly, validated the selected factors using semi-structured interview with IT experts. Based on the validation session with the IT experts, the factors were ranked based on their applicability and suitability in Yemeni’s higher education environments and 13 factors were selected. These 13 factors are adopted from Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA), Technology-Organization-Environment (TOE) framework and Diffusion of Innovation (DOI) theory. Then, a conceptual framework was developed using these 13 factors to identify the significant factors that influence cloud computing adoption in HEIs in Yemen. It is hoped by having a better understanding on the factors that influence cloud computing adoption in HEIs in Yemen, the responsible parties such as the government agencies, HEIs managements and staff will be more prepared to ensure successful adoption of cloud computing in their HEIs and ultimately help Yemen to improve its higher education delivery to its people.  


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


Sign in / Sign up

Export Citation Format

Share Document