scholarly journals The Vulnerabilities of Cloud Computing : A Review

Author(s):  
Janardan Kulkarni ◽  
Jay Prajapati ◽  
Sakshi Patel

A Cloud is a type of analogous and scattered system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources “ . cloud computing is the dynamic provisioning of IT capabilities (hardware, software, or services) from third parties over a network. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This article is in order to describe the impact of those vulnerabilities and threats to create awareness among organisations and users so that they can Adopt this technology with trust And form a trusted provider Who has trusted security policies. Here we have defined cloud-specific vulnerabilities, cloud feature vulnerabilities and propose a reference vulnerabilities architecture of cloud computing and threats related cloud computing. Cloud security and privacy plays an important role to avoid cloud threats .Cloud Privacy Concerns the expression of or devotion to various legal and non- legal norms regarding the right to private life. Cloud Security Concerns the confidentiality, ease of use and reliability of data or information. As the development of cloud computing, issue of security has become a top priority. In this article we are going to discuss about the Characteristics of vulnerabilities , cloud vulnerabilities and cloud threats , Also how we can overcome or avoid them and keep our data safe.

2012 ◽  
Vol 3 (2) ◽  
pp. 36-49 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Osamah Ghaleb

This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this relation. Discussion, conclusion and future work are stated at the end of this paper.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hamid Reza Nikkhah ◽  
Rajiv Sabherwal

PurposeIn this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.Design/methodology/approachThis study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).FindingsThis study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.Originality/valueWith proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.


2021 ◽  
Vol 9 (1) ◽  
pp. 20-27
Author(s):  
Dr. Sulaiman Althuwaini ◽  
Dr. Mohamed Saleh Salem

The purpose of the study is to examine the factors that impact the intention of Saudi citizens to use a mobile government smartphone application (Absher). Saudi Arabia seeks to invest and develop the infrastructure of the government’s mobile services, to be one of the leading countries in the region. Smartphone applications backed by mobile technologies have changed mobile services use which permit anywhere at any time access. Drawing on technology acceptance theories and relevant literature, this study developed and tested a structural model that integrates factors perceived usefulness, perceived ease of use, perceived privacy and trust in order to investigate the predictors of Absher use intention in the Saudi Arabia. The proposed model is tested using structural equation model (SEM) on data collected using an online questionnaire. Statistical analysis revealed that intention to use Absher was significantly associated with perceived trust, security and privacy, ease of use, and usefulness. Drawing on the technology acceptance model and trust theory, this study develops and empirically examines a model for users' intention to use mobile government services. This study contributes to the marketing literature by examining the impact of PU, PEOU and trust on mobile government services acceptance in developing countries.


2021 ◽  
Vol 9 (1) ◽  
pp. 71-79
Author(s):  
Jacqualine Cristhy Ujil

The recent advancements in technologies have allowed us to come so far and resulted in many breakthroughs. One of the various examples is internet of things, wireless communication, and cloud computing which can be useful if utilize in many fields. In the field of medical, these advancements allowed any medical centres to improve patient’s health remotely simply by using wearable devices on patients that then will amalgamate with the wireless body area network (WBAN). However, WBAN has limited resources which limits its services. To solve this problem, cloud computing is used to provide storage and computation. Unfortunately, these methods allow the system to be vulnerable to various malicious attacks. Attackers can easily gain access to the medical records of patients hence the integrity of security and privacy of confidential data have been compromised. In this paper, we presented a secure protocol for cloud-assisted database using multi-factor authentication and blockchain as an added measure to ensure security. Accordingly, we prove that the presented scheme offers more security and privacy. Therefore, it is the most practical method to be applied in the medical field.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Yazan Al-Issa ◽  
Mohammad Ashraf Ottom ◽  
Ahmed Tamrawi

Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals and healthcare providers lose control over sensitive data. As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology. In this work, we found that the state-of-the art solutions address only a subset of those concerns. Thus, there is an immediate need for a holistic solution that balances all the contradicting requirements.


2020 ◽  
Vol 38 (4) ◽  
pp. 401-415 ◽  
Author(s):  
Shrawan Kumar Trivedi ◽  
Mohit Yadav

PurposeResearch on online businesses has focused on the adoption of e-commerce and initial purchase behavior; repurchase intention and its antecedents remain underresearched. The present study develops an empirical model to explore the extent to which trust and e-satisfaction mediate the effect of vendor-specific attributes and customer intention to repurchase from the same online platform.Design/methodology/approachThe proposed model is tested and validated in the context of Generation Y in India. A self-administrated online survey was employed, and the students aged between 20 and 35 at universities in Northern India are selected as subject. The data is analyzed using SPSS 20.0 and AMOS 20.0, where structural equation modeling is used to examine the model and test the hypothesis.FindingsThe results of this study suggest that trust mediates fully between security concerns, privacy concerns, and repurchase intention. E-satisfaction mediates between security and ease of use (EOU).Practical implicationsThis study reveals the fact that security, EOU, and privacy concerns are the critical determinants that have the most impact on consumer's purchasing behavior. Gen Y consumers of India need some strong security features, an easy-to-use interface, a trusted privacy policy. Furthermore, it may be beneficial to observe e-satisfaction and trust as a mediator when identifying potential problems; online satisfaction is essential for the group in this study, and the results show that it impacts on the relation between repurchase intention and some determinant of repurchase intentions.Originality/valueThis research determines the impact of security, privacy concerns, EOU on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction and trust has also been determined.


2017 ◽  
Vol 8 (2) ◽  
pp. 47 ◽  
Author(s):  
Ali Tarhini ◽  
Ra’ed Masa’deh ◽  
Ali Al-Badi ◽  
Majdolen Almajali ◽  
Sufian Hussien Alrabayaah

This paper aims to investigate the effects of perceived ease of use, perceived usefulness, self-efficacy, trust, job opportunity, top management support, competitive pressure, and regulatory support on employees’ behavioral intention to use cloud computing. Data was collected by means of self-administrated questionnaire containing 25 items from 205 employees’ working in three, four, and five star hotels. Multiple regression analysis was conducted to test the research hypotheses. Results of the current study revealed that there are significant impacts of four independent variables (i.e. job opportunity, top management support, competitive pressure, and regulatory support) on behavioral intention (BI) to use cloud computing; whereas four independent variables (i.e. perceived ease of use, perceived usefulness, self-efficacy, and trust) have no significant impact on BI. The results of T-test also showed that there is a significant difference in the impact of BI to use cloud computing in favor of gender. On the other hand, the results of ANOVA’s test showed that there is no significant difference in the impact of BI that can be attributed to age, educational level, and personal income; whereas a significant difference found in favor of work position and hotel’s classification. In light of these findings, implications to both theory and practice are discussed.


Recent advances in multi cloud technologies and multi-party computations have improved State of art usage of Cloud computing in real time scenarios. Primary reason behind using any service offered by others is ease of use with lesser economics. Cloud Computing is technological advancement which is in usage for last two decades because of its Pay-per-Usage policy offering enormous benefits across the user community. In spite of its enormous benefits, single factor which is stepping it back from its wider adoption throughout the digital society is its Security. Tremendous research work was done across industry and academia in association with cloud security. This paper focuses on brief history, real time deployment of cloud, usage, benefits, risks associated and Surveys various studies done by national and international organizations related to cloud security concerns and dwell upon the advantages of integrating multi clouds and multi-party computation techniques and emphasizes on recent research done across multi cloud environment and give a short note of future work to enhance security paradigm.


Sign in / Sign up

Export Citation Format

Share Document