Open Access Open Access  Restricted Access Subscription Access

In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016)

A. Rob Md. Rayhan Hossain, G. M. Israfil Islam, Md. Shahinurzzaman, Md. Alam Hossain

Abstract


Cloud Storage, today has become an integral part of IT related persons lives. It also use in many businesses institute to store their important data. But, they always concern about its security. User of Cloud Storage can’t use it without hesitation. So, it is important to know for provider and builder that why user feel unsecure and what are the factors for hesitation to use Cloud Storage. In this paper we focus on user opinion for their hesitation to use Cloud Storage.   


Keywords


Cloud Storage; Security; Feedback; Data leakage; User access; Physical disruption; Infrastructure changes.

Full Text:

PDF

References


Bertion, E., Paci, F., & Ferrini, R. (2009). Privacy-Preserving Digital Identity Management for Cloud Computing. IEEE Computer Society Data Engineering Bulletin, March 2009, pp. 1-4.

Bruening, P.J. & Treacy, B.C. (2009). Cloud Computing: Privacy, Security Challenges. Bureau of National Affairs, 2009, pp. 1-2.

Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 2011, pp. 1-9.

Gajek, S., Jensen, M., Liao, L., & Schwenk, J. (2009). Analysis of Signature Wrapping Attacks and Countermeasures. In Proceedings of the IEEE International Conference on Web Services, Los Angeles, California, USA, July 2009, pp. 575-582.

Takabi, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and Privacy Challenges in Cloud Computing Environments.IEEE Security and Privacy, Vol 8, No 6, 2010, pp. 24-31.

D. Sheppard, “Is loss of control the biggest hurdle to cloud computing?” 2014; http://www.itworldcanada.com/blog/is-loss-of-control-the-biggest-hurdle-to-cloud-computing/95131

Top Threats Working Group, “The notorious nine: cloud computing top threats in 2013,” 2013; https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.

J. R. Raphael, “The worst cloud outages of 2013 (so far),”2013; http://www.infoworld.com/article/2606768/cloud-com-puting/107783-The-worst-cloud-outages-of-2013-so-far.html.


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).