In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016)

Authors

  • A. Rob Md. Rayhan Hossain Department of Computer Science and Engineering, Jessore University of Science and Technology, Jessore – 7408, Bangladesh
  • G. M. Israfil Islam Department of Computer Science and Engineering, Jessore University of Science and Technology, Jessore – 7408, Bangladesh
  • Md. Shahinurzzaman Department of Computer Science and Engineering, Jessore University of Science and Technology, Jessore – 7408, Bangladesh
  • Md. Alam Hossain Department of Computer Science and Engineering, Jessore University of Science and Technology, Jessore – 7408, Bangladesh

Keywords:

Cloud Storage, Security, Feedback, Data leakage, User access, Physical disruption, Infrastructure changes.

Abstract

Cloud Storage, today has become an integral part of IT related persons lives. It also use in many businesses institute to store their important data. But, they always concern about its security. User of Cloud Storage can’t use it without hesitation. So, it is important to know for provider and builder that why user feel unsecure and what are the factors for hesitation to use Cloud Storage. In this paper we focus on user opinion for their hesitation to use Cloud Storage.   

References

Bertion, E., Paci, F., & Ferrini, R. (2009). Privacy-Preserving Digital Identity Management for Cloud Computing. IEEE Computer Society Data Engineering Bulletin, March 2009, pp. 1-4.

Bruening, P.J. & Treacy, B.C. (2009). Cloud Computing: Privacy, Security Challenges. Bureau of National Affairs, 2009, pp. 1-2.

Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 2011, pp. 1-9.

Gajek, S., Jensen, M., Liao, L., & Schwenk, J. (2009). Analysis of Signature Wrapping Attacks and Countermeasures. In Proceedings of the IEEE International Conference on Web Services, Los Angeles, California, USA, July 2009, pp. 575-582.

Takabi, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and Privacy Challenges in Cloud Computing Environments.IEEE Security and Privacy, Vol 8, No 6, 2010, pp. 24-31.

D. Sheppard, “Is loss of control the biggest hurdle to cloud computing?” 2014; http://www.itworldcanada.com/blog/is-loss-of-control-the-biggest-hurdle-to-cloud-computing/95131

Top Threats Working Group, “The notorious nine: cloud computing top threats in 2013,” 2013; https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.

J. R. Raphael, “The worst cloud outages of 2013 (so far),”2013; http://www.infoworld.com/article/2606768/cloud-com-puting/107783-The-worst-cloud-outages-of-2013-so-far.html.

Downloads

Published

2016-04-26

How to Cite

Hossain, A. R. M. R., Islam, G. M. I., Shahinurzzaman, M., & Hossain, M. A. (2016). In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016). International Journal of Computer (IJC), 21(1), 30–34. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/603

Issue

Section

Articles