Daniel W. K. Tse, H. Yuen, Qiran He, Chaoya Wang, Jiheng Yu
{"title":"The security vulnerabilities of on-demand and sharing economy","authors":"Daniel W. K. Tse, H. Yuen, Qiran He, Chaoya Wang, Jiheng Yu","doi":"10.1145/3234781.3234787","DOIUrl":null,"url":null,"abstract":"The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human's daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.","PeriodicalId":386149,"journal":{"name":"ICEEG '18","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICEEG '18","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234781.3234787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human's daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.