Identification and ranking of the risk factors of cloud computing in State-Owned organizations

作者: Jafari Hamid Reza , Shukuhy Javad , Yaghoobi Noor Mohammad

DOI:

关键词: Process (engineering)Identification (information)Knowledge managementThe InternetRankingRank (computer programming)Need to knowComputer scienceCloud computingConfidentiality

摘要: Rapid development of processing and storage technologies the success Internet have made computing resources cheaper, more powerful available than before. This technological trend has enabled realization a new model called cloud computing. Recently, state-owned organizations begun to utilize architectures, platforms, applications deliver services meet constituents’ needs. Despite all advantages opportunities technology, there are so many risks that need know about before their migration environment. The purpose this study is identify rank risk factors in by making use IT experts’ opinions. Firstly, reviewing key articles, comprehensive list were extracted classified into two categories: tangible intangible. Then, six experts interviewed these classifications, 10 identified. After that, process ranking was done seeking help from 52 fuzzy analytic hierarchy process. results show identified intangible as most important used organizations. As indicate, "data confidentiality" highest place among other risks.

参考文章(23)
Thomas L. Saaty, Group Decision Making and the AHP Springer, Berlin, Heidelberg. pp. 59- 67 ,(1989) , 10.1007/978-3-642-50244-6_4
Herbert J. Mattord, Michael E. Whitman, Management Of Information Security ,(2004)
M.R. Tribhuwan, V.A. Bhuyar, Shabana Pirzade, Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management advances in recent technologies in communication and computing. pp. 386- 389 ,(2010) , 10.1109/ARTCOM.2010.23
Jiunn-Woei Lian, David C. Yen, Yen-Ting Wang, An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital International Journal of Information Management. ,vol. 34, pp. 28- 36 ,(2014) , 10.1016/J.IJINFOMGT.2013.09.004
Mariana Carroll, Alta van der Merwe, Paula Kotze, Secure cloud computing: Benefits, risks and controls information security for south africa. pp. 1- 9 ,(2011) , 10.1109/ISSA.2011.6027519
Zaigham Mahmood, Data Location and Security Issues in Cloud Computing international conference on emerging intelligent data and web technologies. pp. 49- 54 ,(2011) , 10.1109/EIDWT.2011.16
Scott Paquette, Paul T. Jaeger, Susan C. Wilson, Identifying the security risks associated with governmental use of cloud computing Government Information Quarterly. ,vol. 27, pp. 245- 253 ,(2010) , 10.1016/J.GIQ.2010.01.002
Farrukh Shahzad, None, State-of-the-art survey on cloud computing security challenges, approaches and solutions Procedia Computer Science. ,vol. 37, pp. 357- 362 ,(2014) , 10.1016/J.PROCS.2014.08.053