Abstract

Due to the ever-growing threat of security breaches that information technology (IT) organizations continually face, protecting customer information stored in the cloud is critical to ensure data integrity. Research shows that new categories of data breaches frequently emerge; thus, security strategies that build trust in consumers and improve system performance are crucial. The purpose of this qualitative multiple case study was to explore and analyze the strategies used by database administrators (DBAs) to secure data in a private infrastructure as a service (IaaS) cloud environment. The participants comprised of six DBAs from two IT companies in Baltimore, Maryland, with experience and knowledge of security strategies to secure data in private IaaS clouds. The disruptive innovation theory was the foundational framework for this study. Data were collected using semistructured interviews and a review of seven organizational documents. A thematic analysis was used to analyze the data. Two key themes are addressed in this article: importance of well-defined security measures in cloud computing and limitations of existing security controls in cloud computing. The findings of well-defined security strategies may benefit DBAs and IT organizations by providing strategies that may prevent future data breaches. Well-defined security strategies may protect an individual’s data which, in turn, may promote individual well-being and build strong communities. Keywords: cloud computing, security strategies, data breaches DOI: 10.7176/JIEA/11-2-05 Publication date: June 30 th 2021

Highlights

  • In recent years, the general public has become gravely concerned about securing personal identifiable data in the cloud

  • This paper focuses on using data to address the well-defined security strategies which can be used by organizations to secure data in cloud computing

  • Methodological triangulation was adopted in this study by recording interviews from the research participants, as well as analyzing the organizational documents related to security strategies used to prevent data breaches in private infrastructure as a service (IaaS) cloud computing

Read more

Summary

Introduction

The general public has become gravely concerned about securing personal identifiable data in the cloud. During the Covid-19 pandemic lockdown, leveraging the Internet has become one of cloud computing greatest strengths, when numerous businesses and schools were ordered to continue operations using the Zoom platform for meetings, schoolwork, or even social activities (Wagenseil, 2020). The authors identified the importance of well-defined security measures in private infrastructure as a service (IaaS) cloud environments. Many organizations are conducting business transactions and meetings online and are faced with numerous challenges of preventing hackers from accessing their customers’ proprietary data. This paper focuses on using data to address the well-defined security strategies which can be used by organizations to secure data in cloud computing. The primary objective of this study is to inform Information Technology (IT) security professionals, of the well-defined successful security measures in cloud computing associated with data security policies

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call