Abstract

The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human's daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.