The purpose of this paper is to critically examine the vulnerabilities of the cloud platform affecting businesses trading on the internet. It aims to examine the appropriateness of the cloud computing, its benefits to the industry and helps to identify security concerns for businesses that plan to deploy one of the cloud platforms. It helps to identify areas where businesses should focus before choosing an appropriate Cloud Service Provider (CSP). – This paper presents the findings of an original research survey (200 IT professionals working both in the public and private sectors) undertaken to examine their privacy, and data security concerns associated with the cloud platform. Views of those who have yet to deploy cloud were analysed to detect the patterns of common security issues. Cyber fraud and trust concerns of the organisations are addressed and deployment of the secured cloud environment is outlined. – The survey analysis highlighted that the top concerns for organisations on cloud were security (93.8 per cent), governance (61.1 per cent) and a lack of control over service availability (56.6 per cent). The survey highlighted that the majority of IT professionals were not aware that some CSPs currently control the decryption keys that enable them to decrypt their client's data. This should be considered as a major security concern and it is one of the factors that should be looked into while vetting the service level agreement (SLA). Data loss and leakage (73.5 per cent) were voted as the top threat to cloud computing by respondents; this was followed by account, service and traffic hijacking (60.8 per cent). The paper examines various types of cloud threats companies have encountered. – The vast majority of the data are drawn from IT professionals with businesses mainly in the UK and the USA. – The paper advocates a proactive and holistic cloud-cyber security prevention typology to prevent e-crime, with guidance of what features to look for when choosing an appropriate cloud service provider. – This is the first analysis done that includes IT auditors, physical security personnel as well as IT professionals. The paper is of value to companies considering adoption or implementation of a cloud platform. It helps to assess the cloud by evaluating a detailed comparison of benefits and risk associated with the platform.
Related Content
Acute aggression risk: an early warning signs methodology
Predicting the imminence of high risk behaviours in in-patients with schizophrenia is an ongoing concern. This study explores the utility, validity and reliability of an adapted early warning signs methodology for dynamic risk assessment. Nursing staff were interviewed to identify operationally d...


BOTOLIST, BOTOCYL and BOTOX
It is assumed that a trade mark, which enjoys a reputation with the general public, is also known to professionals. As established in Article 256 TFEU and Article 58 of the Statute of the Court of Justice of the European Union, an appeal lies on points of law only. As such, the appraisal of the f...
Security risk assessment framework for cloud computing environments
Cloud computing has become today's most common technology buzzword. Despite the promises of cloud computing to decrease computing implementation costs and deliver computing as a service, which allows clients to pay only for what they need and use, cloud computing also raises many security concern...


Pre-operative indicators for mortality following hip fracture surgery: a systematic review and meta-analysis
Hip fracture is a common and serious condition associated with high mortality. This study aimed to identify pre-operative characteristics which are associated with an increased risk of mortality after hip fracture surgery. systematic search of published and unpublished literature databases, inclu...
A comparison of psychiatric diagnoses among HIV-infected prisoners receiving combination antiretroviral therapy and transitioning to the community
The criminal justice system (CJS), specifically prisons and jails, is ideally suited for uniform screening of psychiatric (PD) and substance use disorders (SUDs) among people living with HIV/AIDS (PLWHA), who are concentrated in these settings. By accurately diagnosing PDs and SUDs in these contr...

Selective and sensitive detection of chromium(VI) in waters using electrospray ionization mass spectrometry
From 2000 through 2011, there were 14 criminal cases of violations of the Clean Water Act involving the discharge of chromium, a toxic heavy metal, into drinking and surface water sources. As chromium(VI), a potential carcinogen present in the environment, represents a significant safety concern,...
An Analysis of Prisoner Reentry and Parole Risk Using COMPAS and Traditional Criminal History Measures
The California Department of Corrections and Rehabilitation has adopted Correctional Offender Management and Profiling Alternative Sanctions (COMPAS), an actuarial risk- and needs-assessment instrument, as part of its reentry supervision and parole planning procedure. A large-scale 3-year prospec...

Functional assessments utilised in emergency departments: a systematic review
Functional assessment is an important component of the management of older adults in the emergency department (ED) as the function level has been identified as a predictor of adverse events including ED re-presentation. A systematic review (SR) of all functional assessments utilised in EDs has no...
The Influence of Mental Health Disorders on Severity of Reoffending in Juveniles
The authors conducted secondary data analyses on mental health assessment and offense history data for 700 juveniles referred to juvenile justice agencies in Alabama (probation and detention). Multiple regression analysis was applied to predict subsequent offense severity by disorder profile, adj...

Password-authenticated cluster-based group key agreement for smart grid communication
Several multiparty systems supporting group-based and cloud-based applications have been proposed in the context of smart grid. An important requirement of these systems is that the devices/parties need to communicate with each other as members of a group. In this paper, we present an efficient g...