Abstract
While cloud computing has become an increasingly hot topic in the industry, risks associated with the adoption of cloud services have also received growing attention from researchers and practitioners. This paper reports the results of a study that aimed to identify and explore potential risks that organisations may encounter when adopting cloud computing, as well as to assess and prioritise the identified risks. The study adopted a deductive research method based on a cross-sectional questionnaire survey. The questionnaire was distributed to a group of 295 carefully selected and highly experienced IT professionals, of which 39 (13.2 %) responses were collected and analysed. The research findings identified a set of 39 cloud computing risks, which concentrated around diverse operational, organisational, technical, and legal areas. It was identified that the most critical risks were caused by current legal and technical complexity and deficiencies associated with cloud computing, as well as by a lack of preparation and planning of user companies.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Voorsluys, W., Brober, J., Buyya, R.: Introduction to cloud computing. In: Buyya, R., Broberg, J., Goscinski, A. (eds.) Cloud Computing Principles and Paradigms, pp. 1–41. Wiley, New Jersey (2011)
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing - the business perspective. Decis. Support Syst. 51(1), 176–189 (2011)
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90, Chicago, USA (2009)
Ali, K.H.: Cloud migration: a case study of migrating an enterprise IT system to IaaS. In: Proceedings of the 3rd IEEE International Conference on Cloud Computing, pp. 450–457, Miami, Florida (2010)
Peng, G.C., Nunes, J.M.B.: Surfacing ERP exploitation risks through a risk ontology. Ind. Manage. Data Syst. 109(7), 926–942 (2009)
Peng, G.C., Nunes, J.M.B.: Establishing and verifying a risk ontology for surfacing ERP post-implementation. In: Ahmad, M., Colomb, R.M., Abdullah, M.S. (eds.) Ontology-Based Applications for Enterprise Systems and Knowledge Management, pp. 43–67. IGI Global, Hershey (2012)
Peng, G.C., Nunes, J.M.B.: Identification and assessment of risks associated with ERP post-implementation in China. J. Enterp. Inf. Manage. 22(5), 587–614 (2009)
Pan, K., Nunes, J.M.B., Peng, G.C.: Risks affecting ERP post-implementation: insights from a large Chinese manufacturing group. J. Manuf. Technol. Manage. 22(1), 107–130 (2011)
Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. http://www.globalcloudbusiness.com/SharedFiles/Download.aspx?pageid=138&mid=220&fileid=12 (2008). Accessed Mar 2012
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly, Sebastopol (2009)
Onwubiko, C.: Security issues to cloud computing. In: Antonopoulos, N., Gillam, L. (eds.) Cloud Computing Principles, Systems and Applications, pp. 271–288. Springer, London (2010)
Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Network Secur. Appl. 3(1), 30–45 (2011)
Field, A.: Discovering Statistics Using SPSS: And Sex, Drugs and Rock ‘n’ Roll, 2nd edn. SAGE Publication, London (2005)
Bryman, A., Cramer, D.: Quantitative Data Analysis with SPSS 12 and 13: a Guide for Social Scientists. Routledge, East Sussex (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Peng, G.C.A., Dutta, A., Choudhary, A. (2014). Exploring Critical Risks Associated with Enterprise Cloud Computing. In: Leung, V., Chen, M. (eds) Cloud Computing. CloudComp 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 133. Springer, Cham. https://doi.org/10.1007/978-3-319-05506-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-05506-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05505-3
Online ISBN: 978-3-319-05506-0
eBook Packages: Computer ScienceComputer Science (R0)