Skip to main content

Exploring Critical Risks Associated with Enterprise Cloud Computing

  • Conference paper
  • First Online:
  • 1625 Accesses

Abstract

While cloud computing has become an increasingly hot topic in the industry, risks associated with the adoption of cloud services have also received growing attention from researchers and practitioners. This paper reports the results of a study that aimed to identify and explore potential risks that organisations may encounter when adopting cloud computing, as well as to assess and prioritise the identified risks. The study adopted a deductive research method based on a cross-sectional questionnaire survey. The questionnaire was distributed to a group of 295 carefully selected and highly experienced IT professionals, of which 39 (13.2 %) responses were collected and analysed. The research findings identified a set of 39 cloud computing risks, which concentrated around diverse operational, organisational, technical, and legal areas. It was identified that the most critical risks were caused by current legal and technical complexity and deficiencies associated with cloud computing, as well as by a lack of preparation and planning of user companies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Voorsluys, W., Brober, J., Buyya, R.: Introduction to cloud computing. In: Buyya, R., Broberg, J., Goscinski, A. (eds.) Cloud Computing Principles and Paradigms, pp. 1–41. Wiley, New Jersey (2011)

    Chapter  Google Scholar 

  2. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing - the business perspective. Decis. Support Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  3. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90, Chicago, USA (2009)

    Google Scholar 

  4. Ali, K.H.: Cloud migration: a case study of migrating an enterprise IT system to IaaS. In: Proceedings of the 3rd IEEE International Conference on Cloud Computing, pp. 450–457, Miami, Florida (2010)

    Google Scholar 

  5. Peng, G.C., Nunes, J.M.B.: Surfacing ERP exploitation risks through a risk ontology. Ind. Manage. Data Syst. 109(7), 926–942 (2009)

    Article  Google Scholar 

  6. Peng, G.C., Nunes, J.M.B.: Establishing and verifying a risk ontology for surfacing ERP post-implementation. In: Ahmad, M., Colomb, R.M., Abdullah, M.S. (eds.) Ontology-Based Applications for Enterprise Systems and Knowledge Management, pp. 43–67. IGI Global, Hershey (2012)

    Chapter  Google Scholar 

  7. Peng, G.C., Nunes, J.M.B.: Identification and assessment of risks associated with ERP post-implementation in China. J. Enterp. Inf. Manage. 22(5), 587–614 (2009)

    Google Scholar 

  8. Pan, K., Nunes, J.M.B., Peng, G.C.: Risks affecting ERP post-implementation: insights from a large Chinese manufacturing group. J. Manuf. Technol. Manage. 22(1), 107–130 (2011)

    Article  Google Scholar 

  9. Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. http://www.globalcloudbusiness.com/SharedFiles/Download.aspx?pageid=138&mid=220&fileid=12 (2008). Accessed Mar 2012

  10. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly, Sebastopol (2009)

    Google Scholar 

  11. Onwubiko, C.: Security issues to cloud computing. In: Antonopoulos, N., Gillam, L. (eds.) Cloud Computing Principles, Systems and Applications, pp. 271–288. Springer, London (2010)

    Google Scholar 

  12. Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Network Secur. Appl. 3(1), 30–45 (2011)

    Google Scholar 

  13. Field, A.: Discovering Statistics Using SPSS: And Sex, Drugs and Rock ‘n’ Roll, 2nd edn. SAGE Publication, London (2005)

    Google Scholar 

  14. Bryman, A., Cramer, D.: Quantitative Data Analysis with SPSS 12 and 13: a Guide for Social Scientists. Routledge, East Sussex (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guo Chao Alex Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Peng, G.C.A., Dutta, A., Choudhary, A. (2014). Exploring Critical Risks Associated with Enterprise Cloud Computing. In: Leung, V., Chen, M. (eds) Cloud Computing. CloudComp 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 133. Springer, Cham. https://doi.org/10.1007/978-3-319-05506-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05506-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05505-3

  • Online ISBN: 978-3-319-05506-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics