The Security Vulnerabilities of On-Demand And Sharing Economy

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

View graph of relations

Author(s)

  • Daniel Tse
  • Hok Hin Yuen
  • Qiran He
  • Chaoya Wang
  • Jiheng Yu

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationICEEG 2018: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government
PublisherAssociation for Computing Machinery
Pages47-53
ISBN (Print)9781450364904
Publication statusPublished - Jun 2018

Publication series

NameACM International Conference Proceeding Series
VolumePart F139753

Conference

Title2018 2nd International Conference on E-commerce, E-Business and E-Government (ICEEG 2018) and 2018 5th International Conference on Innovations in Business and Management (ICIBM 2018)
LocationThe Hong Kong Polytechnic University
PlaceHong Kong
Period13 - 15 June 2018

Abstract

The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human’s daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.

Research Area(s)

  • Cloud computing, Cloud storage application, On-demand-and-sharing economy, Threats, Vulnerabilities

Bibliographic Note

Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).

Citation Format(s)

The Security Vulnerabilities of On-Demand And Sharing Economy. / Tse, Daniel; Yuen, Hok Hin; He, Qiran et al.

ICEEG 2018: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government. Association for Computing Machinery, 2018. p. 47-53 (ACM International Conference Proceeding Series; Vol. Part F139753).

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review