The Security Vulnerabilities of On-Demand And Sharing Economy
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | ICEEG 2018: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government |
Publisher | Association for Computing Machinery |
Pages | 47-53 |
ISBN (Print) | 9781450364904 |
Publication status | Published - Jun 2018 |
Publication series
Name | ACM International Conference Proceeding Series |
---|---|
Volume | Part F139753 |
Conference
Title | 2018 2nd International Conference on E-commerce, E-Business and E-Government (ICEEG 2018) and 2018 5th International Conference on Innovations in Business and Management (ICIBM 2018) |
---|---|
Location | The Hong Kong Polytechnic University |
Place | Hong Kong |
Period | 13 - 15 June 2018 |
Link(s)
Abstract
The cloud computing has been widely in on-demand-and-sharing service economy and has become a hotspot in recent years especially in the IT industry which really lead to some changes in human’s daily life. However, many users and researchers believed that the information security is the most significant challenge in cloud computing. Therefore, this paper aims to discover the threats and vulnerabilities of the cloud storage which is the most common application originating from the cloud computing. This research utilized a quantitative approach and all qualified respondents were asked to complete an online questionnaire. The result shows that (1) Data loss and leakage is the biggest threat in using cloud storage application (2) Abuse use of cloud computational resources is the most severe impact in cloud storage application (3) Respondents with different backgrounds have the different perspectives towards the cloud service (4) The countermeasures to minimize the security vulnerability are flexibility in choosing the protective measures, strengthen the infrastructure, improve the password authentication and strengthen the authorization.
Research Area(s)
- Cloud computing, Cloud storage application, On-demand-and-sharing economy, Threats, Vulnerabilities
Bibliographic Note
Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).
Citation Format(s)
The Security Vulnerabilities of On-Demand And Sharing Economy. / Tse, Daniel; Yuen, Hok Hin; He, Qiran et al.
ICEEG 2018: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government. Association for Computing Machinery, 2018. p. 47-53 (ACM International Conference Proceeding Series; Vol. Part F139753).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review