Skip to main content

Cybersecurity and Data Quality in Cloud Computing: A Research Framework

  • Conference paper
  • First Online:
Information Systems (EMCIS 2022)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 464))

Abstract

In the cloud computing environment, cybersecurity and data quality capacities and vulnerabilities can have impact on could computing performance. Cloud computing resiliency addresses risks and capabilities in order to make cloud computing stronger and less susceptible to disruptions. Cloud computing provides many opportunities, however, it also presents some cybersecurity and data quality issues. In this paper, we propose a research framework for cybersecurity and data quality in the cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Almutiry, O., Wills, G., Alwabel, A., Crowder, R., WaIters, R.: Toward a framework for data quality in cloud-based health information system. Paper presented at the International Conference on Information Society (i-Society 2013) (2013)

    Google Scholar 

  • Ani, L.: aCybercrime and national security: the role of the penal and procedural law. Law and Security in Nigeria, 200–202 (2011)

    Google Scholar 

  • Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. Paper presented at the 2012 International Conference on Computer Science and Electronics Engineering (2012)

    Google Scholar 

  • Goud, N.: Cyber Attack on Tower Semiconductor. Cybersecurity Insiders. http://www.cybersecurity-insiders.com/cyber-attack-on-tower-semiconductor/ (2020)

  • Kamara, S., Lauter, K.: Cryptographic cloud storage. Paper presented at the Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization (2010)

    Google Scholar 

  • Khan, N., Al-Yasiri, A.: Identifying cloud security threats to strengthen cloud computing adoption framework. Paper presented at the the 2nd International Workshop on Internet of Thing: Networking Applications and Technologies (IoTNAT’2016) (2016)

    Google Scholar 

  • Ramachandra, G., Iftikhar, M., Khan, F.A.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 465–472 (2017). https://doi.org/10.1016/j.procs.2017.06.124

    Article  Google Scholar 

  • Razzaq, A., Hur, A., Ahmad, H.F., Masood, M.: Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial ap- plications. Paper presented at the 2013 IEEE Eleventh International Symposium on Auton- omous Decentralized Systems (ISADS) (2013)

    Google Scholar 

  • Schneier, B.: The US has suffered a massive cyberbreach. It's hard to overstate how bad it is. The Guardian. Available at: https://www.theguardian.com/commentisfree/2020/dec/23/cyber-attack-us-security-protocols (2020)

  • Srinivasamurthy, S., Liu, D.Q., Vasilakos, A.V., Xiong, N.: Security and privacy in cloud computing: a survey. Parallel Cloud Comput. 2(4), 126–149 (2013)

    Google Scholar 

  • Strong, D.M., Lee, Y.W., Wang, R.Y.: Data quality in context. Commun. ACM 40, 103–110 (1997)

    Article  Google Scholar 

  • Xu, H.: Factor Analysis of Critical Success Factors for Data Quality. Paper presented at the AMCIS (2013)

    Google Scholar 

  • Xu, H., Horn Nord, J., Brown, N., Daryl Nord, G.: Data quality issues in implementing an ERP. Ind. Manag. Data Syst. 102(1), 47–58 (2002). https://doi.org/10.1108/02635570210414668

    Article  Google Scholar 

  • Xu, H., Mahenthiran, S.: Users’ perception of cybersecurity, trust and cloud computing providers’ performance. Inform. Comput. Secur. 29(5), 816–835 (2021). https://doi.org/10.1108/ICS-09-2020-0153

    Article  Google Scholar 

  • Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). https://doi.org/10.1016/j.future.2010.12.006

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongjiang Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, H. (2023). Cybersecurity and Data Quality in Cloud Computing: A Research Framework. In: Papadaki, M., Rupino da Cunha, P., Themistocleous, M., Christodoulou, K. (eds) Information Systems. EMCIS 2022. Lecture Notes in Business Information Processing, vol 464. Springer, Cham. https://doi.org/10.1007/978-3-031-30694-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30694-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30693-8

  • Online ISBN: 978-3-031-30694-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics