Factors Influencing the Security Framework in Cloud Computing: A Case Study of Infrastructure Communications Company

Document Type : Research Paper

Authors

1 Ph.D. Candidate, Department of Industrial Management, IT and Technology, Central Tehran Branch, Islamic Azad University, Tehran, Iran.

2 Assistant prof., Department of Industrial Management, IT and Technology, Central Tehran Branch, Islamic Azad University, Tehran, Iran.

10.22059/jitm.2024.303185.2534

Abstract

Cloud computing technology could bring about cost-effectiveness, scalability, usage easiness, and flexibility against environmental changes. Despite several advantages of this technology, the acceptance and movement to the cloud computing environment occurs slowly, particularly in several organizations in developing countries. Cloud computing allows an individual to share distributed sources and services. This study aims to identify the optimal security framework in cloud computing, focusing on the Infrastructure Communications Company as a case study. The method used in this study is descriptive (non-test) and the correlative research scheme is PLS (partial least squares). The participants of the current study were selected among the Tehran Communication Infrastructure Company employees. Based on the Cochran formula and the research population which was 600, 234 were selected using the random sampling method. To measure the security framework in cloud computing, the questionnaires related to Joils and Opria (2017), Tari (2014), Qio and Gayi (2017), and Sing et al. (2016) were used. Findings indicate that the impacts of technological and technical factors, experienced human resources, financial resource provision and secure infrastructures on information technology security were significant (0.01). Moreover, information technology management and supporting regulations on security risk assessment have significant effects. The assessment of security risk has a significant effect on information security. Additionally, information security management and supporting regulations have a significant effect on Goal setting (0.01). Goal setting has a significant effect on environmental and physical security. Based on the results, the evaluated model of the research could explain 0.53 of information security management, 0.50 of security evaluation, 0.36 of goal setting, 0.55 of information security, and 0.35 of environmental security.

Keywords

Main Subjects


Alam, T. (2020). Cloud computing and its role in information technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), 108-115.
Chang, V. I. (2020). A proposed framework for cloud computing adoption. In Sustainable Business: Concepts, Methodologies, Tools, and Applications (pp. 978-1003). IGI Global.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chaturvedi, C., & Gupta, B. B. (2020). Cloud computing security: Taxonomy of issues, challenges, case studies, and solutions. In Handbook of Research on Intrusion Detection Systems (pp. 306-325). IGI Global.
Dargazi Khojin, M. G. (2015). Introduction of a new method for data protection against data attacks in mobile cloud computing. Tehran Payam-e Noor University. (Original work published in Persian)
Delgado, V. (2010). Exploring the limits of cloud computing. Master of Science Thesis, Stockholm, Sweden.
Ebayi Khorasani, F. (2016). Introduction of a method to enhance information security in cloud computing. Shahab Danesh Superior Education Institute-Computer and Electronic Faculty. (Original work published in Persian)
Erl, T., Cope, R., & Naserpour, A. (2015). Cloud computing design patterns. Prentice Hall Press.
Garg, K., & Singh, J. (2017). A Proposed Technique for Cloud Computing Security. In Innovations in Computer Science and Engineering (pp. 89-95). Springer, Singapore.
Juels, A., Oprea, A., & Bowers, K. D. (2017). Security Issues for Cloud Computing. Meta, 4(5).
Kanwal, A., Masood, R., Ghazia, U. E., Shibli, M. A., & Abbasi, A. G. (2013, August). Assessment criteria for trust models in cloud computing. In Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (pp. 254-261). IEEE.
Khayer, A., Talukder, M. S., Bao, Y., & Hossain, M. N. (2020). Cloud computing adoption and its impact on SMEs’ performance for cloud supported operations: A dual-stage analytical approach. Technology in Society, 60, 101225.
Mondal, A., Paul, S., Goswami, R. T., & Nath, S. (2020, January). Cloud computing security issues & challenges: A Review. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-5). IEEE.
PourMohamad, R. (2016). Introduction an access control model based on dynamic trust in cloud computing environment. Master's Thesis, Tabriz University. (Original work published in Persian)
Pourya Mameghani, K. (2015). Quality control model for information technology security threats in cloud computing. Shahed University, Engineering and Technical Faculty. (Original work published in Persian)
Qiu, M., & Gai, K. (2017). Mobile cloud computing: Models, implementation, and security. Chapman and Hall/CRC.
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology, 58, 44-57.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: Implementation, management, and security. CRC Press.
Salehi, A. (2017). Introduction of cloud computing acceptation model in Tehran hospitals. Tarbiat Modares University, Faculty of Accounting and Management. (Original work published in Persian)
Shoeibi, D. (2016). Introduction of a distributed penetration detection system to enhance security in cloud computing. Kerman Industrial and Technological Graduate Education, Privilege Sciences and Technologies University. (Original work published in Persian)
Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2015). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269-284.
Tsugawa, M., Matsunaga, A., & Fortes, J. A. (2014). Cloud computing security: What changes with software-defined networking? In Secure Cloud Computing (pp. 77-93). Springer New York.