
Prof. J. Leon Zhao
Ph.D., Head and Chair Professor of the Department of Information Systems
Contact: jlzhao@cityu.edu.hk
Written by Prof. Zhao
Deciding whether or not to adopt cloud computing services* has become a strategic decision in business organizations and other institutions (Byrne 2012). Among the factors to making such a decision is the concern about data security issues (Alexander 2008). In this short article, I would like to share a perspective on the potential impact of cloud computing on data security.
As well known (Oracle 2013), data security problems may be classified into three types: Confidentiality, Integrity, and Availability. The causes of data security breaches can be categorized as people-related causes and system-related causes. Let’s use this framework to discuss the potential impact of cloud computing on data security. However, this analysis is a generic study, and data security issues may vary across industries and across companies. For instance, data security issues of a large public hospital should be very different from those of a small financial brokerage firm.
The table below shows a contrast of data security capabilities in a two-by-two array. People-related security problems include the lack of training, lack of vigilance, loss of computing devices, data thieves and hackers, and intentional sabotages. System-related security problems include outdated technologies, lack of system upgrades, access control loopholes, irregular backups, and networking attacks.
| Security Problems | In-house Data Centers | Cloud Computing Services |
|---|---|---|
| People-related |
|
|
| System-related |
|
|
In general, cloud computing providers should have stronger capabilities in providing better data security at the data storage end. On the other hand, cloud computing providers cannot control data security issues directly at the user end.
The emergence of cloud computing is a natural step of economic progression towards higher productivity by transferring the data processing tasks from in-house data management teams into the hands of a fewer number of data management contractors equipped with a new generation of data processing equipment. This is an ongoing business transformation that will take the next twenty or more years to complete.
In fact, “not adopting cloud computing” will disappear as a real option. However, the issue is to choose which part of the company data into cloud computing. In this regard, business schools will need to teach managers how to make such decisions when adopting cloud computing as part of the strategic planning since their decisions will affect all users of the company including customers, employees, and business partners.
Clearly, data security is a valid concern of business managers that the cloud computing industry will have to resolve. Nevertheless, this new round of information revolution will lead to more productive and agile business organizations; those companies who cannot survive this cloud computing transformation will be left behind to wither.
References:
Note:
* Cloud computing is the use of third party computing resources (hardware and software) that are delivered as a service over the Internet. Top cloud computing providers in the US include VMware, Microsoft, Bluelock, Citrix, Verizon, Salesforce.com, Amazon Web Services, etc.
[ Back ]