Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis

Saira Syed, Quazi Mamun

Research output: Book chapter/Published conference paperConference paperpeer-review


Despite economic pressure for business to cut costs and fervent assurances from cloud service providers, security remains a top barrier to cloud adoption. Interests in cloud computing are high and many organisations say they are planning to move in that direction. However, the reality is that only 20% of UK organisations are using infrastructure-as-a-service and only 36% are using software-as-a-service, according to the National Computing Centre (NCC, UK) research. Lack of trust in cloud computing is slowing broader adoption of cloud services. Therefore, it is important to understand the consumers’ perspective on cloud security concerns, especially data security issues. This allows the future research to proceed in the right direction to alleviate users’ concerns. In this paper, we present an empirical analysis of IT experts and professionals viewpoint related to security issues in clouds. The study is based on the surveys conducted by three different groups in the time period from 2010 to 2013. Qualitative research analysis is used to collect perception of IT experts and professionals by using interviewing technique. The viewpoints of the experts are then analysed and a qualitative and thematic analysis is presented. The study presents most critical threats, possible causes, and fundamental strategies to avoid them. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.
Original languageEnglish
Title of host publicationATCS 2014
Place of PublicationGermany
ISBN (Electronic)9783319238012
Publication statusPublished - 2014
EventInternational Workshop on Applications and Techniques in Cyber Security - Beijing, China, China
Duration: 24 Sept 201426 Sept 2014


WorkshopInternational Workshop on Applications and Techniques in Cyber Security


Dive into the research topics of 'Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis'. Together they form a unique fingerprint.

Cite this