The Study about Risk Assessment on Cloud Computing Security among Small and Medium – Sized Enterprises (SMES) in Malaysia
Lim Jia Hui1, Dhamayanthi Arumugam2, Suresh Balasingam3

1Lim Jia Hui, Asia Pacific University, Malaysia.
2Dhamayanthi Arumugam, Asia Pacific University, Malaysia.
3Suresh Balasingam, Asia Pacific University, Malaysia.
Manuscript received on 05 February 2019 | Revised Manuscript received on 11 February 2019 | Manuscript Published on 19 February 2019 | PP: 146-151 | Volume-7 Issue-5S January 2019 | Retrieval Number: ES2139017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The primary objective of this research is to study the risk factors affecting on the cloud computing security among small and medium-sized enterprises (SMEs) in Malaysia. In this research, the researcher intends to discovery the risks on the use of cloud computing because they may affect the operating of the organisations in Malaysia. The researcher uses the primary method to conduct the data. In this research, five different variables that affect the cloud computing security significantly which include data confidentiality, data integrity, availability of data, mutual trust and auditability of data. The data was collected from the employees who use the cloud services in Malaysia. Statistical Package of the Social Sciences (SPSS) is used to assess the relationships between the five variables which able to influence the cloud security among SMEs in Malaysia. The findings discovered that all the variables have significant relationship with the cloud computing security among the SMEs in Malaysia. The conclusion have been discussed in this research that the providers and users of cloud services have responsibilities to ensure there have a safe cloud environment. This research creats the awareness of the use of cloud computing in order to avoid the risk of the data being stole or hacked and build a peace cloud environment.
Keywords: Cloud Computing Security, Data Confidentiality, Data Integrity.
Scope of the Article: Cloud Computing