Cloud Privacy and Security
VerifiedAdded on 2023/06/08
|18
|6014
|296
AI Summary
This report discusses the risks and threats to employee data in cloud computing, specifically for the organization Charity. It covers the data and information held in the current HR system, existing and additional threats and risks, privacy concerns for employees moving to a SaaS application, and an assessment of the resulting severity of risk and threat. The report also includes an operational solution and location(s) of the SaaS provider for HR management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD PRIVACY AND SECURITY
CLOUD PRIVACY AND SECURITY
Name of the Student
Name of the University
Author Note
CLOUD PRIVACY AND SECURITY
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction................................................................................................................................3
Data and information that the charity holds on its employees in the current HR system..........4
Existing threats and risks to the security of that data and information contained in the in-
house HR database.................................................................................................................4
Additional risks and threats to employee data that may arise after migration to a SaaS
application..............................................................................................................................6
Assessment of the resulting severity of risk and threat to employee data.............................6
Privacy of the data for those employees who will move to a SaaS application.........................7
Existing threats and risks to the security of that data and information contained in the in-
house HR database.................................................................................................................7
Additional risks and threats to employee data that may arise after migration to a SaaS
application..............................................................................................................................8
Assessment of the resulting severity of risk and threat to employee data.............................9
Threats and risks to the digital identities of charity employees from the move to SaaS
applications..............................................................................................................................10
Operational solution and location(s) of the SaaS provider for HR management.....................12
Conclusion................................................................................................................................14
References................................................................................................................................16
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction................................................................................................................................3
Data and information that the charity holds on its employees in the current HR system..........4
Existing threats and risks to the security of that data and information contained in the in-
house HR database.................................................................................................................4
Additional risks and threats to employee data that may arise after migration to a SaaS
application..............................................................................................................................6
Assessment of the resulting severity of risk and threat to employee data.............................6
Privacy of the data for those employees who will move to a SaaS application.........................7
Existing threats and risks to the security of that data and information contained in the in-
house HR database.................................................................................................................7
Additional risks and threats to employee data that may arise after migration to a SaaS
application..............................................................................................................................8
Assessment of the resulting severity of risk and threat to employee data.............................9
Threats and risks to the digital identities of charity employees from the move to SaaS
applications..............................................................................................................................10
Operational solution and location(s) of the SaaS provider for HR management.....................12
Conclusion................................................................................................................................14
References................................................................................................................................16
3
CLOUD PRIVACY AND SECURITY
Introduction
The cloud computing concepts can be considered very advanced technology in the
field of information technology and one of the major advancement in field of information
technology (Ali, Khan & Vasilakos, 2015). The technology has maintained the security
factors for the benefit of the clients and helps them in storing their data very efficiently in the
virtual databases in the cloud so that the data integrity and redundant data solutions are
available easily to their clients. The report is concerned with the organization name charity.
On the present scenario the organization is making use of the small data centre that consists
of 50 64-bit data servers which run in the windows for the desktop services and database files
services are included for the support. There are 10 Red Hat Enterprise Linux 5 servers in the
organization to service public facing Web pages, Web services and support. The organization
is looking to join a community cloud which would be provided by a cloud vendor and this
would enable them in providing the staffs and the administrative users which amounts to
around 500 various type of applications to use and also this would data that would be
generated from the use of the systems would also be very useful for the organization and
would be both time sensitive and confidential.
The community cloud would provide the organization the option to store around 200
TB of data which would be used for the SaaS database that is currently being run on the
public cloud vendor’s servers. I am the principle consultant for the community based Charity.
The main details of the cloud services, risk assessment and security and privacy aspects of the
Charity has been provided in this report.
The report consists the details of the data and information that the charity holds on its
employees in the current HR system, Privacy of the data for those employees who will move
to a SaaS application, Threats and risks to the digital identities of charity employees from the
CLOUD PRIVACY AND SECURITY
Introduction
The cloud computing concepts can be considered very advanced technology in the
field of information technology and one of the major advancement in field of information
technology (Ali, Khan & Vasilakos, 2015). The technology has maintained the security
factors for the benefit of the clients and helps them in storing their data very efficiently in the
virtual databases in the cloud so that the data integrity and redundant data solutions are
available easily to their clients. The report is concerned with the organization name charity.
On the present scenario the organization is making use of the small data centre that consists
of 50 64-bit data servers which run in the windows for the desktop services and database files
services are included for the support. There are 10 Red Hat Enterprise Linux 5 servers in the
organization to service public facing Web pages, Web services and support. The organization
is looking to join a community cloud which would be provided by a cloud vendor and this
would enable them in providing the staffs and the administrative users which amounts to
around 500 various type of applications to use and also this would data that would be
generated from the use of the systems would also be very useful for the organization and
would be both time sensitive and confidential.
The community cloud would provide the organization the option to store around 200
TB of data which would be used for the SaaS database that is currently being run on the
public cloud vendor’s servers. I am the principle consultant for the community based Charity.
The main details of the cloud services, risk assessment and security and privacy aspects of the
Charity has been provided in this report.
The report consists the details of the data and information that the charity holds on its
employees in the current HR system, Privacy of the data for those employees who will move
to a SaaS application, Threats and risks to the digital identities of charity employees from the
4
CLOUD PRIVACY AND SECURITY
move to SaaS applications and additional information regarding the Operational solution and
location(s) of the SaaS provider for HR management.
Data and information of the charity of the employees in the current HR
system
Threats and risks in the present data and information of the HR database
The designs of the intrusion of the data storage system to any type of organization
designed frequently by the hacking experts. The confidential data of the organization are to
be safeguarded from these attackers but often this is not possible for the developers to create
systems which are fool proof and hence, the intrusion and the data loses takes place (Ali,
Khan & Vasilakos, 2015). The main reason for which the databases of the organizations are
targeted by the hackers are that all the information of an organization is stored in the
database. Additionally, all the details of the employees are stored in the HR database of an
organization and hence, the breach of security for the database would result in a huge amount
of data to fall into the hands of the external individual and this might cause huge widespread
effects on the organization. For instances if the salary information of the employees of the
organization are leaked out to the other organizations then they can take advantages of the
payment of the other organizations and can tempt them into signing for their organization.
The main risks that the HR database faces from the hackers are that excessive privilege. In
situations where the employees are granted the full access to the HR database of the company
there can be abuse of power by the employees of the organization and these access can
sometimes exceed the job functions of the employees (Ganbgwar & Ramaswamy, 2015). The
companies also sometimes fail to set up the correct access control features for the employees
of the organization and this can affect the organization to give rise to the data related issues
within the organization. In addition to this, there are threats that can arise from the legitimate
CLOUD PRIVACY AND SECURITY
move to SaaS applications and additional information regarding the Operational solution and
location(s) of the SaaS provider for HR management.
Data and information of the charity of the employees in the current HR
system
Threats and risks in the present data and information of the HR database
The designs of the intrusion of the data storage system to any type of organization
designed frequently by the hacking experts. The confidential data of the organization are to
be safeguarded from these attackers but often this is not possible for the developers to create
systems which are fool proof and hence, the intrusion and the data loses takes place (Ali,
Khan & Vasilakos, 2015). The main reason for which the databases of the organizations are
targeted by the hackers are that all the information of an organization is stored in the
database. Additionally, all the details of the employees are stored in the HR database of an
organization and hence, the breach of security for the database would result in a huge amount
of data to fall into the hands of the external individual and this might cause huge widespread
effects on the organization. For instances if the salary information of the employees of the
organization are leaked out to the other organizations then they can take advantages of the
payment of the other organizations and can tempt them into signing for their organization.
The main risks that the HR database faces from the hackers are that excessive privilege. In
situations where the employees are granted the full access to the HR database of the company
there can be abuse of power by the employees of the organization and these access can
sometimes exceed the job functions of the employees (Ganbgwar & Ramaswamy, 2015). The
companies also sometimes fail to set up the correct access control features for the employees
of the organization and this can affect the organization to give rise to the data related issues
within the organization. In addition to this, there are threats that can arise from the legitimate
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
CLOUD PRIVACY AND SECURITY
privilege abuse in which the people who are allowed the access control to the database are
making a misuse of the access to the database and may leak out the access details to the
outsiders which would be enabling the hackers and the wrong doers the chance of getting the
important information about the employees of the organization and selling them out to the
rivals or the people who can benefit from the data leak (Oliveira, Thomas & Espadanal,
2014). This also involves the storage media exposure and this process involves the attack on
the backup storage which is left completely unprotected. If there is proper monitoring of the
activities about the tasks performed on the database, then this type of intrusions can be
detected and most probably avoided but the low –level access control to the backup disks and
tapes would be increasing the risk of the data being exposed to the external individuals (Ali,
Khan & Vasilakos, 2015). Additionally, it has also been noted that 30 percent of the breaches
in the data of organizations takes place due to the human negligence, and it is often the case
where there is lack of expertise in the field by the staffs and the security controls which are
exposed.
Exploitation of the vulnerable database also makes the databases of the organizations
extremely vulnerable; this is because sometimes the organizations have difficulty in patching
up their database and it take a long time after some error has occurred in the database and it
requires efficient fixations which would bring it back to its previous state (Avram, 2014).
This is utilized by the attackers who takes advantage of the unpatched sectors of the database
and makes use of the default accounts and configurations of the database. Additionally, the
organizations are sometimes inefficient in applying the patches to the database systems and
make the mistakes of leaving their data unprotected and making it easier for the external
agents. The data which is unmanaged also falls into the hands of the external agents and they
use this opportunity to the fullest extent and saves the critical data objects to their accounts
CLOUD PRIVACY AND SECURITY
privilege abuse in which the people who are allowed the access control to the database are
making a misuse of the access to the database and may leak out the access details to the
outsiders which would be enabling the hackers and the wrong doers the chance of getting the
important information about the employees of the organization and selling them out to the
rivals or the people who can benefit from the data leak (Oliveira, Thomas & Espadanal,
2014). This also involves the storage media exposure and this process involves the attack on
the backup storage which is left completely unprotected. If there is proper monitoring of the
activities about the tasks performed on the database, then this type of intrusions can be
detected and most probably avoided but the low –level access control to the backup disks and
tapes would be increasing the risk of the data being exposed to the external individuals (Ali,
Khan & Vasilakos, 2015). Additionally, it has also been noted that 30 percent of the breaches
in the data of organizations takes place due to the human negligence, and it is often the case
where there is lack of expertise in the field by the staffs and the security controls which are
exposed.
Exploitation of the vulnerable database also makes the databases of the organizations
extremely vulnerable; this is because sometimes the organizations have difficulty in patching
up their database and it take a long time after some error has occurred in the database and it
requires efficient fixations which would bring it back to its previous state (Avram, 2014).
This is utilized by the attackers who takes advantage of the unpatched sectors of the database
and makes use of the default accounts and configurations of the database. Additionally, the
organizations are sometimes inefficient in applying the patches to the database systems and
make the mistakes of leaving their data unprotected and making it easier for the external
agents. The data which is unmanaged also falls into the hands of the external agents and they
use this opportunity to the fullest extent and saves the critical data objects to their accounts
6
CLOUD PRIVACY AND SECURITY
and sensitive data of the employees is then used against them to force them to make decisions
which they would not have made in the other situations (Botta et al., 2014).
Additional risks and threats to employee data
Additionally, there are the risks of the database injection attacks that is used by the
attackers. There are two types of injection attacks that takes place in a database system which
is used as a SaaS. The injections are also of two types one is the SQL injections that is used
for targeting the database which makes use of the conventional methods for storing the data
and the NoSQL database which stores the data of the organization using the big data
techniques. Although the big data solutions are no respondent to the SQL injection attacks
therefore there is no use of the SQL based injections in the intrusion of the susceptible and
classification of the attack (Yan et al., 2016). The other type of cyber-attacks that can be
applied on the database is the denial of services, this would be interrupting the procedures of
the organization and also make the processing systems of the organization unavailable to the
intended for a long period of time. This halts the important tasks of the organization.
Assessment of the resulting severity of risk and threat to employee data
There are a number of risks and threat that are associated with the employee data
stored in the HR databases of the organization. Additionally, there are threats in the system
even after the migration of the databases to the SaaS services (Sanaei et v al., 2014). In
addition to this, classification of these threats involved very complex procedures as all the
processes hampers the organization. The migration of the database had helped the
organization in their process of data storage to a great extent but the risks of the database still
exists. The risks that are encountered in the system can be judged according to their severity
which can be distinguished into three categories namely, High, Medium and Low risks. The
high level risks would be causing widespread effects within the organization and the Medium
CLOUD PRIVACY AND SECURITY
and sensitive data of the employees is then used against them to force them to make decisions
which they would not have made in the other situations (Botta et al., 2014).
Additional risks and threats to employee data
Additionally, there are the risks of the database injection attacks that is used by the
attackers. There are two types of injection attacks that takes place in a database system which
is used as a SaaS. The injections are also of two types one is the SQL injections that is used
for targeting the database which makes use of the conventional methods for storing the data
and the NoSQL database which stores the data of the organization using the big data
techniques. Although the big data solutions are no respondent to the SQL injection attacks
therefore there is no use of the SQL based injections in the intrusion of the susceptible and
classification of the attack (Yan et al., 2016). The other type of cyber-attacks that can be
applied on the database is the denial of services, this would be interrupting the procedures of
the organization and also make the processing systems of the organization unavailable to the
intended for a long period of time. This halts the important tasks of the organization.
Assessment of the resulting severity of risk and threat to employee data
There are a number of risks and threat that are associated with the employee data
stored in the HR databases of the organization. Additionally, there are threats in the system
even after the migration of the databases to the SaaS services (Sanaei et v al., 2014). In
addition to this, classification of these threats involved very complex procedures as all the
processes hampers the organization. The migration of the database had helped the
organization in their process of data storage to a great extent but the risks of the database still
exists. The risks that are encountered in the system can be judged according to their severity
which can be distinguished into three categories namely, High, Medium and Low risks. The
high level risks would be causing widespread effects within the organization and the Medium
7
CLOUD PRIVACY AND SECURITY
and Low level risks would be causing effects which can be mitigated accordingly, but not as
severe as the high level risks.
For instances the risks of hacker attacks such as the denial of service is a high risk
attack the effects of the attack can hamper the organization to a great extent and the effect
would be very severe both for the organization and the employees (Avram, 2014). In addition
to this there are other risks such as the compromises in the development of a secure database
and also this would be enabling the attacker an easy access to the database of the
organization, however this can be mitigated easily and hence, this would have considered as a
medium level risk and the other risks can be considered as the low level risks.
Privacy of the data for those employees who will move to a SaaS
application
Threat and risk in the present database
For the Charity organization there are various type of risks which are to be considered
for the data security of the employees. The major concerns which are to be considered is that
access to the data of the employees and only person to allowed access to the data of the
employees are the people in the management and the administrator. The security of the data is
to be judged from the different type of security solutions which would be provided by the
cloud service providers. For instances there can be an insecure device which is connected to
the network and the device would be able to perform the possible attack on the system of the
organization and can fetch the details of the employee data (Oliveira, Thomas & Espadanal,
2014). The threat of data outflow is increased when employees use their mobile devices to
access and share corporate documents via services that provides the cloud storage option such
as Dropbox and Google Drive. Another huge factor that can affect the security of the
employees’ data is the transfer of the password in between the cloud providers and the
CLOUD PRIVACY AND SECURITY
and Low level risks would be causing effects which can be mitigated accordingly, but not as
severe as the high level risks.
For instances the risks of hacker attacks such as the denial of service is a high risk
attack the effects of the attack can hamper the organization to a great extent and the effect
would be very severe both for the organization and the employees (Avram, 2014). In addition
to this there are other risks such as the compromises in the development of a secure database
and also this would be enabling the attacker an easy access to the database of the
organization, however this can be mitigated easily and hence, this would have considered as a
medium level risk and the other risks can be considered as the low level risks.
Privacy of the data for those employees who will move to a SaaS
application
Threat and risk in the present database
For the Charity organization there are various type of risks which are to be considered
for the data security of the employees. The major concerns which are to be considered is that
access to the data of the employees and only person to allowed access to the data of the
employees are the people in the management and the administrator. The security of the data is
to be judged from the different type of security solutions which would be provided by the
cloud service providers. For instances there can be an insecure device which is connected to
the network and the device would be able to perform the possible attack on the system of the
organization and can fetch the details of the employee data (Oliveira, Thomas & Espadanal,
2014). The threat of data outflow is increased when employees use their mobile devices to
access and share corporate documents via services that provides the cloud storage option such
as Dropbox and Google Drive. Another huge factor that can affect the security of the
employees’ data is the transfer of the password in between the cloud providers and the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
CLOUD PRIVACY AND SECURITY
organization, this would enable the providers to leak the data and allow them unlimited
access to the data of the users. In addition to this, the providers can also be too casual at times
which might lead to the leaking of the data of the employees to the outsiders and this would
hamper the privacy of data for both the organization and employees (Yan et al., 2016). Most
Cloud service providers do not pay attention to the security of their APIs which will put into
risk enterprise data with are related to privacy and data integrity This would not only hamper
the privacy of the employees but also can cause various type of problems for them such
fabricating their data for wrong purposes and using their data for wrong deeds (Sanaei et v
al., 2014). The organization also holds a huge amount data and this is replicated among the
various facilities issued by the organization. This also provides the intruders to access the
data of the employees from the online databases of the organization. Encryption is technique
that helps both the cloud service provider and the organization in protecting their data
efficiently and makes the security contains very difficult to crack. Most government
regulations (HIPAA, PCI) require that data encryption. Although encryption is widely used,
it is often implemented poorly (Hasem et al., 2015). This can bring about various type of
insecurities for the data of the organization and employees as well and this would allow the
intruders to get into the private network of the organization.
Additional risks and threats to employee data
Additionally, it is recommended to the employees of every organization to maintain
very strong and useful passwords that would protect their account and data from the external
intruders but there are various options in the cloud services to provide their users with the
facilities such as master keys but if the key falls in the hands of the intruder he can fetch all
the data of the users and can make alterations to the actual data or stole very confidential
information which are stored in the accounts of the users. Managing and storing these keys in
a safe and secure location is of paramount importance when it comes to keeping the entire
CLOUD PRIVACY AND SECURITY
organization, this would enable the providers to leak the data and allow them unlimited
access to the data of the users. In addition to this, the providers can also be too casual at times
which might lead to the leaking of the data of the employees to the outsiders and this would
hamper the privacy of data for both the organization and employees (Yan et al., 2016). Most
Cloud service providers do not pay attention to the security of their APIs which will put into
risk enterprise data with are related to privacy and data integrity This would not only hamper
the privacy of the employees but also can cause various type of problems for them such
fabricating their data for wrong purposes and using their data for wrong deeds (Sanaei et v
al., 2014). The organization also holds a huge amount data and this is replicated among the
various facilities issued by the organization. This also provides the intruders to access the
data of the employees from the online databases of the organization. Encryption is technique
that helps both the cloud service provider and the organization in protecting their data
efficiently and makes the security contains very difficult to crack. Most government
regulations (HIPAA, PCI) require that data encryption. Although encryption is widely used,
it is often implemented poorly (Hasem et al., 2015). This can bring about various type of
insecurities for the data of the organization and employees as well and this would allow the
intruders to get into the private network of the organization.
Additional risks and threats to employee data
Additionally, it is recommended to the employees of every organization to maintain
very strong and useful passwords that would protect their account and data from the external
intruders but there are various options in the cloud services to provide their users with the
facilities such as master keys but if the key falls in the hands of the intruder he can fetch all
the data of the users and can make alterations to the actual data or stole very confidential
information which are stored in the accounts of the users. Managing and storing these keys in
a safe and secure location is of paramount importance when it comes to keeping the entire
9
CLOUD PRIVACY AND SECURITY
cloud database safe and secure. Most companies store both encryption and decryption key on
the same database which can be detrimental for security (Yan et al., 2016). Multi-tenancy is
process used by the hackers for thecustomers who share the same cloud database.
Assessment of the resulting severity of risk and threat to employee data
The assessments of the security risks for the threat to the data of the data of the
employees is a complex procedure. The Cloud service provides generally provide the
consumers with the parameters for safeguarding their data. Both the consumers and the
providers of the cloud services are notified of the type of hazards that can take place due to
the adoption of the cloud services. The cloud services generally look for the implementation
of the safer methods for the organizations and their employees but the mitigation of the risks
which are involved with the cloud solution acceptance generally depends on the complexities
of the risks and services from which the risks arises (Sanaei et v al., 2014). The risks that are
encountered in the system can be judged according to their severity which can be
distinguished into three categories namely, High, Medium and Low risks. The high level risks
would be causing widespread effects within the organization and the Medium and Low level
risks would be causing effects which can be mitigated accordingly, but not as severe as the
high level risks.
The high level risks are the risks of Key management and the Multi-tenancy. The
threats arising from these are very high as if for once the data of the key is available to the
hacker then he can gain an unlimited access to the data and the private information of the
users. In addition to this, the Encryption is a risk of medium level as the threat arising from
this risk are very severe, but the mitigation of the risk is also available and these procedures
can be improved easily with the improvement in the overall procedures of the organization.
The risk of insecurities in the API created by the cloud service providers are considered as the
low level risks as these risks can be mitigated easily and with a bit of improvement in overall
CLOUD PRIVACY AND SECURITY
cloud database safe and secure. Most companies store both encryption and decryption key on
the same database which can be detrimental for security (Yan et al., 2016). Multi-tenancy is
process used by the hackers for thecustomers who share the same cloud database.
Assessment of the resulting severity of risk and threat to employee data
The assessments of the security risks for the threat to the data of the data of the
employees is a complex procedure. The Cloud service provides generally provide the
consumers with the parameters for safeguarding their data. Both the consumers and the
providers of the cloud services are notified of the type of hazards that can take place due to
the adoption of the cloud services. The cloud services generally look for the implementation
of the safer methods for the organizations and their employees but the mitigation of the risks
which are involved with the cloud solution acceptance generally depends on the complexities
of the risks and services from which the risks arises (Sanaei et v al., 2014). The risks that are
encountered in the system can be judged according to their severity which can be
distinguished into three categories namely, High, Medium and Low risks. The high level risks
would be causing widespread effects within the organization and the Medium and Low level
risks would be causing effects which can be mitigated accordingly, but not as severe as the
high level risks.
The high level risks are the risks of Key management and the Multi-tenancy. The
threats arising from these are very high as if for once the data of the key is available to the
hacker then he can gain an unlimited access to the data and the private information of the
users. In addition to this, the Encryption is a risk of medium level as the threat arising from
this risk are very severe, but the mitigation of the risk is also available and these procedures
can be improved easily with the improvement in the overall procedures of the organization.
The risk of insecurities in the API created by the cloud service providers are considered as the
low level risks as these risks can be mitigated easily and with a bit of improvement in overall
10
CLOUD PRIVACY AND SECURITY
development features which can be used for the advanced features of security for the clouds
functionalities.
Threats and risks to the digital identities of charity employees
The Charity Organization is making considerations about the SaaS services from the
cloud vendors and this is can be very risky at times for the organization. Firstly, if the
authorized digital identity of the users of the system are compromised by the organization,
then the intrusion on the account of the user which would in turn make the whole
organization vulnerable to the external threats. In addition to this, the authentication and the
authorization of the users in the web can also take place without proper security checks as the
data for the security check can be easily stolen by the attacker and the attacker would be able
to gain access to the different sites which are accessed by the users. In addition to this, the
web access management tricks can also be applied with the identity of the users to obtain
important information so that they can be used against the users at point of time.
Secondly, the context of identity is also very important for the users as the this can
cause very critical situation for the insider threats for the organization. In addition to this the
cloud, mobile and social transformations taking place rapidly that would be eroding away the
traditional security systems present in the different type of applications. As a result of this,
the multiple perimeters around the resources of the enterprise, the interaction with the
business partners and cloud –based services are also contributing greatly to the threats for the
access to the key data of the individuals. For instances the extranet service access for the
mobile users has a resemblance of the end of consumer access (Hasem et al., 2015). The IT
employees who are outsourced having digital identity which is still authenticable from the
previous organization can use it to fetch some important data from the organizations they
previously they worked for and this data can be used to leverage against the organization and
CLOUD PRIVACY AND SECURITY
development features which can be used for the advanced features of security for the clouds
functionalities.
Threats and risks to the digital identities of charity employees
The Charity Organization is making considerations about the SaaS services from the
cloud vendors and this is can be very risky at times for the organization. Firstly, if the
authorized digital identity of the users of the system are compromised by the organization,
then the intrusion on the account of the user which would in turn make the whole
organization vulnerable to the external threats. In addition to this, the authentication and the
authorization of the users in the web can also take place without proper security checks as the
data for the security check can be easily stolen by the attacker and the attacker would be able
to gain access to the different sites which are accessed by the users. In addition to this, the
web access management tricks can also be applied with the identity of the users to obtain
important information so that they can be used against the users at point of time.
Secondly, the context of identity is also very important for the users as the this can
cause very critical situation for the insider threats for the organization. In addition to this the
cloud, mobile and social transformations taking place rapidly that would be eroding away the
traditional security systems present in the different type of applications. As a result of this,
the multiple perimeters around the resources of the enterprise, the interaction with the
business partners and cloud –based services are also contributing greatly to the threats for the
access to the key data of the individuals. For instances the extranet service access for the
mobile users has a resemblance of the end of consumer access (Hasem et al., 2015). The IT
employees who are outsourced having digital identity which is still authenticable from the
previous organization can use it to fetch some important data from the organizations they
previously they worked for and this data can be used to leverage against the organization and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
CLOUD PRIVACY AND SECURITY
can turn them into a position of disadvantage. For instances the recent security features of
google allows the individuals to bind all their devices to a single account and if this, account
gets hacked by an attacker then the attacker might get access to all the devices which are
being used by the user.
The charity organization had used the IT-driven identity management for the
governance of the access control of the employees of the organization, the partners who are
involved with the organizations and the contractors who would be supporting their
compliance posture which are regulatory (Yan et al., 2016). It also offers the Charity
organization the opportunity to be productive and introduce ways for the business to include
the new era of computing the technologies and auditing and risking the teams for the demand
of answering the simplistic queries (Hasem et al., 2015). The identity management systems
which are very efficient and stores the identities of all the employees in the organization
helps organization to keep a track of their employees and this helps them in auditing the
performances of the employees and the risk management involving the security of the
organization.
Additionally, there are cases of the Shared Vulnerabilities and Data Loss for the
systems. The cloud provides the organizations with the preventive options for defending their
data against the outsiders and protection of data of the employees of the Charity organization
and major provides makes use of the security keys which are used by the access restrictions
and files which are saved online for the individuals (Hasem et al., 2015). In addition to this,
the multi-factor authentication is used by the cloud providers so that the individuals can
safeguard their digital identities from the external attackers and data for the cloud can be lost
through the attacks that are of malicious nature and the natural disasters and the data wipe by
the service providers would be devastating to the organization in case there are no backup
options available to the organization for restoring their data in the storage area (Etro, 2015).
CLOUD PRIVACY AND SECURITY
can turn them into a position of disadvantage. For instances the recent security features of
google allows the individuals to bind all their devices to a single account and if this, account
gets hacked by an attacker then the attacker might get access to all the devices which are
being used by the user.
The charity organization had used the IT-driven identity management for the
governance of the access control of the employees of the organization, the partners who are
involved with the organizations and the contractors who would be supporting their
compliance posture which are regulatory (Yan et al., 2016). It also offers the Charity
organization the opportunity to be productive and introduce ways for the business to include
the new era of computing the technologies and auditing and risking the teams for the demand
of answering the simplistic queries (Hasem et al., 2015). The identity management systems
which are very efficient and stores the identities of all the employees in the organization
helps organization to keep a track of their employees and this helps them in auditing the
performances of the employees and the risk management involving the security of the
organization.
Additionally, there are cases of the Shared Vulnerabilities and Data Loss for the
systems. The cloud provides the organizations with the preventive options for defending their
data against the outsiders and protection of data of the employees of the Charity organization
and major provides makes use of the security keys which are used by the access restrictions
and files which are saved online for the individuals (Hasem et al., 2015). In addition to this,
the multi-factor authentication is used by the cloud providers so that the individuals can
safeguard their digital identities from the external attackers and data for the cloud can be lost
through the attacks that are of malicious nature and the natural disasters and the data wipe by
the service providers would be devastating to the organization in case there are no backup
options available to the organization for restoring their data in the storage area (Etro, 2015).
12
CLOUD PRIVACY AND SECURITY
Hence there has been many recommendations about reviewing the data storage efficiently on
the cloud before uploading the data online.
Operational solution and location(s) of the SaaS provider
Lately the adoption of the cloud based software as a Service option has been one of
the major trends in the business of the organizations (Yan et al., 2016). However, the
organizations have been facing various type of challenges in receiving out the expected
benefits for the organization. The solutions would be very beneficial for the organization as
they have been able to provide an efficient integration in between the HR and business
objectives of the organizations.
For the company it can be suggested that the Charity organization makes use of the
human Capital Management system that would be suiting them to align effectively with the
business strategy of the enterprise-wide employee management strategy and data
management strategy (Oliveira, Thomas & Espadanal, 2014). The Charity organization
likewise trusted it would profit by maintaining a strategic plan from the overwhelming
customization required with an ERP-based arrangement. The stage would give an expansive
cluster of ability administration devices. For instances enlisting, on boarding, learning,
execution, pay, and progression (Etro, 2015). The HR procedure of the charity organization
puts the importance first: utilizing viable practices to convey HR usefulness to justify the
business choices. There has been a huge in rese in the number of cybercrimes that are taking
place in the organizations and the Charity Organization has been no exception in this field. In
the case study this procedure can bolster execution of SaaS without additional; process
reengineering. Charity organizations can utilize the HR system to scale new abilities for the
expansion. It can be an excellent match for associations that would compare with their
current HR frameworks and information. The procedure can likewise help associations that at
CLOUD PRIVACY AND SECURITY
Hence there has been many recommendations about reviewing the data storage efficiently on
the cloud before uploading the data online.
Operational solution and location(s) of the SaaS provider
Lately the adoption of the cloud based software as a Service option has been one of
the major trends in the business of the organizations (Yan et al., 2016). However, the
organizations have been facing various type of challenges in receiving out the expected
benefits for the organization. The solutions would be very beneficial for the organization as
they have been able to provide an efficient integration in between the HR and business
objectives of the organizations.
For the company it can be suggested that the Charity organization makes use of the
human Capital Management system that would be suiting them to align effectively with the
business strategy of the enterprise-wide employee management strategy and data
management strategy (Oliveira, Thomas & Espadanal, 2014). The Charity organization
likewise trusted it would profit by maintaining a strategic plan from the overwhelming
customization required with an ERP-based arrangement. The stage would give an expansive
cluster of ability administration devices. For instances enlisting, on boarding, learning,
execution, pay, and progression (Etro, 2015). The HR procedure of the charity organization
puts the importance first: utilizing viable practices to convey HR usefulness to justify the
business choices. There has been a huge in rese in the number of cybercrimes that are taking
place in the organizations and the Charity Organization has been no exception in this field. In
the case study this procedure can bolster execution of SaaS without additional; process
reengineering. Charity organizations can utilize the HR system to scale new abilities for the
expansion. It can be an excellent match for associations that would compare with their
current HR frameworks and information. The procedure can likewise help associations that at
13
CLOUD PRIVACY AND SECURITY
present have manual procedures or utilize HR innovation on a restricted premise, and need to
rapidly execute mechanized procedures on a far reaching premise (Sanaei et v al., 2014). In
addition to this for the in-depth security for the data in the cloud storage of the organization
the Charity Organization would be considering various type of security features. The cloud
suppliers in any setting don't give the security component which would be incorporated into
the working of the information. In the idea of the cloud, the client or the association does not
have any idea of the place the information is put away this can be considered as an issue since
security perspectives would be broken in this specific circumstance. There are distinctive
areas which ought to be thought about in the part of giving arrangement issue are the
passageway of the staffs of the Charity Organization, the security of the information which is
put away (Mei, Li & Li 2017). Before the organization is ready to adopt the cloud
infrastructure for the storage of the data, they should be having a control on the data input and
outputs and they should also be able manage the over cloud data features and infrastructure of
the cloud facilities. The access control of the information onto who can have guide access to
the information, how and from where the information can be gotten to and the time which is
associated with the procedure which is engaged with the recovery of the information. The
principle risk factor which can be incorporated into this setting is the issue identified with
moral survey to the record. The username and the password word which are set ought to be
sufficiently solid with the goal that assailants can't straightforwardly get incorporated into the
idea. The cloud supplier ought to have the capacity to identify the issue at a beginning time
with the goal that it doesn't fortify an issue which is identified with the break of data ( Sadiku,
Musa & Momoh, 2014). One of the exemptions which can be expressed here is that when a
private cloud is being utilized on premises of the client. Protection, security and consistence
can be considered as a duty which is legally binding between the client and the cloud
supplier. It can be expressed that the cloud supplier's risk is especially restricted. It is
CLOUD PRIVACY AND SECURITY
present have manual procedures or utilize HR innovation on a restricted premise, and need to
rapidly execute mechanized procedures on a far reaching premise (Sanaei et v al., 2014). In
addition to this for the in-depth security for the data in the cloud storage of the organization
the Charity Organization would be considering various type of security features. The cloud
suppliers in any setting don't give the security component which would be incorporated into
the working of the information. In the idea of the cloud, the client or the association does not
have any idea of the place the information is put away this can be considered as an issue since
security perspectives would be broken in this specific circumstance. There are distinctive
areas which ought to be thought about in the part of giving arrangement issue are the
passageway of the staffs of the Charity Organization, the security of the information which is
put away (Mei, Li & Li 2017). Before the organization is ready to adopt the cloud
infrastructure for the storage of the data, they should be having a control on the data input and
outputs and they should also be able manage the over cloud data features and infrastructure of
the cloud facilities. The access control of the information onto who can have guide access to
the information, how and from where the information can be gotten to and the time which is
associated with the procedure which is engaged with the recovery of the information. The
principle risk factor which can be incorporated into this setting is the issue identified with
moral survey to the record. The username and the password word which are set ought to be
sufficiently solid with the goal that assailants can't straightforwardly get incorporated into the
idea. The cloud supplier ought to have the capacity to identify the issue at a beginning time
with the goal that it doesn't fortify an issue which is identified with the break of data ( Sadiku,
Musa & Momoh, 2014). One of the exemptions which can be expressed here is that when a
private cloud is being utilized on premises of the client. Protection, security and consistence
can be considered as a duty which is legally binding between the client and the cloud
supplier. It can be expressed that the cloud supplier's risk is especially restricted. It is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
CLOUD PRIVACY AND SECURITY
especially imperative to mull over that ones the information which are delicate are set in the
cloud, the association can never again have control over the information, and it wins in the
region of the cloud suppliers. Additionally, it is to be noted that there should be laws that
would be used in the organization and the cloud provider should be incorporating those laws
into their business which would enable them to provide their clients with the facilities of
security data storing options (Diaz, Martin & Rubio, 2016). Hence, the Charity organization
should be obtaining their solution from such an organization who would be able to provide
them with such features and have the policies incorporated in their business agendas. There
are also issues with the access points of the data storage which would be accessible only to
the employees of the organization and should be sealed off for the outsiders of the
organization. In case the organization makes use of the cloud databases and infrastructures
the provider of the cloud services should be providing a detailed report of the services that
they would be providing to the detailed report of the implementation of the cloud services for
the organization (Gai et al., 2016). In addition to this, the organization is also to be notified
about the procedures that are to be improved and the process that would be included in the
development of the cloud security system.
Conclusion
For conclusion it can be said that the cloud technology has helped both the clients and
the organization in rescuing the complexities regarding the data storage and platform
procurement. There are other important techniques provided by the cloud facilities that would
be helping the organization in providing the best services to their clients. In addition to this,
the main purpose for the cloud concept is to include the facility of the adaptability for the
organizations which would help them in acquiring the desired performance to help their client
in achieving the desired results. The technology has also maintained the security factors for
the benefit of the clients and helps them in storing their data very efficiently in the virtual
CLOUD PRIVACY AND SECURITY
especially imperative to mull over that ones the information which are delicate are set in the
cloud, the association can never again have control over the information, and it wins in the
region of the cloud suppliers. Additionally, it is to be noted that there should be laws that
would be used in the organization and the cloud provider should be incorporating those laws
into their business which would enable them to provide their clients with the facilities of
security data storing options (Diaz, Martin & Rubio, 2016). Hence, the Charity organization
should be obtaining their solution from such an organization who would be able to provide
them with such features and have the policies incorporated in their business agendas. There
are also issues with the access points of the data storage which would be accessible only to
the employees of the organization and should be sealed off for the outsiders of the
organization. In case the organization makes use of the cloud databases and infrastructures
the provider of the cloud services should be providing a detailed report of the services that
they would be providing to the detailed report of the implementation of the cloud services for
the organization (Gai et al., 2016). In addition to this, the organization is also to be notified
about the procedures that are to be improved and the process that would be included in the
development of the cloud security system.
Conclusion
For conclusion it can be said that the cloud technology has helped both the clients and
the organization in rescuing the complexities regarding the data storage and platform
procurement. There are other important techniques provided by the cloud facilities that would
be helping the organization in providing the best services to their clients. In addition to this,
the main purpose for the cloud concept is to include the facility of the adaptability for the
organizations which would help them in acquiring the desired performance to help their client
in achieving the desired results. The technology has also maintained the security factors for
the benefit of the clients and helps them in storing their data very efficiently in the virtual
15
CLOUD PRIVACY AND SECURITY
databases in the cloud so that the data integrity and redundant data solutions are available
easily to their clients. However, there are different type of risk factors which are to be
considered during a cloud service deployment, although these security concerns are to be
encountered with by the organization at the higher end technological advancements. The
concepts of cloud have provided the organizations with the ability to spend time for the
critical activities which takes places internally within the organization and doesn’t require
them to concentrate on the security concern for the system of the organization. The report is
concerned with the Charity who is looking to join a community cloud which would be
provided by a cloud vendor and this would enable them in providing the staffs and the
administrative users various type of applications to use and also this would data that would be
generated from the use of the systems would also be very useful for the organization and
would be both time sensitive and confidential. Hence, the report has been used for the
description of the cloud security and privacy of the Charity and the different type of security
features for the storage of the data of the organization by the cloud vendor.
CLOUD PRIVACY AND SECURITY
databases in the cloud so that the data integrity and redundant data solutions are available
easily to their clients. However, there are different type of risk factors which are to be
considered during a cloud service deployment, although these security concerns are to be
encountered with by the organization at the higher end technological advancements. The
concepts of cloud have provided the organizations with the ability to spend time for the
critical activities which takes places internally within the organization and doesn’t require
them to concentrate on the security concern for the system of the organization. The report is
concerned with the Charity who is looking to join a community cloud which would be
provided by a cloud vendor and this would enable them in providing the staffs and the
administrative users various type of applications to use and also this would data that would be
generated from the use of the systems would also be very useful for the organization and
would be both time sensitive and confidential. Hence, the report has been used for the
description of the cloud security and privacy of the Charity and the different type of security
features for the storage of the data of the organization by the cloud vendor.
16
CLOUD PRIVACY AND SECURITY
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the
integration of Internet of things and cloud computing. Journal of Network and
Computer Applications, 67, 99-117.
Etro, F. (2015). The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-
based mobile cloud computing model for green computing. Journal of Network and
Computer Applications, 59, 46-54.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
CLOUD PRIVACY AND SECURITY
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the
integration of Internet of things and cloud computing. Journal of Network and
Computer Applications, 67, 99-117.
Etro, F. (2015). The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-
based mobile cloud computing model for green computing. Journal of Network and
Computer Applications, 59, 46-54.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
17
CLOUD PRIVACY AND SECURITY
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
Mei, J., Li, K., & Li, K. (2017). Customer-Satisfaction-Aware Optimal Multiserver
Configuration for Profit Maximization in Cloud Computing. T-SUSC, 2(1), 17-29.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services
sectors. Information & Management, 51(5), 497-510.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), 369-392.
Soyata, T., Ba, H., Heinzelman, W., Kwon, M., & Shi, J. (2015). Accelerating mobile-cloud
computing: A survey. In Cloud Technology: Concepts, Methodologies, Tools, and
Applications (pp. 1933-1955). IGI Global.
CLOUD PRIVACY AND SECURITY
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
Mei, J., Li, K., & Li, K. (2017). Customer-Satisfaction-Aware Optimal Multiserver
Configuration for Profit Maximization in Cloud Computing. T-SUSC, 2(1), 17-29.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services
sectors. Information & Management, 51(5), 497-510.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), 369-392.
Soyata, T., Ba, H., Heinzelman, W., Kwon, M., & Shi, J. (2015). Accelerating mobile-cloud
computing: A survey. In Cloud Technology: Concepts, Methodologies, Tools, and
Applications (pp. 1933-1955). IGI Global.
18
CLOUD PRIVACY AND SECURITY
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A
survey, some research issues, and challenges. IEEE Communications Surveys &
Tutorials, 18(1), 602-622.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), 63.
CLOUD PRIVACY AND SECURITY
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A
survey, some research issues, and challenges. IEEE Communications Surveys &
Tutorials, 18(1), 602-622.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), 63.
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.