Cloud Privacy and Security
VerifiedAdded on 2023/06/08
|21
|6371
|142
AI Summary
This report discusses the possible threats and risks to confidential data in the database of HR in Charity, and the risks that are vulnerable to the organization after proper SaaS migration. It also covers the security and privacy of employee data, digital identities issues, provider solutions issues, and data sensitivity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD PRIVACY AND SECURITY
Cloud Privacy and Security
Name of the Student
Name of the University
Author’s Note:
Cloud Privacy and Security
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................3
Case Study..............................................................................................................................3
1. Security of Employee Data................................................................................................4
1.1 Existing Threats or Risks for the Data Security in HR Database................................4
1.2 Additional Threats and Risks after Migration to SaaS.................................................5
1.3 Severity of Threats and Risks in the Employee Data...................................................6
2. Privacy of Employee Data.................................................................................................8
2.1 Existing Threats or Risks for the Data Privacy within Database of HR......................8
2.2 Additional Risks and Threats after Migration to SaaS.................................................9
2.3 Severity of Threats and Risks in the Employee Data.................................................10
3. Digital Identities Issues....................................................................................................11
4. Provider Solutions Issues.................................................................................................12
5. Data Sensitivity................................................................................................................13
Conclusion................................................................................................................................13
References................................................................................................................................16
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................3
Case Study..............................................................................................................................3
1. Security of Employee Data................................................................................................4
1.1 Existing Threats or Risks for the Data Security in HR Database................................4
1.2 Additional Threats and Risks after Migration to SaaS.................................................5
1.3 Severity of Threats and Risks in the Employee Data...................................................6
2. Privacy of Employee Data.................................................................................................8
2.1 Existing Threats or Risks for the Data Privacy within Database of HR......................8
2.2 Additional Risks and Threats after Migration to SaaS.................................................9
2.3 Severity of Threats and Risks in the Employee Data.................................................10
3. Digital Identities Issues....................................................................................................11
4. Provider Solutions Issues.................................................................................................12
5. Data Sensitivity................................................................................................................13
Conclusion................................................................................................................................13
References................................................................................................................................16
2
CLOUD PRIVACY AND SECURITY
Introduction
The technology of cloud computing is defined as the most significant paradigm of IT
or information technology that allows the major access to all kinds of sharing pools of several
configurable system resources and even the higher level services (Dinh et al., 2013). All of
the services thus can be quickly and easily provisioned with the lowest effort of management
with proper Internet connection. This cloud computing significantly depends on several kinds
of resource sharing to achieve the coherences and economies of scale, which is completely
same as the public utilities. The third party cloud is responsible for enabling the companies to
focus on the main businesses and not on expending resources over the maintenance or
infrastructure of computer systems (Fernando, Loke & Rahayu, 2013). The main advantage
of cloud computing is that this helps in allowing its clients to minimize or avoid the cost of IT
infrastructures. Therefore, cloud computing i-s extremely cost effective and could be utilized
by all types of organizations. Furthermore, cloud computing even utilizes the SOA or service
oriented architectures, utility computing and hardware virtualization. The main features of the
cloud computing includes improving the organizational agility, independency of locations as
well as devices, better performance, increased productivity, cost effectiveness, higher
reliability and scalability, application maintenance, data privacy and security, business
continuity planning, disaster recovery, elasticity, resource pooling and many more (Arora,
Parashar & Transforming, 2013). The main cloud service models are IaaS or infrastructure as
a service, PaaS or platform as a service and SaaS or software as a service.
This report will be explaining a detailed and proper discussion about the Charity case
study. A small data centre is present with Windows Servers 2008 R2 and any other web
service. This charity will be joining a specific community cloud, which is eventually
provided by the vendor of public cloud to provide the various applications to their
CLOUD PRIVACY AND SECURITY
Introduction
The technology of cloud computing is defined as the most significant paradigm of IT
or information technology that allows the major access to all kinds of sharing pools of several
configurable system resources and even the higher level services (Dinh et al., 2013). All of
the services thus can be quickly and easily provisioned with the lowest effort of management
with proper Internet connection. This cloud computing significantly depends on several kinds
of resource sharing to achieve the coherences and economies of scale, which is completely
same as the public utilities. The third party cloud is responsible for enabling the companies to
focus on the main businesses and not on expending resources over the maintenance or
infrastructure of computer systems (Fernando, Loke & Rahayu, 2013). The main advantage
of cloud computing is that this helps in allowing its clients to minimize or avoid the cost of IT
infrastructures. Therefore, cloud computing i-s extremely cost effective and could be utilized
by all types of organizations. Furthermore, cloud computing even utilizes the SOA or service
oriented architectures, utility computing and hardware virtualization. The main features of the
cloud computing includes improving the organizational agility, independency of locations as
well as devices, better performance, increased productivity, cost effectiveness, higher
reliability and scalability, application maintenance, data privacy and security, business
continuity planning, disaster recovery, elasticity, resource pooling and many more (Arora,
Parashar & Transforming, 2013). The main cloud service models are IaaS or infrastructure as
a service, PaaS or platform as a service and SaaS or software as a service.
This report will be explaining a detailed and proper discussion about the Charity case
study. A small data centre is present with Windows Servers 2008 R2 and any other web
service. This charity will be joining a specific community cloud, which is eventually
provided by the vendor of public cloud to provide the various applications to their
3
CLOUD PRIVACY AND SECURITY
administrative users and about 500 staff members. The sensitive information is needed to be
kept safe with the technology of cloud computing. The report outlines the few possible
threats and risks to those confidential data in the database of HR. Moreover, there are certain
risks that are vulnerable to the organization after proper SaaS migration and the security or
privacy of information is observed with the risks. These several risks to digital identities of
the employees of the charity for migrating to SaaS or the ethical and data sensitivity issues
will be provided in the report.
Discussion
Case Study
The Charity is the community, which is being involved to locate as well as provide
training services and support services, mental health services and accommodation services.
These types of services are provided to all types of disadvantaged persons within that
community (Hashem et al., 2015). The charity majorly runs a smaller data centre that is
consisting of some of the 50 x 64 bit server running. All of these servers are file services,
Windows Servers 2008 R2 and the databases for services of desktop. The proper
confidentiality and integrity of PII data of this charity is being maintained perfectly and this
datum includes fewer digital identities for all disadvantaged customers. The Board of Charity
gets concerned about the privacy and security of the confidential and sensitive data; this
would prevent the data breaching in that community. A decision has been taken by them to
purchase an application of personnel management and human resources from the US based
company that can provide SaaS solutions (Li et al., 2013). Furthermore, they have even
decided to move their payroll system to the application of COTS or Commercial Off The
Shelf for the purpose of managing within public cloud and also moving their intranet services
CLOUD PRIVACY AND SECURITY
administrative users and about 500 staff members. The sensitive information is needed to be
kept safe with the technology of cloud computing. The report outlines the few possible
threats and risks to those confidential data in the database of HR. Moreover, there are certain
risks that are vulnerable to the organization after proper SaaS migration and the security or
privacy of information is observed with the risks. These several risks to digital identities of
the employees of the charity for migrating to SaaS or the ethical and data sensitivity issues
will be provided in the report.
Discussion
Case Study
The Charity is the community, which is being involved to locate as well as provide
training services and support services, mental health services and accommodation services.
These types of services are provided to all types of disadvantaged persons within that
community (Hashem et al., 2015). The charity majorly runs a smaller data centre that is
consisting of some of the 50 x 64 bit server running. All of these servers are file services,
Windows Servers 2008 R2 and the databases for services of desktop. The proper
confidentiality and integrity of PII data of this charity is being maintained perfectly and this
datum includes fewer digital identities for all disadvantaged customers. The Board of Charity
gets concerned about the privacy and security of the confidential and sensitive data; this
would prevent the data breaching in that community. A decision has been taken by them to
purchase an application of personnel management and human resources from the US based
company that can provide SaaS solutions (Li et al., 2013). Furthermore, they have even
decided to move their payroll system to the application of COTS or Commercial Off The
Shelf for the purpose of managing within public cloud and also moving their intranet services
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
CLOUD PRIVACY AND SECURITY
to the Microsoft SharePoint PaaS to provide the intranet services in every agency within the
WofG.
1. Security of Employee Data
1.1 Existing Threats or Risks for the Data Security in HR Database
The employees’ data in the Charity eventually faces the several kinds of issues that
are related to security. These data are stored within the database of human resources and
hence the sensitive information or data is under stake (Rittinghouse & Ransome, 2016). For
the main cause of this kind of vulnerability, the proper recognition of all the existing risks or
threats is compulsory within the HR database. The most significant risks or threats to the
employees’ data security within this database of HR are as follows:
i) Database Injection Attacks: The most popular and dangerous types of threats,
which are specifically existing within the database of human resource in charity are known as
the database injection attacks. The database injection attack is the significant technique of the
code injection, which is used to attack the applications that are driven by data (Garg,
Versteeg & Buyya, 2013). With the help of this attack, the dangerous statements of SQL
could be eventually inserted in the entry fields for the perfect executions.
ii) Denial of Service Attack: The denial of service or DoS attack is considered as one
of the most dangerous and nefarious attacks that could cause major destructions within the
HR database of the charity. It is a type of cyber attack, where the perpetrator is seeking to
make the network resources or machines unavailable for the authenticated users (Xiao, Song
& Chen, 2013). This is done by disrupting the services of the host temporarily that is solely
connected to the Internet connection. The distributed denial of service can be defined as the
incoming traffic eventually floods the victim after originating from several sources.
CLOUD PRIVACY AND SECURITY
to the Microsoft SharePoint PaaS to provide the intranet services in every agency within the
WofG.
1. Security of Employee Data
1.1 Existing Threats or Risks for the Data Security in HR Database
The employees’ data in the Charity eventually faces the several kinds of issues that
are related to security. These data are stored within the database of human resources and
hence the sensitive information or data is under stake (Rittinghouse & Ransome, 2016). For
the main cause of this kind of vulnerability, the proper recognition of all the existing risks or
threats is compulsory within the HR database. The most significant risks or threats to the
employees’ data security within this database of HR are as follows:
i) Database Injection Attacks: The most popular and dangerous types of threats,
which are specifically existing within the database of human resource in charity are known as
the database injection attacks. The database injection attack is the significant technique of the
code injection, which is used to attack the applications that are driven by data (Garg,
Versteeg & Buyya, 2013). With the help of this attack, the dangerous statements of SQL
could be eventually inserted in the entry fields for the perfect executions.
ii) Denial of Service Attack: The denial of service or DoS attack is considered as one
of the most dangerous and nefarious attacks that could cause major destructions within the
HR database of the charity. It is a type of cyber attack, where the perpetrator is seeking to
make the network resources or machines unavailable for the authenticated users (Xiao, Song
& Chen, 2013). This is done by disrupting the services of the host temporarily that is solely
connected to the Internet connection. The distributed denial of service can be defined as the
incoming traffic eventually floods the victim after originating from several sources.
5
CLOUD PRIVACY AND SECURITY
iii) Malware: The third important and popular risk to the data security within the HR
database of charity is the malware. This malware is defined as a type of malicious software
that is subsequently designed to cause the various damages to computer networks, servers and
computers (Hashizume et al., 2013). The major damage to the database is done with the help
of this malicious software and it is found in a form of executable codes, executable scripts
and active content. The most popular examples of the malware mainly include ransom ware,
Trojan horses, adware, computer virus and various others. The HR database of charity could
be promptly hacked or attacked by this malware and hence the sensitive data can be stolen.
iv) Legitimate Privilege Abuse: The next significant threat or risk to the HR database
of charity is the legitimate privilege abuse (Jain & Paul, 2013). Each and every user, who has
the right to utilize the employees’ data, can quickly exploit the privileges and thus can utilize
those data from incorrect or illegal deeds. The legitimate privilege abuse is extremely
dangerous for all the databases and thus the HR database of charity is not free from the
abuses.
1.2 Additional Threats and Risks after Migration to SaaS
This charity has decided for moving their services and workloads to the cloud to bring
more profit and success in their business. Software as a service or SaaS can be defined as the
significant software licensing and delivery model, in which this software is solely licensed
based on the subscriptions (Krishna, 2013). The cloud service models are accessed by all the
users by a specific thin client via web browser. The software of CAD and Microsoft office,
the system for payroll processing and virtualization are the most important applications of
SaaS. Hence, when the workloads are getting migrated to the cloud service models, these
services could be vulnerable to several threats or risks. These risks are as follows:
CLOUD PRIVACY AND SECURITY
iii) Malware: The third important and popular risk to the data security within the HR
database of charity is the malware. This malware is defined as a type of malicious software
that is subsequently designed to cause the various damages to computer networks, servers and
computers (Hashizume et al., 2013). The major damage to the database is done with the help
of this malicious software and it is found in a form of executable codes, executable scripts
and active content. The most popular examples of the malware mainly include ransom ware,
Trojan horses, adware, computer virus and various others. The HR database of charity could
be promptly hacked or attacked by this malware and hence the sensitive data can be stolen.
iv) Legitimate Privilege Abuse: The next significant threat or risk to the HR database
of charity is the legitimate privilege abuse (Jain & Paul, 2013). Each and every user, who has
the right to utilize the employees’ data, can quickly exploit the privileges and thus can utilize
those data from incorrect or illegal deeds. The legitimate privilege abuse is extremely
dangerous for all the databases and thus the HR database of charity is not free from the
abuses.
1.2 Additional Threats and Risks after Migration to SaaS
This charity has decided for moving their services and workloads to the cloud to bring
more profit and success in their business. Software as a service or SaaS can be defined as the
significant software licensing and delivery model, in which this software is solely licensed
based on the subscriptions (Krishna, 2013). The cloud service models are accessed by all the
users by a specific thin client via web browser. The software of CAD and Microsoft office,
the system for payroll processing and virtualization are the most important applications of
SaaS. Hence, when the workloads are getting migrated to the cloud service models, these
services could be vulnerable to several threats or risks. These risks are as follows:
6
CLOUD PRIVACY AND SECURITY
i) Data Deletion: The first threat that can often occur when the SaaS migration is
completed is the data deletion. All the risks, which are connected to this deletion of data
subsequently, exist as the client has minimized the control or visibility, in which this data is
stored in the cloud and a reduced capability to properly verifying data security (Botta et al.,
2016). The process of data deletion is easier and hence SaaS migration occurs properly.
ii) Negotiation for the Internet Access Managing of API: The second important
threat after the migration of SaaS within charity is the negotiation in the management of
internet accessible application programming interface or API. These APIs that are used by the
clients to manage or interact with services of clouds are significantly exposed to public and
hence are extremely dangerous (Herbst, Kounev & Reussner, 2013). Several types of risks
are present in the API and hence the risks can be turned to various attacks.
iii) Reducing Visibility and Control: Another important and significant threat after
migrating to SaaS is reducing the control and visibility of the private data. When assets and
operations are being transitioned to cloud, these companies significantly lose most of the
control or visibility of data (Wei et al., 2014). The specific shift in the cloud service model
specifically direct to shifting of paradigm for the purpose of monitoring security.
iv) Self Services Inducing the Unauthorized Users: The several on demanding self
services are responsible for inducing the unauthorized or unauthenticated uses and hence
allowing the employees of the company to provision additional services. The simple SaaS
implementation and low costs are responsible for the unauthorized uses.
1.3 Severity of Threats and Risks in the Employee Data
The severity of the threats and risks for the employees’ data in Charity is clearly
observed according to the severity of these risks (Rong, Nguyen & Jaatun, 2013). All of these
threats can be divided to 4 distinct categories. These are given below:
CLOUD PRIVACY AND SECURITY
i) Data Deletion: The first threat that can often occur when the SaaS migration is
completed is the data deletion. All the risks, which are connected to this deletion of data
subsequently, exist as the client has minimized the control or visibility, in which this data is
stored in the cloud and a reduced capability to properly verifying data security (Botta et al.,
2016). The process of data deletion is easier and hence SaaS migration occurs properly.
ii) Negotiation for the Internet Access Managing of API: The second important
threat after the migration of SaaS within charity is the negotiation in the management of
internet accessible application programming interface or API. These APIs that are used by the
clients to manage or interact with services of clouds are significantly exposed to public and
hence are extremely dangerous (Herbst, Kounev & Reussner, 2013). Several types of risks
are present in the API and hence the risks can be turned to various attacks.
iii) Reducing Visibility and Control: Another important and significant threat after
migrating to SaaS is reducing the control and visibility of the private data. When assets and
operations are being transitioned to cloud, these companies significantly lose most of the
control or visibility of data (Wei et al., 2014). The specific shift in the cloud service model
specifically direct to shifting of paradigm for the purpose of monitoring security.
iv) Self Services Inducing the Unauthorized Users: The several on demanding self
services are responsible for inducing the unauthorized or unauthenticated uses and hence
allowing the employees of the company to provision additional services. The simple SaaS
implementation and low costs are responsible for the unauthorized uses.
1.3 Severity of Threats and Risks in the Employee Data
The severity of the threats and risks for the employees’ data in Charity is clearly
observed according to the severity of these risks (Rong, Nguyen & Jaatun, 2013). All of these
threats can be divided to 4 distinct categories. These are given below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
CLOUD PRIVACY AND SECURITY
i) Maximum: The first and most dangerous category of risk for measuring severity is
the maximum category. The overall vulnerability of this particular risk is very high in respect
to other risks and the lost data cannot be easily recovered and thus the organization faces
major issues (Gao et al., 2013). This particular risk category is required to be ceased on time
for the purpose of stopping any type of vulnerabilities. From all the identified threats or risks
for the security of employee data in the charity, the most dangerous attacks are the database
injection attacks.
ii) Significant: The second risk category after maximum within the plan of risk
assessment is the category of significant. The significant risk category helps to provide severe
destruction in the database and the total data confidentiality and integrity are affected (Gupta,
Seetharaman & Raj, 2013). From all the identified threats or risks for the security of
employee data in the charity, the significant category of risk is denial of service attack. This
type of attack is extremely dangerous since the user does not have any idea about the
vulnerabilities and thus
iii) Limited: The next risk category after significant within the risk assessment plan is
the limited category. The limited risks are as vulnerable as the rest of the risks. However,
there could be serious issues to security, if proper actions are not taken in time (Almorsy,
Grundy & Müller, 2016). From all the identified threats or risks for the security of employee
data in the charity, the limited category of risk is the malwares. These malwares are certain
executable codes that are utilized for the purpose of data hacking and thus spreading the
vulnerability.
iv) Negligible: The fourth and the lowest severity risk is the negligible risk. This
particular risk category can be eventually kept as the negligible category and is not at all
vulnerable for the companies and clients. For the significant negligibility of risks, this never
CLOUD PRIVACY AND SECURITY
i) Maximum: The first and most dangerous category of risk for measuring severity is
the maximum category. The overall vulnerability of this particular risk is very high in respect
to other risks and the lost data cannot be easily recovered and thus the organization faces
major issues (Gao et al., 2013). This particular risk category is required to be ceased on time
for the purpose of stopping any type of vulnerabilities. From all the identified threats or risks
for the security of employee data in the charity, the most dangerous attacks are the database
injection attacks.
ii) Significant: The second risk category after maximum within the plan of risk
assessment is the category of significant. The significant risk category helps to provide severe
destruction in the database and the total data confidentiality and integrity are affected (Gupta,
Seetharaman & Raj, 2013). From all the identified threats or risks for the security of
employee data in the charity, the significant category of risk is denial of service attack. This
type of attack is extremely dangerous since the user does not have any idea about the
vulnerabilities and thus
iii) Limited: The next risk category after significant within the risk assessment plan is
the limited category. The limited risks are as vulnerable as the rest of the risks. However,
there could be serious issues to security, if proper actions are not taken in time (Almorsy,
Grundy & Müller, 2016). From all the identified threats or risks for the security of employee
data in the charity, the limited category of risk is the malwares. These malwares are certain
executable codes that are utilized for the purpose of data hacking and thus spreading the
vulnerability.
iv) Negligible: The fourth and the lowest severity risk is the negligible risk. This
particular risk category can be eventually kept as the negligible category and is not at all
vulnerable for the companies and clients. For the significant negligibility of risks, this never
8
CLOUD PRIVACY AND SECURITY
affects the sensitivity of the data within the company (Whaiduzzaman et al., 2014). From all
the identified threats or risks for the security of employee data in the charity, the negligible
category of risk is the legitimate privilege abuse. The overall severity is absolutely lower than
the rest of the risk categories and thus mitigation techniques are not required for these issues.
2. Privacy of Employee Data
2.1 Existing Threats or Risks for the Data Privacy within Database of HR
The privacy of sensitive as well as confidential data in the database of HR in Charity
is not observed perfectly. For the negligence in data privacy, these companies eventually
undergo the vulnerabilities that are dangerous for the companies (Avram, 2014). The several
existing threats or risks for data privacy within the database of HR of this charity are as
follows:
i) Lack of Authentication: One of the most dangerous and significant threat to the
data privacy of charity HR database is the lack of authentication. Authentication is the most
important factor that helps to enable the authorized users to prevent their data from getting
hacked and thus the attackers and hackers cannot recognize the proper database users. Brute
force attack and social engineering attack are considered as the most popular strategies of
attacks in cyber world (Oliveira, Thomas & Espadanal, 2014). The perfect implementation of
passwords or two factor authentications are required for these authentication purposes. These
mechanisms of authentication for the techniques of easy to use and scalability are eventually
integrated with the significant infrastructure of user management or enterprise directory.
ii) Database Protocol Vulnerability: The next important risk is the database protocol
vulnerability. There are various vulnerabilities in database protocol that allows all types of
unauthenticated data access and leads to corruption (Xiao & Xiao, 2013). These codes could
be executed on the target database server and the attacks can be defeated by properly
CLOUD PRIVACY AND SECURITY
affects the sensitivity of the data within the company (Whaiduzzaman et al., 2014). From all
the identified threats or risks for the security of employee data in the charity, the negligible
category of risk is the legitimate privilege abuse. The overall severity is absolutely lower than
the rest of the risk categories and thus mitigation techniques are not required for these issues.
2. Privacy of Employee Data
2.1 Existing Threats or Risks for the Data Privacy within Database of HR
The privacy of sensitive as well as confidential data in the database of HR in Charity
is not observed perfectly. For the negligence in data privacy, these companies eventually
undergo the vulnerabilities that are dangerous for the companies (Avram, 2014). The several
existing threats or risks for data privacy within the database of HR of this charity are as
follows:
i) Lack of Authentication: One of the most dangerous and significant threat to the
data privacy of charity HR database is the lack of authentication. Authentication is the most
important factor that helps to enable the authorized users to prevent their data from getting
hacked and thus the attackers and hackers cannot recognize the proper database users. Brute
force attack and social engineering attack are considered as the most popular strategies of
attacks in cyber world (Oliveira, Thomas & Espadanal, 2014). The perfect implementation of
passwords or two factor authentications are required for these authentication purposes. These
mechanisms of authentication for the techniques of easy to use and scalability are eventually
integrated with the significant infrastructure of user management or enterprise directory.
ii) Database Protocol Vulnerability: The next important risk is the database protocol
vulnerability. There are various vulnerabilities in database protocol that allows all types of
unauthenticated data access and leads to corruption (Xiao & Xiao, 2013). These codes could
be executed on the target database server and the attacks can be defeated by properly
9
CLOUD PRIVACY AND SECURITY
validating the SQL communications. All of these vulnerabilities are extremely nefarious for
database as they cannot be avoided at all.
iii) Leaking Personal Data: Another significant threat to the data privacy is the
leaking of the personal data (Sanaei et al., 2014). These data can be eventually leaked or
exposed in the specific cloud and thus the confidential information significantly loses its
confidentiality. This particular threat is very common for the database of the charity.
iv) Exposing the Backup Data: The final dangerous threat to the data privacy in the
Charity database is specifically exposing the backup data. The backups should be properly
encrypted and thus few vendors provide the solution to use future DBMS or database
management system services (Tao et al., 2014). These do not support any type of
unencrypted backup data. The integrity of data is thus lost.
2.2 Additional Risks and Threats after Migration to SaaS
Since, Charity has decided to shift their services to cloud; they have chosen SaaS for
this purpose. There are several additional threats or risks that are vulnerable in nature and
could cause major issues in this purpose. They are as follows:
i) Increasing Complexities for the Staffs: All the staffs of an organization are not
equal and thus they do not have similar knowledge regarding the software as a service cloud
deployment model (O’Driscoll, Daugelaite & Sleator, 2013). This in turn increases the
several complexities for them and for the organization and they suffer from complexities.
ii) Stolen Credentials: The confidential credentials are being stolen easily after then
services are being migrated to the cloud. These stolen credentials are extremely dangerous as
the confidentiality are easily hacked and could not be prevented at any costs (Sadiku, Musa,
CLOUD PRIVACY AND SECURITY
validating the SQL communications. All of these vulnerabilities are extremely nefarious for
database as they cannot be avoided at all.
iii) Leaking Personal Data: Another significant threat to the data privacy is the
leaking of the personal data (Sanaei et al., 2014). These data can be eventually leaked or
exposed in the specific cloud and thus the confidential information significantly loses its
confidentiality. This particular threat is very common for the database of the charity.
iv) Exposing the Backup Data: The final dangerous threat to the data privacy in the
Charity database is specifically exposing the backup data. The backups should be properly
encrypted and thus few vendors provide the solution to use future DBMS or database
management system services (Tao et al., 2014). These do not support any type of
unencrypted backup data. The integrity of data is thus lost.
2.2 Additional Risks and Threats after Migration to SaaS
Since, Charity has decided to shift their services to cloud; they have chosen SaaS for
this purpose. There are several additional threats or risks that are vulnerable in nature and
could cause major issues in this purpose. They are as follows:
i) Increasing Complexities for the Staffs: All the staffs of an organization are not
equal and thus they do not have similar knowledge regarding the software as a service cloud
deployment model (O’Driscoll, Daugelaite & Sleator, 2013). This in turn increases the
several complexities for them and for the organization and they suffer from complexities.
ii) Stolen Credentials: The confidential credentials are being stolen easily after then
services are being migrated to the cloud. These stolen credentials are extremely dangerous as
the confidentiality are easily hacked and could not be prevented at any costs (Sadiku, Musa,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
CLOUD PRIVACY AND SECURITY
& Momoh, 2014). The attacker or the hacker could thus easily access the services of the
authorized users to provide any resource.
iii) Inadequate Due Diligence: The inadequate due diligence are performed after the
migration of SaaS and thus moving these data to cloud. All the security measures might get
affected for this and hence all types of vulnerabilities occur.
iv) Insiders Attacks: The fourth type of threat that is dangerous for the data privacy of
the Charity database is the insiders’ attack (Khan et al., 2013). When the SaaS migration is
completed, each and every cloud vendor and organizational staffs can get the data access and
hence the data could be easily exploited and these are termed as the insiders’ attacks. These
are extremely common for the SaaS cloud model.
2.3 Severity of Threats and Risks in the Employee Data
The severity of each and every recognized threats or risks for data privacy is complete
dependent on the four categories. These risk categories are as follows:
i) Maximum: The most dangerous and the nefarious risk category is the category of
maximum. This category is as the most dangerous risk from every other risk categories
(Alshamaila, Papagiannidis & Li, 2013). From all the identified threats or risks for the
security of employee data in the charity, the maximum category of risk is the database
protocol vulnerabilities.
ii) Significant: The second nefarious risk category is the category of significant. If
any action is not taken properly, the risk could be dangerous and extremely threatening for
the company (Xia et al., 2016). From all the identified threats or risks for the security of
employee data in the charity, the significant category of risk is the exposing of all the backup
data. These attackers could be easily hacking the data and using them for wrong deeds.
CLOUD PRIVACY AND SECURITY
& Momoh, 2014). The attacker or the hacker could thus easily access the services of the
authorized users to provide any resource.
iii) Inadequate Due Diligence: The inadequate due diligence are performed after the
migration of SaaS and thus moving these data to cloud. All the security measures might get
affected for this and hence all types of vulnerabilities occur.
iv) Insiders Attacks: The fourth type of threat that is dangerous for the data privacy of
the Charity database is the insiders’ attack (Khan et al., 2013). When the SaaS migration is
completed, each and every cloud vendor and organizational staffs can get the data access and
hence the data could be easily exploited and these are termed as the insiders’ attacks. These
are extremely common for the SaaS cloud model.
2.3 Severity of Threats and Risks in the Employee Data
The severity of each and every recognized threats or risks for data privacy is complete
dependent on the four categories. These risk categories are as follows:
i) Maximum: The most dangerous and the nefarious risk category is the category of
maximum. This category is as the most dangerous risk from every other risk categories
(Alshamaila, Papagiannidis & Li, 2013). From all the identified threats or risks for the
security of employee data in the charity, the maximum category of risk is the database
protocol vulnerabilities.
ii) Significant: The second nefarious risk category is the category of significant. If
any action is not taken properly, the risk could be dangerous and extremely threatening for
the company (Xia et al., 2016). From all the identified threats or risks for the security of
employee data in the charity, the significant category of risk is the exposing of all the backup
data. These attackers could be easily hacking the data and using them for wrong deeds.
11
CLOUD PRIVACY AND SECURITY
iii) Limited: The third category of risk is the limited category. This particular category
is not as vulnerable as the previous two and could be avoided if stopped on time. From all the
identified threats or risks for the security of employee data in the charity, the limited category
of risk is the leaking of the personal data (Lian, Yen & Wang, 2014). The personal data
should not be breached at any cost and thus proper mitigation plans are required in the
organizational database to maintain the data privacy.
iv) Negligible: The fourth risk category is the category of negligible. These negligible
risks are extremely vulnerable for the database of the Charity. The organizations can easily
avoid these risks by implementing various mitigation techniques (Botta et al., 2014). From all
the identified threats or risks for the security of employee data in the charity, the limited
category of risk is the lack of authentication.
3. Digital Identities Issues
The digital identity is defined as the entities or information, which is used by several
computer systems to properly represent all the specific external agents. These few agents
could either an organization, a device, an application or a person. The sensitive data is kept in
the digital identity and thus the assessment and the authentication of users interact with the
few business systems (Chen et al., 2016). The human operators are not involved in this
process and the digital identity can allow the service access, which is provided for being
automatic. This charity has taken the decision for moving all the employees’ data to SaaS
application and thus digital identities are utilized. Several risks or threats are present for the
digital identities of the employees of this charity and these risks are as follows:
i) Poor Authentication: The first and the foremost risk to the digital identities is the
poor authentication. If the digital identities are not properly authenticated, there is always a
high chance that the confidentiality and integrity of the data would be lost (Suo et al., 2013).
CLOUD PRIVACY AND SECURITY
iii) Limited: The third category of risk is the limited category. This particular category
is not as vulnerable as the previous two and could be avoided if stopped on time. From all the
identified threats or risks for the security of employee data in the charity, the limited category
of risk is the leaking of the personal data (Lian, Yen & Wang, 2014). The personal data
should not be breached at any cost and thus proper mitigation plans are required in the
organizational database to maintain the data privacy.
iv) Negligible: The fourth risk category is the category of negligible. These negligible
risks are extremely vulnerable for the database of the Charity. The organizations can easily
avoid these risks by implementing various mitigation techniques (Botta et al., 2014). From all
the identified threats or risks for the security of employee data in the charity, the limited
category of risk is the lack of authentication.
3. Digital Identities Issues
The digital identity is defined as the entities or information, which is used by several
computer systems to properly represent all the specific external agents. These few agents
could either an organization, a device, an application or a person. The sensitive data is kept in
the digital identity and thus the assessment and the authentication of users interact with the
few business systems (Chen et al., 2016). The human operators are not involved in this
process and the digital identity can allow the service access, which is provided for being
automatic. This charity has taken the decision for moving all the employees’ data to SaaS
application and thus digital identities are utilized. Several risks or threats are present for the
digital identities of the employees of this charity and these risks are as follows:
i) Poor Authentication: The first and the foremost risk to the digital identities is the
poor authentication. If the digital identities are not properly authenticated, there is always a
high chance that the confidentiality and integrity of the data would be lost (Suo et al., 2013).
12
CLOUD PRIVACY AND SECURITY
The hackers can easily hack the data and hence the unauthorized access could be easily
stopped and the charity will not be facing any more issues regarding authentication in digital
identities.
ii) Proper Verifications: A perfect verification is required for the digital identities of
the Charity employees. This type of verification of digital identities of every individual
transaction is needed (Manvi & Shyam, 2014). This threat eventually is responsible for
bringing major issues of data within the charity.
4. Provider Solutions Issues
The operational location and the operational solution of SaaS provider are present to
manage the human resources within the Charity. These operational solutions can be defined
as the kinds of business analytics, which significantly focus on improving all the existing
operations. Hence, this business analytics mainly involves using numerous tools for either for
data mining or for data aggregation and thus getting better information to plan the business
(Carlin & Curran, 2013). These businesses can simply pursue operational analytics within
various methodologies. The few software packages, which are extremely efficient as well as
effective to show that the operations within the business are well executed, are checked
within a given time frame. All the tools will be providing the visual models.
Simultaneously, the operational locations are the specific locations, in which these
operations would be undertaking the paces and would be managed significantly. The
management of operations is the major area that deals with the perfect control and designing
of production process. Several threats are present and are properly identified for privacy and
security of the employee data in Charity (Pearson, 2013). All these risks like database
injection attacks, malwares, DoS attacks, lack of authentication and authorization, leaking of
CLOUD PRIVACY AND SECURITY
The hackers can easily hack the data and hence the unauthorized access could be easily
stopped and the charity will not be facing any more issues regarding authentication in digital
identities.
ii) Proper Verifications: A perfect verification is required for the digital identities of
the Charity employees. This type of verification of digital identities of every individual
transaction is needed (Manvi & Shyam, 2014). This threat eventually is responsible for
bringing major issues of data within the charity.
4. Provider Solutions Issues
The operational location and the operational solution of SaaS provider are present to
manage the human resources within the Charity. These operational solutions can be defined
as the kinds of business analytics, which significantly focus on improving all the existing
operations. Hence, this business analytics mainly involves using numerous tools for either for
data mining or for data aggregation and thus getting better information to plan the business
(Carlin & Curran, 2013). These businesses can simply pursue operational analytics within
various methodologies. The few software packages, which are extremely efficient as well as
effective to show that the operations within the business are well executed, are checked
within a given time frame. All the tools will be providing the visual models.
Simultaneously, the operational locations are the specific locations, in which these
operations would be undertaking the paces and would be managed significantly. The
management of operations is the major area that deals with the perfect control and designing
of production process. Several threats are present and are properly identified for privacy and
security of the employee data in Charity (Pearson, 2013). All these risks like database
injection attacks, malwares, DoS attacks, lack of authentication and authorization, leaking of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
CLOUD PRIVACY AND SECURITY
the personal data, insiders’ attacks and various others. These risks are easily mitigated with
the help of operational solutions and thus these solutions are effective for the charity.
5. Data Sensitivity
Several issues related to data sensitivity, jurisdiction and ethics is present that should
be used by the employees of Charity. The major ethical issues in this case are as follows:
i) Humanity Ethics: The most significant issue of this factor is the humanity
(Hashizume et al., 2013). As disadvantages people will be interacting in this charity, this
particular factor is important.
ii) Stolen Credentials: The data or the other credentials should not be stolen at any
cost and thus this ethics should be maintained.
The two issues of data sensitivity in this charity are as follows:
i) Strict Data Access: The sensitive data must be protected and the access should not
be given to everyone (Rittinghouse & Ransome, 2016). This would stop the illegal access of
data to a great extent.
ii) Perfect Authentication: The confidential data must be perfectly authenticated and
thus the data can be protected perfectly.
The two issues of jurisdiction in the charity are as follows:
i) Cyber Crime: Cyber crime is considered as one of the most common jurisdiction
issue in any organization. This should be stopped at every aspect.
ii) Legal Issues: These issues are given the top priority and thus any type of illegal
activity can lead to major destruction for the charity (Fernando, Loke & Rahayu, 2013).
CLOUD PRIVACY AND SECURITY
the personal data, insiders’ attacks and various others. These risks are easily mitigated with
the help of operational solutions and thus these solutions are effective for the charity.
5. Data Sensitivity
Several issues related to data sensitivity, jurisdiction and ethics is present that should
be used by the employees of Charity. The major ethical issues in this case are as follows:
i) Humanity Ethics: The most significant issue of this factor is the humanity
(Hashizume et al., 2013). As disadvantages people will be interacting in this charity, this
particular factor is important.
ii) Stolen Credentials: The data or the other credentials should not be stolen at any
cost and thus this ethics should be maintained.
The two issues of data sensitivity in this charity are as follows:
i) Strict Data Access: The sensitive data must be protected and the access should not
be given to everyone (Rittinghouse & Ransome, 2016). This would stop the illegal access of
data to a great extent.
ii) Perfect Authentication: The confidential data must be perfectly authenticated and
thus the data can be protected perfectly.
The two issues of jurisdiction in the charity are as follows:
i) Cyber Crime: Cyber crime is considered as one of the most common jurisdiction
issue in any organization. This should be stopped at every aspect.
ii) Legal Issues: These issues are given the top priority and thus any type of illegal
activity can lead to major destruction for the charity (Fernando, Loke & Rahayu, 2013).
14
CLOUD PRIVACY AND SECURITY
Conclusion
Therefore, from the above report, conclusion can be drawn that the technology of
cloud computing can be defined as significant technology or tool that helps to deliver all
types of hosted services over the connection of Internet. This cloud computing enables the
companies to consume the several computing resources such as the applications, storages and
few virtual machines. The several infrastructures of computing are well built as well as
maintained in those companies. The most important advantage of the technology of cloud
computing is that each and every end user can be spinning up the fewer resources of
computing for all kinds of workloads as per demand. The provisioning of self services helps
to eliminate the traditional requirements for administrators of information technology to
manage these computing resources. Another important benefit of the cloud computing
technology mainly includes the companies in scaling up various requirements of computing
promptly as per the client demands. Hence, the massive investments within the local
infrastructures are solely eradicated and elasticity is being maintained. This particular
technology comprises of the capability to be available in terms of high capacity networks,
storage devices and low cost systems. These computing resources are measured at granular
levels and thus each and every user would be paying for resources and workloads, which are
being utilized by them. The third important benefit of cloud computing is that those clients
can quickly migrate their several workloads from or to the respective cloud and even to the
various cloud platforms. For the advantage of cost effectiveness, this particular technology is
used by each and every popular company throughout the world. The most significant
applications, which can share their characteristics with cloud computing technology, are fog
computing, client server models, cloud sandbox, utility computing and many others. The four
distinct deployment models of this cloud computing majorly involve public cloud, private
cloud, community cloud and hybrid cloud. This report has properly outlined the entire case
CLOUD PRIVACY AND SECURITY
Conclusion
Therefore, from the above report, conclusion can be drawn that the technology of
cloud computing can be defined as significant technology or tool that helps to deliver all
types of hosted services over the connection of Internet. This cloud computing enables the
companies to consume the several computing resources such as the applications, storages and
few virtual machines. The several infrastructures of computing are well built as well as
maintained in those companies. The most important advantage of the technology of cloud
computing is that each and every end user can be spinning up the fewer resources of
computing for all kinds of workloads as per demand. The provisioning of self services helps
to eliminate the traditional requirements for administrators of information technology to
manage these computing resources. Another important benefit of the cloud computing
technology mainly includes the companies in scaling up various requirements of computing
promptly as per the client demands. Hence, the massive investments within the local
infrastructures are solely eradicated and elasticity is being maintained. This particular
technology comprises of the capability to be available in terms of high capacity networks,
storage devices and low cost systems. These computing resources are measured at granular
levels and thus each and every user would be paying for resources and workloads, which are
being utilized by them. The third important benefit of cloud computing is that those clients
can quickly migrate their several workloads from or to the respective cloud and even to the
various cloud platforms. For the advantage of cost effectiveness, this particular technology is
used by each and every popular company throughout the world. The most significant
applications, which can share their characteristics with cloud computing technology, are fog
computing, client server models, cloud sandbox, utility computing and many others. The four
distinct deployment models of this cloud computing majorly involve public cloud, private
cloud, community cloud and hybrid cloud. This report has properly outlined the entire case
15
CLOUD PRIVACY AND SECURITY
study of the charity in details. This particular charity has decided for purchasing the
application of personnel management from an American organization that provides few SaaS
solutions and even to move the intranet service to Microsoft SharePoint PaaS. This would be
done to provide intranet services to all agencies in WofG. The various threats or risks to the
database of the charity are properly described here. The ethical issues, data sensitivity issues,
provider solutions and issues of digital identities are also given in the above report.
CLOUD PRIVACY AND SECURITY
study of the charity in details. This particular charity has decided for purchasing the
application of personnel management from an American organization that provides few SaaS
solutions and even to move the intranet service to Microsoft SharePoint PaaS. This would be
done to provide intranet services to all agencies in WofG. The various threats or risks to the
database of the charity are properly described here. The ethical issues, data sensitivity issues,
provider solutions and issues of digital identities are also given in the above report.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
CLOUD PRIVACY AND SECURITY
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in
the north east of England: A multi-perspective framework. Journal of Enterprise
Information Management, 26(3), 250-275.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI
Global.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
CLOUD PRIVACY AND SECURITY
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in
the north east of England: A multi-perspective framework. Journal of Enterprise
Information Management, 26(3), 250-275.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI
Global.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
17
CLOUD PRIVACY AND SECURITY
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future
generation computer systems, 29(1), 84-106.
Gao, Y., Guan, H., Qi, Z., Hou, Y., & Liu, L. (2013). A multi-objective ant colony system
algorithm for virtual machine placement in cloud computing. Journal of Computer
and System Sciences, 79(8), 1230-1242.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing
by small and medium businesses. International Journal of Information
Management, 33(5), 861-874.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing:
What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
CLOUD PRIVACY AND SECURITY
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future
generation computer systems, 29(1), 84-106.
Gao, Y., Guan, H., Qi, Z., Hou, Y., & Liu, L. (2013). A multi-objective ant colony system
algorithm for virtual machine placement in cloud computing. Journal of Computer
and System Sciences, 79(8), 1230-1242.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing
by small and medium businesses. International Journal of Information
Management, 33(5), 861-874.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing:
What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
18
CLOUD PRIVACY AND SECURITY
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile
cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.
Krishna, P. V. (2013). Honey bee behavior inspired load balancing of tasks in cloud
computing environments. Applied Soft Computing, 13(5), 2292-2303.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of
personal health records in cloud computing using attribute-based encryption. IEEE
transactions on parallel and distributed systems, 24(1), 131-143.
Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the
critical factors affecting the decision to adopt cloud computing in Taiwan
hospital. International Journal of Information Management, 34(1), 28-36.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud
computing in genomics. Journal of biomedical informatics, 46(5), 774-781.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services
sectors. Information & Management, 51(5), 497-510.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security
for Cloud Computing (pp. 3-42). Springer, London.
CLOUD PRIVACY AND SECURITY
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile
cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.
Krishna, P. V. (2013). Honey bee behavior inspired load balancing of tasks in cloud
computing environments. Applied Soft Computing, 13(5), 2292-2303.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of
personal health records in cloud computing using attribute-based encryption. IEEE
transactions on parallel and distributed systems, 24(1), 131-143.
Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the
critical factors affecting the decision to adopt cloud computing in Taiwan
hospital. International Journal of Information Management, 34(1), 28-36.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud
computing in genomics. Journal of biomedical informatics, 46(5), 774-781.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services
sectors. Information & Management, 51(5), 497-510.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security
for Cloud Computing (pp. 3-42). Springer, London.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
CLOUD PRIVACY AND SECURITY
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security
challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47-54.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), 369-392.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud
computing. In Wireless Communications and Mobile Computing Conference
(IWCMC), 2013 9th International (pp. 655-659). IEEE.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions
on Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular
cloud computing. Journal of Network and Computer Applications, 40, 325-344.
CLOUD PRIVACY AND SECURITY
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security
challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47-54.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), 369-392.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud
computing. In Wireless Communications and Mobile Computing Conference
(IWCMC), 2013 9th International (pp. 655-659). IEEE.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions
on Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular
cloud computing. Journal of Network and Computer Applications, 40, 325-344.
20
CLOUD PRIVACY AND SECURITY
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE
Communications Surveys & Tutorials, 15(2), 843-859.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines
for cloud computing environment. IEEE Trans. Parallel Distrib. Syst., 24(6), 1107-
1117.
CLOUD PRIVACY AND SECURITY
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE
Communications Surveys & Tutorials, 15(2), 843-859.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines
for cloud computing environment. IEEE Trans. Parallel Distrib. Syst., 24(6), 1107-
1117.
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.