logo

Cloud Privacy and Security Assignment

   

Added on  2020-04-07

31 Pages9505 Words142 Views
Theoretical Computer ScienceData Science and Big Data
 | 
 | 
 | 
Running head: CLOUD SECURITY AND PRIVACYCloud Security and PrivacyName of the StudentName of the UniversityAuthor’s Note:
Cloud Privacy and Security Assignment_1

1CLOUD PRIVACY AND SECURITYTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................51. Personal Data Privacy Strategy...............................................................................................51.1 Management of Personal Information...............................................................................51.2 Collection and Management of Solicited Personal Information........................................61.3 Use and Disclosure of Personal Information.....................................................................61.4 Use and Security of Digital Identities................................................................................71.5 Security of Personal Information.......................................................................................81.6 Access to Personal Information.........................................................................................91.7 Quality and Correction of Personal Information.............................................................102. Privacy Controls Recommendations......................................................................................113. Personal Data Protection Strategies.......................................................................................183.1 Protection of Personal Information..................................................................................183.2 Authorized Access and Disclosure of Personal Information...........................................193.3 De-Identification of Personal Data..................................................................................193.4 Use of Personal Digital Identities....................................................................................193.5 Security of Personal Data................................................................................................203.6 Archiving of Personal Data.............................................................................................204. Privacy Control Recommendations.......................................................................................20
Cloud Privacy and Security Assignment_2

2CLOUD PRIVACY AND SECURITY5. Interaction..............................................................................................................................27Conclusion.....................................................................................................................................28References......................................................................................................................................31
Cloud Privacy and Security Assignment_3

3CLOUD PRIVACY AND SECURITYIntroductionCloud computing is a technique or tool that helps to transfer data and other services ofcomputing. The computing services are of many types like the networking, storage, analytics,software, servers and many more (AlZain et al., 2012). These services transfers and deliversthese services on the Internet. This internet is also known as cloud. The organizations thatprovide these types of services in the cloud are known as the providers of cloud or cloudproviders. They get money for providing these types of services. This charge is taken on thebasis of the amount of usage the other organization is incurring and the amount of time theorganization is using those cloud services. In modern world, cloud computing is one of the mostutilized technologies. It is not even realized when cloud computing is used. Cloud computingdelivers software whenever they are on demand (Chaisiri, Lee & Niyato, 2012). It analyzes dataand makes them secured. It streams several video and audio. The main advantage of cloudcomputing is that it is extremely cost effective. The other advantages include the speed andproductivity of the services. It is extremely reliable and flexible, which makes it even popular forall organizations. In spite of having so many advantages, cloud computing do have severaldisadvantages. The main disadvantage of cloud computing is that it is completely dependent onthe Internet. When the Internet connection is not up to the mark or is not working, it is evidentthat cloud would not work. The other disadvantage of cloud computing is its security and privacy(Gampala, Inuganti & Muppidi, 2012). Though cloud is extremely reliable, however, there isalways a high chance that the data can get deleted or hacked in the cloud infrastructure. There arenormally three types of cloud services, which include Infrastructure as a Service, Platform as aService and Software as a Service.
Cloud Privacy and Security Assignment_4

4CLOUD PRIVACY AND SECURITYThe following report outlines a brief description on the cloud privacy and security on agiven case study. DAS or the Department of Administrative Services provides all types ofservices to the State Government of Australia. The services are of various types and categories(Gellman, 2012). These services include payroll, personnel management, procurementmanagement, contractor management and human resources management. The government ofAustralia has recently changed their policies. For this reason, the Department of AdministrativeServices is moving and shifting to an innovative cloud approach. This approach is known asShared Service approach. The specialty of this approach is that the Department of AdministrativeServices or DAS will manage and control a constant and fixed number of services. The reportdescribes about the personal data privacy strategy (Hamlen et al., 2012). This strategy includesthe management of personal information, collection and management of solicited personalinformation, usage and disclosure of personal information, utilization and security of digitalidentities, security of personal identities, and access to personal information, quality andcorrection of personal information. Proper recommendations are also provided for privacycontrols of personal information. The second strategy is for the personal data protection, whichincludes protection of personal information, authorized access and disclosure of personalinformation, de-identification of personal data, usage of personal digital identities, security ofpersonal data, archiving or personal data (Jain & Paul, 2013). Proper recommendations are alsoprovided for protection of personal data.
Cloud Privacy and Security Assignment_5

5CLOUD PRIVACY AND SECURITYDiscussion1. Personal Data Privacy Strategy1.1 Management of Personal InformationDepartment of Administrative Services or DAS is worried about their security andprivacy of data in the cloud (Liu, 2012). The quality of the strategy that is to be involved in DASshould be of good quality. However, the first step for this strategy is to manage and control thepersonal information. This will help in protecting the information easily. There are several stepsthat can help the DAS to manage their personal information. This particular step is in their handonly (Zissis & Lekkas, 2012). This management can stop other intruders to hack and intrude theinformation. The several steps for securing the information are as follows:a) Passwords: This is the most efficient and basic step for securing information.Passwords should be present in all aspects of their cloud, so that there exists no loophole in thesecurity. Moreover, keeping passwords is not only enough (Jadeja & Modi, 2012). Changing andaltering these passwords on a regular basis is mandatory for the DAS. The passwords can easilymange and secure the information from hackers.b) Secured Browser: The second most important way of managing and controlling thepersonal information in the Department of Administrative Services is utilizing a safe and securedbrowser (Yu et al., 2013). The safe browser does not allow any spam or virus to enter through itand even the hackers are unable to get into it. The personal information can be easily managedthrough a safe and secured browser.
Cloud Privacy and Security Assignment_6

6CLOUD PRIVACY AND SECURITY1.2 Collection and Management of Solicited Personal Information The second step in the privacy strategy is to collect and manage the solicited or requestedpersonal information. The collection of this data is easily done by following certain simple steps.These steps include:a) Reliable Source: Solicited personal information can be collected and managed onlywhen all the requirements are met and the information is absolutely necessary and are related toevery action and function (Iankoulova & Daneva, 2012). The main step is to collect, gather andacquire the information from a reliable source. b) Filtering of Information: This is the second most important step for secured collectionand management of personal information. Once the collection is done from a reliable source, theinformation should be filtered (Yang & Jia, 2013). This includes the management portion. Thefiltering of information will eradicate all the unnecessary information and thus only the requiredinformation will be collected. c) Review: The third step of this collection and management process is to review theinformation. This review is extremely important once the information is filtered out (Zissis &Lekkas, 2012). If the information is useful it will be kept and if the information is not useful, itshould be deleted on immediate basis.The above steps would be helpful for collection and management of personal informationof DAS.1.3 Use and Disclosure of Personal InformationThis is the third step of the privacy strategy of personal information. The informationshould be used and disclosed by authenticated users (Garrison, Kim & Wakefield, 2012). There
Cloud Privacy and Security Assignment_7

7CLOUD PRIVACY AND SECURITYare various ways to secure and block the access of unauthenticated users. The ways are asfollows:a) Logging Out: This is most basic way of securing personal information fromunauthenticated users (Gupta, Seetharaman & Raj, 2013). When a user logs in into an accountthat contains all the confidential data, there is always a chance that the data can be lost. Thehackers and the intruders will be easily able to get the information if he does not log out fromthat account or of he closes the system without logging out (Jadeja & Modi, 2012). Thisphenomenon stops the hackers from using the information to some extent. Even, the informationis not disclosed easily.b) Limited Access to Systems: This is the second way of securing the personalinformation from being used and disclosed in front of the unauthenticated users (Pearson, 2013).The access should be limited so that the hackers are not able to track them down. Passwords playa significant role in this phenomenon. The above ways would be extremely helpful for DAS to stop the use and disclosure oftheir personal information.1.4 Use and Security of Digital IdentitiesThe data of an organization, utilized to portray or represent an external representative isknown as a digital identity (Yang & Jia, 2013). This digital identity can either be anorganization, an application or a person. These identities have various advantages and benefits.The important benefits of digital identities are as follows: a) Data Integrity: Digital identity helps to maintain the integrity of the data. It isextremely beneficial for DAS.
Cloud Privacy and Security Assignment_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Assignment - Cloud Privacy and Security
|24
|7063
|98

Cloud Computing: PowerPoint Presentation, Office Automation, Migration and Cloud Models
|17
|2566
|55

(PDF) Cloud computing basics
|21
|2970
|129

Cloud Privacy and Security
|21
|6371
|142

Cloud Computing in Universities: Case Study Analysis
|33
|9514
|186

Cloud Security and Risk
|19
|5365
|373