logo

Cloud Privacy and Security

   

Added on  2023-06-08

17 Pages5315 Words326 Views
Running head: CLOUD PRIVACY AND SECURITY
CLOUD PRIVACY AND SECURITY
Name of the Student
Name of the University
Author Note

2CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction................................................................................................................................3
Security of employee data..........................................................................................................3
Privacy of employee data...........................................................................................................4
Digital identity issue..................................................................................................................6
Provider solution issue...............................................................................................................7
Data sensitivity...........................................................................................................................7
Conclusion..................................................................................................................................9
References................................................................................................................................10

3CLOUD PRIVACY AND SECURITY
Introduction
The concept of cloud computing can be considered one of the most advanced sectors
which can be related to the latest technology which are in use in recent times. The technology
is being adopted by most of the organisation due to the factor that there is a vast field of
advantage which can be achieved from the concept. The main aim of the concept of the
adaptation is that to exhibit different security aspects in the data which is stored in the
concept of the cloud (Ali, Khan & Vasilakos, 2015). Despite the different risk factors which
are involved in the technology the field of advantage which can be achieved from the concept
is very much on the higher end. The cloud concept helps the organisation to concentrate more
on the critical internal activity of the organisation rather than spending time on data security
and other aspects which are taken care of by the cloud providers. Most of the data which is
saved in the concept of the cloud can be considered to be very much crucial so it can be
stated here that the security of the data can be considered as one of the major priority in this
concept. There are different types of the provision of data security which are implemented by
the cloud provider so that there is no unethical activity possess in the data (Avram, 2014). In
the concept of cloud, there is not the only aspect of storing of data of the organisation, but it
can be used for other purposes as different types of services (SaaS, PaaS and Iaas) which can
be very much beneficial for the organisation
The main aim of the report is to take into consideration different aspects which are
related to the concept of cloud computing. The community-based charity organisation is
planning to move to a public cloud vendor to provide some services. Taking into
consideration the different movement aspects are taken into consideration in the report, and
the overall parameters of the cloud are majorly discussed in the report.

4CLOUD PRIVACY AND SECURITY
Security of employee data
In the concept of the cloud, there can be different issues which are related to the
employee data security. The main aspect which can be stated here that who has the overall
access of the data. The security aspect of the data can be judged directly from the aspect of
the different security solution which is provided from the end of the cloud providers. There
are different methods which can be used for the attackers to attack the cloud environment.
When there is an insecure network phone to access the network directly, the user can get
hacked or get attacked. On the other hand, the contractor of the network uses the application
of web that has a vulnerability which is embedded, it can be a backdoor which is not
protected, and in such situation, the user can get attacked.
In some of the situation it can be stated that during the password transfer between the
user and the cloud providers, the account can be hacked. The nature of cloud computing it
can be stated that it involves some of the ceding control from the aspect of the customer to
the providers of the service (Avram, 2014). The aspect of security and control cannot be
related to each other. According to research, it can be stated that data security in the concept
of cloud computing is potentially superior to the security in a corporate data centre due to the
same technique which drives so much good through the marketplace: division of labour and
economics of scale. Due to the security cost are distributed among a large number of
customers in the centre of the cloud, the cloud providers are very much able to apply far more
resources in the physical, operational security measure and technical (Ali, Khan & Vasilakos,
2015). The security measures which are implemented are far better than the security aspects
which are delivered by the government agencies and most of the corporations. Most of the
large providers of cloud also implement operating multiple data centre with replicated data
across facilities to safeguard the data from intruders. The core business which is related to the
operation of cloud service providers is delivering IT services and operating.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security
|17
|5160
|130

Cloud Computing in Banking Sector: Benefits and Workload Types
|9
|1807
|288

ITC571 Emerging Technology and Innovations Assignment
|26
|7374
|39

Security of Cloud Computing: Risks, Privacy, and Data Protection
|6
|4738
|66

The Use of Cloud Computing in the Organization
|17
|4055
|97

Data Security and Privacy in Cloud Computing
|23
|1935
|89