Cloud Privacy and Security: Threats and Risks to Employee Data
VerifiedAdded on 2023/06/10
|26
|7380
|354
AI Summary
This report discusses the security and privacy threats to employee data in cloud computing, covering existing and new threats, digital identity issues, provider solution issues, and data sensitivity. It follows a risk management process and includes a table of risk classes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD PRIVACY AND SECURITY
Cloud Privacy and Security
Name of the Student
Name of the University
Author’s Note
Cloud Privacy and Security
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction......................................................................................................................................2
Cloud Computing.............................................................................................................................2
1.1 Existing threats to security of employee data............................................................................5
1.2 New threats to security of employee data..................................................................................7
1.3 Severity of risk to security employee data.................................................................................8
2.1 Existing threats to privacy of employee data.............................................................................9
2.2 New Threats to privacy of employee data...............................................................................11
2.3 Severity of risk to privacy employee data...............................................................................12
3. Digital Identity issues................................................................................................................13
4. Provider Issues...........................................................................................................................15
5. Data Sensitivity Issues...............................................................................................................17
Conclusion.....................................................................................................................................19
References......................................................................................................................................21
CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction......................................................................................................................................2
Cloud Computing.............................................................................................................................2
1.1 Existing threats to security of employee data............................................................................5
1.2 New threats to security of employee data..................................................................................7
1.3 Severity of risk to security employee data.................................................................................8
2.1 Existing threats to privacy of employee data.............................................................................9
2.2 New Threats to privacy of employee data...............................................................................11
2.3 Severity of risk to privacy employee data...............................................................................12
3. Digital Identity issues................................................................................................................13
4. Provider Issues...........................................................................................................................15
5. Data Sensitivity Issues...............................................................................................................17
Conclusion.....................................................................................................................................19
References......................................................................................................................................21
2
CLOUD PRIVACY AND SECURITY
Introduction
Cloud computing has been emerging in large context in the IT field. The services
provided by the cloud computing have been beneficial for every organization in the market. The
cloud has been providing platform for various advance technologies in the market. The cloud
computing has been creating opportunities for various organizations in their growth in the
market. Various cloud computing service models including SaaS, PaaS and IaaS have been
implementing in the organization for developing business in the market (Almorsy, Grundy &
Muller 2016). The use of cloud computing services have beneficial for the organization. The
services are flexible and easily accessible for any part of the world. Cloud computing has been
providing services to both online and offline services in the companies. This technology has
enabled on-demand services to the customers and users of the cloud. Therefore this has gained
more attention in market. Cloud computing is mainly used for the data storage purposes. Large
amount of data and information of cloud users are stored over the cloud storage through internet.
Therefore, security of data and information is an important aspect for the cloud computing
services and providers. There have been many cases of cyber breaches in various companies.
This report deals with cyber issues in the Charity that helps in improving
accommodation, mental health and training to society. The security and privacy of employee
data, digital identity issues, and provider solution issues and data sensitivity have been discussed
in the report. A proper risks management process has been followed with the cloud deployment
models.
CLOUD PRIVACY AND SECURITY
Introduction
Cloud computing has been emerging in large context in the IT field. The services
provided by the cloud computing have been beneficial for every organization in the market. The
cloud has been providing platform for various advance technologies in the market. The cloud
computing has been creating opportunities for various organizations in their growth in the
market. Various cloud computing service models including SaaS, PaaS and IaaS have been
implementing in the organization for developing business in the market (Almorsy, Grundy &
Muller 2016). The use of cloud computing services have beneficial for the organization. The
services are flexible and easily accessible for any part of the world. Cloud computing has been
providing services to both online and offline services in the companies. This technology has
enabled on-demand services to the customers and users of the cloud. Therefore this has gained
more attention in market. Cloud computing is mainly used for the data storage purposes. Large
amount of data and information of cloud users are stored over the cloud storage through internet.
Therefore, security of data and information is an important aspect for the cloud computing
services and providers. There have been many cases of cyber breaches in various companies.
This report deals with cyber issues in the Charity that helps in improving
accommodation, mental health and training to society. The security and privacy of employee
data, digital identity issues, and provider solution issues and data sensitivity have been discussed
in the report. A proper risks management process has been followed with the cloud deployment
models.
3
CLOUD PRIVACY AND SECURITY
Cloud Computing
Cloud Computing is a concept that has helped in storing data and information of
organizations and users over the internet. This services have helped in providing a variety of
benefits to the organizations related to the storage of the data and information (Saa, Moscoso-
Zea, Costales, & Luján-Mora, 2017). Cloud computing have helped in maintaining a flexible and
accessible approach to the cloud users. There are various deployment models of the cloud
computing that have been discussed below:
Public Cloud: Public clouds refers to providing services to an organization and users
publically. The access privacy of the cloud services has been public in this case. Therefore, data
and information stored in this model will be publically accessed to other memory in the
organizations. Therefore, the security level of the model has been very low (Puthal, Sahoo &
Swain, 2015). The physical infrastructure of this model is designed by the cloud service
provider in the market. However, it helps in providing a large space for storing data and
information over the cloud.
Private Cloud: Private clouds that are designated to private organizations are providing a
single tenant service to users. Therefore, any assigned users will be able to access stored data
and information in cloud. The use of the private cloud has been used for storing legal and
private documents of the companies over the cloud. Therefore, the security level of the cloud
model is higher than other models of cloud (Singh & Chatterjee, 2017). The limited access to
people have helped in providing a security articles in the cloud ensuring the security in data ad
information stored in it. However, this model provides a standardized protection to data with
respect to scalability and size. This model provide complete control over the data and
information stored in the cloud.
CLOUD PRIVACY AND SECURITY
Cloud Computing
Cloud Computing is a concept that has helped in storing data and information of
organizations and users over the internet. This services have helped in providing a variety of
benefits to the organizations related to the storage of the data and information (Saa, Moscoso-
Zea, Costales, & Luján-Mora, 2017). Cloud computing have helped in maintaining a flexible and
accessible approach to the cloud users. There are various deployment models of the cloud
computing that have been discussed below:
Public Cloud: Public clouds refers to providing services to an organization and users
publically. The access privacy of the cloud services has been public in this case. Therefore, data
and information stored in this model will be publically accessed to other memory in the
organizations. Therefore, the security level of the model has been very low (Puthal, Sahoo &
Swain, 2015). The physical infrastructure of this model is designed by the cloud service
provider in the market. However, it helps in providing a large space for storing data and
information over the cloud.
Private Cloud: Private clouds that are designated to private organizations are providing a
single tenant service to users. Therefore, any assigned users will be able to access stored data
and information in cloud. The use of the private cloud has been used for storing legal and
private documents of the companies over the cloud. Therefore, the security level of the cloud
model is higher than other models of cloud (Singh & Chatterjee, 2017). The limited access to
people have helped in providing a security articles in the cloud ensuring the security in data ad
information stored in it. However, this model provides a standardized protection to data with
respect to scalability and size. This model provide complete control over the data and
information stored in the cloud.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
CLOUD PRIVACY AND SECURITY
Hybrid cloud: Hybrid cloud include both public and private cloud in the market.
Therefore, it has both attributes of private and public cloud models. It allows transitive
information exchange with portability. However, with the use of hybrid cloud, service provider’s
helps in using third party interdependence in the cloud services (Rittinghouse & Ransome,
2016). The maintenance of the hybrid cloud have been easy than there two cloud models.
There are various cloud service delivery models that are discussed below:
Software as a Service (SaaS): Cloud users and there companies have been running
applications and software over the cloud in the SaaS. This service helped in providing access to
several applications and programs that are high in cost. This service helps in providing it in rent
on monthly basis. Cloud users abs organization can use software and applications as per their
need and there is no need to buy an expensive application (Saa, Moscoso-Zea, Costales, &
Luján-Mora, 2017). Therefore, it has helped in minimizing the initial cost of users and
organizations in the market. The use if the SaaS has been used by most if the companies
including the Charity. Cloud users do not have to maintain and control software and programs in
the SaaS. This model helps in minimizing the cost of the software including operating system,
network, servers and storage.
Platform as a Service (PaaS): This model describes about a layer of software and
environment that helps in maintaining a deployed area for the users over the cloud. This model
is responsible for providing platforms for deployment of various applications in the organization
(Modi et al. 2013). Various applications including Java, Python and .net. PaaS providers helps in
offering predefined operating systems and application servers, including LAMP (Linux, Apache,
MySql and PHP) platform, restricted J2EE, and Ruby.
CLOUD PRIVACY AND SECURITY
Hybrid cloud: Hybrid cloud include both public and private cloud in the market.
Therefore, it has both attributes of private and public cloud models. It allows transitive
information exchange with portability. However, with the use of hybrid cloud, service provider’s
helps in using third party interdependence in the cloud services (Rittinghouse & Ransome,
2016). The maintenance of the hybrid cloud have been easy than there two cloud models.
There are various cloud service delivery models that are discussed below:
Software as a Service (SaaS): Cloud users and there companies have been running
applications and software over the cloud in the SaaS. This service helped in providing access to
several applications and programs that are high in cost. This service helps in providing it in rent
on monthly basis. Cloud users abs organization can use software and applications as per their
need and there is no need to buy an expensive application (Saa, Moscoso-Zea, Costales, &
Luján-Mora, 2017). Therefore, it has helped in minimizing the initial cost of users and
organizations in the market. The use if the SaaS has been used by most if the companies
including the Charity. Cloud users do not have to maintain and control software and programs in
the SaaS. This model helps in minimizing the cost of the software including operating system,
network, servers and storage.
Platform as a Service (PaaS): This model describes about a layer of software and
environment that helps in maintaining a deployed area for the users over the cloud. This model
is responsible for providing platforms for deployment of various applications in the organization
(Modi et al. 2013). Various applications including Java, Python and .net. PaaS providers helps in
offering predefined operating systems and application servers, including LAMP (Linux, Apache,
MySql and PHP) platform, restricted J2EE, and Ruby.
5
CLOUD PRIVACY AND SECURITY
Infrastructure as a Service (IaaS): This model helps in providing basic storage and
computing capabilities over the network (Albaroodi, Manickam & Singh, 2014). Different
networks, systems, servers and other computing equipment are provided by the cloud model on
rent. Therefore, the buying cost of the infrastructure becomes low.
1.1 Existing threats to security of employee data
Various organizations including The Charity used to upload their documents and data
over the internet. The use of cloud computing has been helping in storing professional and
private of the organization. The employee data and information of the Charity has been
uploaded over the cloud. The company is also using the SaaS for getting benefit of the services.
However, there have been various security issues in the employee data of the Charity. There are
various protocols that ensure data security over the cloud including FTP, HTTPS and SCP
(Ramachandra, Iftikhar & Khan, 2017). However, these protocols are not able to maintain
security of the employee data. The cloud security threats have been already faced by the Charity
in order to secure employee data over the cloud. There are several existing issues related to the
employee data in the Charity. These security issues have been discussed below:
Confidentiality: This is one of existing cloud security issues related to the employee data.
This threat mainly occur inside the organization. The services are flexible and easily accessible
for any part of the world. This threat has been already existing in the Charity. The delivery of
cloud services are hampered by this threat. There are various middles that can be affected by this
security issue including the SaaS. Software and programs provided by the SaaS has been leaked
out if the company that have been creating loss to the business (Kshetri, 2013). The employee
data has been leaked by the insider attack causing loss of privacy of employee. There are various
security breaches due to the confidential breach. The use of cloud computing services have
CLOUD PRIVACY AND SECURITY
Infrastructure as a Service (IaaS): This model helps in providing basic storage and
computing capabilities over the network (Albaroodi, Manickam & Singh, 2014). Different
networks, systems, servers and other computing equipment are provided by the cloud model on
rent. Therefore, the buying cost of the infrastructure becomes low.
1.1 Existing threats to security of employee data
Various organizations including The Charity used to upload their documents and data
over the internet. The use of cloud computing has been helping in storing professional and
private of the organization. The employee data and information of the Charity has been
uploaded over the cloud. The company is also using the SaaS for getting benefit of the services.
However, there have been various security issues in the employee data of the Charity. There are
various protocols that ensure data security over the cloud including FTP, HTTPS and SCP
(Ramachandra, Iftikhar & Khan, 2017). However, these protocols are not able to maintain
security of the employee data. The cloud security threats have been already faced by the Charity
in order to secure employee data over the cloud. There are several existing issues related to the
employee data in the Charity. These security issues have been discussed below:
Confidentiality: This is one of existing cloud security issues related to the employee data.
This threat mainly occur inside the organization. The services are flexible and easily accessible
for any part of the world. This threat has been already existing in the Charity. The delivery of
cloud services are hampered by this threat. There are various middles that can be affected by this
security issue including the SaaS. Software and programs provided by the SaaS has been leaked
out if the company that have been creating loss to the business (Kshetri, 2013). The employee
data has been leaked by the insider attack causing loss of privacy of employee. There are various
security breaches due to the confidential breach. The use of cloud computing services have
6
CLOUD PRIVACY AND SECURITY
beneficial for the organization. Cloud computing has been providing services to both online and
offline services in the companies. Various confidential data is uploaded over the cloud storage
that has been accessed by unauthorized users and breached out in the market. Therefore, this has
been causing financial loss to the organization. Data leakage has been major issue in the cloud
computing environment as data and information in the public cloud is accessed by anyone in the
organization.
Figure 1: Security traits
(Source: Aljawarneh, Alawneh, & Jaradat, 2017, pp.387)
Integrity: The integrity of information and data has been another issues that has been
faced by the organization in recent years. The use of the data segregation in organization has
been craving problems for the organization. Various cloud hosting environments including SaaS
has been configured for sharing computing resource among all other employee included in the
cloud server. Therefore, there can be breaching of data from Cloud database system (Lin &
Liao, 2017). This has been a great threat to data integrity of the cloud storage. The remote of data
and information has been provided to all of the employees including the public cloud services.
The use to the Cloud can be done by any of the employees. This create high chances of breaches
CLOUD PRIVACY AND SECURITY
beneficial for the organization. Cloud computing has been providing services to both online and
offline services in the companies. Various confidential data is uploaded over the cloud storage
that has been accessed by unauthorized users and breached out in the market. Therefore, this has
been causing financial loss to the organization. Data leakage has been major issue in the cloud
computing environment as data and information in the public cloud is accessed by anyone in the
organization.
Figure 1: Security traits
(Source: Aljawarneh, Alawneh, & Jaradat, 2017, pp.387)
Integrity: The integrity of information and data has been another issues that has been
faced by the organization in recent years. The use of the data segregation in organization has
been craving problems for the organization. Various cloud hosting environments including SaaS
has been configured for sharing computing resource among all other employee included in the
cloud server. Therefore, there can be breaching of data from Cloud database system (Lin &
Liao, 2017). This has been a great threat to data integrity of the cloud storage. The remote of data
and information has been provided to all of the employees including the public cloud services.
The use to the Cloud can be done by any of the employees. This create high chances of breaches
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
CLOUD PRIVACY AND SECURITY
out the integrity of data in the database (Alassafi et al., 2017). The modification of data is
another problem in the data integrity issue. The administrator of the cloud server has the super
control of the data and information accessed and controlled by the employee. Therefore, the use
of data administrator is look after the security breaches in the cloud computing. However, there
has been lack in the security protocols of the Charity. However, implementation of access
controls has been accessed by cloud enterprises. The access to the database has been creating a
major problems in the integrity if the data and information in the organization.
Availability: The cloud provider has been increasing responsibility for implementing
change management in the cloud computing of the company. This might help in providing
proper approaching the delivery of services if the cloud in the company (Saxena, 2013).
Therefore, the use if the change management in the cloud computing have been uncres8ng the
availability of the data in company. The access of the data has been increased to the employees
that has been causing problems in the cloud computing services.
1.2 New threats to security of employee data
Existing threats in the Charity has been discussed in above section. However, there are
various problems that can be arise in the Charity reject to the employee data. The cloud
company has been creating several opportunity for the employee to store their data over the
internet. However, there has been various cyber-attacks in the computing resources in the office
connected with the internet including mobile storage (Goyal, 2014). However, according to the
Cloud Security Alliance (CSA), there has been several cyber threats might be emerging in the
Charity related ti the data security in the cloud computing.
CLOUD PRIVACY AND SECURITY
out the integrity of data in the database (Alassafi et al., 2017). The modification of data is
another problem in the data integrity issue. The administrator of the cloud server has the super
control of the data and information accessed and controlled by the employee. Therefore, the use
of data administrator is look after the security breaches in the cloud computing. However, there
has been lack in the security protocols of the Charity. However, implementation of access
controls has been accessed by cloud enterprises. The access to the database has been creating a
major problems in the integrity if the data and information in the organization.
Availability: The cloud provider has been increasing responsibility for implementing
change management in the cloud computing of the company. This might help in providing
proper approaching the delivery of services if the cloud in the company (Saxena, 2013).
Therefore, the use if the change management in the cloud computing have been uncres8ng the
availability of the data in company. The access of the data has been increased to the employees
that has been causing problems in the cloud computing services.
1.2 New threats to security of employee data
Existing threats in the Charity has been discussed in above section. However, there are
various problems that can be arise in the Charity reject to the employee data. The cloud
company has been creating several opportunity for the employee to store their data over the
internet. However, there has been various cyber-attacks in the computing resources in the office
connected with the internet including mobile storage (Goyal, 2014). However, according to the
Cloud Security Alliance (CSA), there has been several cyber threats might be emerging in the
Charity related ti the data security in the cloud computing.
8
CLOUD PRIVACY AND SECURITY
Hacking of sensitive employee data: Cloud computing has been helping in providing a
great platform for storing data and information of employee and the user. Therefore, there is
huge possibility of cyber-attacks over the cloud server. Hacking of cloud network has been
common in recent times. Therefore, there is a huge risk of data loss of employee form the cloud
storage (Shei, Mouratidis & Delaney, 2017).
Illegal local network access from cloud services: Most CSP's luckily do furnish antiviruses
and firewalls' however with developing idea of online risks; a bargained cloud can be a close for end
clients and suppliers both. The public cloud has been accessed by all the members in the cloud.
Therefore, security of data and information in the cloud has been hampered by the accessibility
factor. Therefore, the security of data is not good in the public cloud. The Charity has been using
Public cloud in SaaS solution. Therefore, all data and information over the cloud is not safe for the
organization. The employee data stored over the public cloud can be accessed by ether members in
the cloud. This might create a serious issue in the organization related to data loss. The use of the
public cloud has helped in reducing complexity in the cloud services adopted by the Charity.
Stolen information from cloud computing employees: Various cases have been reported
regarding the stolen of data form the cloud server. Hackers are targeting the cloud server as there
are a lot of employee data stored in it. This has been creating an issue in the CSP and observed
at cloud.
Adherence and compliance of providers to security standards: The Cloud Security
Alliance (CSA) helps Cloud suppliers by giving key suggestions for keeping identified risks that
all CSP's face, a considerable lot of which are specified as every risk (Garg & Babbar, 2017).
CLOUD PRIVACY AND SECURITY
Hacking of sensitive employee data: Cloud computing has been helping in providing a
great platform for storing data and information of employee and the user. Therefore, there is
huge possibility of cyber-attacks over the cloud server. Hacking of cloud network has been
common in recent times. Therefore, there is a huge risk of data loss of employee form the cloud
storage (Shei, Mouratidis & Delaney, 2017).
Illegal local network access from cloud services: Most CSP's luckily do furnish antiviruses
and firewalls' however with developing idea of online risks; a bargained cloud can be a close for end
clients and suppliers both. The public cloud has been accessed by all the members in the cloud.
Therefore, security of data and information in the cloud has been hampered by the accessibility
factor. Therefore, the security of data is not good in the public cloud. The Charity has been using
Public cloud in SaaS solution. Therefore, all data and information over the cloud is not safe for the
organization. The employee data stored over the public cloud can be accessed by ether members in
the cloud. This might create a serious issue in the organization related to data loss. The use of the
public cloud has helped in reducing complexity in the cloud services adopted by the Charity.
Stolen information from cloud computing employees: Various cases have been reported
regarding the stolen of data form the cloud server. Hackers are targeting the cloud server as there
are a lot of employee data stored in it. This has been creating an issue in the CSP and observed
at cloud.
Adherence and compliance of providers to security standards: The Cloud Security
Alliance (CSA) helps Cloud suppliers by giving key suggestions for keeping identified risks that
all CSP's face, a considerable lot of which are specified as every risk (Garg & Babbar, 2017).
9
CLOUD PRIVACY AND SECURITY
1.3 Severity of risk to security employee data
Impact from the data subjects
4
Maximum
4 8 12
(Loss of
confidentiality)
16
3
Significant
3 6 9 12
2
Limited
2 4
(Loss of
personal
data)
6
(Loss of
integrity)
8
1
Negligible
1 2 3 4
1
Negligible
2
Limited
3
Significant
4
Maximum
Likelihood
(Source: Created by Author)
Risk Classes Factor
High Risk 16
Risk 12-15
Reduced Risk 6-11
Low Risk 1-5
The above risk classes can arise out of the product of the effect and likelihood.
CLOUD PRIVACY AND SECURITY
1.3 Severity of risk to security employee data
Impact from the data subjects
4
Maximum
4 8 12
(Loss of
confidentiality)
16
3
Significant
3 6 9 12
2
Limited
2 4
(Loss of
personal
data)
6
(Loss of
integrity)
8
1
Negligible
1 2 3 4
1
Negligible
2
Limited
3
Significant
4
Maximum
Likelihood
(Source: Created by Author)
Risk Classes Factor
High Risk 16
Risk 12-15
Reduced Risk 6-11
Low Risk 1-5
The above risk classes can arise out of the product of the effect and likelihood.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
CLOUD PRIVACY AND SECURITY
2.1 Existing threats to privacy of employee data
Denial of service attacks: Data sensitivity has been an important threat to cloud clients
and all things considered to be same as to cloud professional for maintaining solutions to it
(Dang-Pham, Pittayachawan, & Bruno, 2017). This attack shuts down the main server if the
Charity and all the processes are broken. Therefore, in an instance all the operations in the
Charity might get lost. Therefore, this has been a great threat for the organization.
Increased authentication demands: The authentication factor of the users is an important
aspect for the security purposes in the Charity. There have been many unauthorized users trying
to breach into the systems of the Charity. This has led to the data loss in the organization. The
improvement of cloud computing in outrageous, permit utilization of customers on customer
side. As opposed to buying a permit and introducing a product on the customer side, clients will
validate so as to have the capacity to utilize a cloud application. There are a few favorable
circumstances in such a model, for example, making programming theft more troublesome and
making concentrated checking more helpful.
2.2 New Threats to privacy of employee data
Social networking attacks: There has been various social networking platforms including
Facebook, Twitter, Instagram and LinkedIn (Coppolino et al. 2017). Various users have been
using their social life over their account online. There have been increase in the cyber-attacks
over the internet. Huge amount of data loss has been reported over a year due to this social media
platforms. There have been increase in the fake profiles over the Facebook and it is continuously
increasing. The digital identity theft has been a common problem for users over the internet.
The use of social media platform has been for connecting with over people over the world. The
CLOUD PRIVACY AND SECURITY
2.1 Existing threats to privacy of employee data
Denial of service attacks: Data sensitivity has been an important threat to cloud clients
and all things considered to be same as to cloud professional for maintaining solutions to it
(Dang-Pham, Pittayachawan, & Bruno, 2017). This attack shuts down the main server if the
Charity and all the processes are broken. Therefore, in an instance all the operations in the
Charity might get lost. Therefore, this has been a great threat for the organization.
Increased authentication demands: The authentication factor of the users is an important
aspect for the security purposes in the Charity. There have been many unauthorized users trying
to breach into the systems of the Charity. This has led to the data loss in the organization. The
improvement of cloud computing in outrageous, permit utilization of customers on customer
side. As opposed to buying a permit and introducing a product on the customer side, clients will
validate so as to have the capacity to utilize a cloud application. There are a few favorable
circumstances in such a model, for example, making programming theft more troublesome and
making concentrated checking more helpful.
2.2 New Threats to privacy of employee data
Social networking attacks: There has been various social networking platforms including
Facebook, Twitter, Instagram and LinkedIn (Coppolino et al. 2017). Various users have been
using their social life over their account online. There have been increase in the cyber-attacks
over the internet. Huge amount of data loss has been reported over a year due to this social media
platforms. There have been increase in the fake profiles over the Facebook and it is continuously
increasing. The digital identity theft has been a common problem for users over the internet.
The use of social media platform has been for connecting with over people over the world. The
11
CLOUD PRIVACY AND SECURITY
use of social media has been helping in maintaining a keen approach to enhance the
communication with people in organization and society. Therefore, there is a huge data transfer
done over the social media websites. Therefore, there has been a great chance of cyber-breach
over these websites. The Charity might suffer with these problems in the future. Therefore, a
strong secured protocol is required for restricting cyber-attacks in the Charity.
Mobile device attacks: The utilization of advanced mobile phones has expanded and
cloud availability is presently not any more constrained to PC or work area figuring gadgets.
Assaults are currently rising that are focused for versatile gadgets and depend on highlights
generally connected with PCs and work areas, including rich application programming interfaces
(APIs) that encouraging group of people correspondences and foundation administrations,
dependably on remote Internet access, and substantial nearby information abilities (Rewadkar &
Ghatage , 2014). As versatile gadgets currently have these proportionate highlights, Internet-
based spyware, virus or even physical attacks may probably cause against cell phones, as they
are conceivably a less dangerous focus on attacker that wishes for staying undetected. This is for
the most part bolstered by the way that most cell phones do not have the comparable security
highlights empowered, or for some situation accessible. The HR management of the Charity has
been implanting SaaS cloud model in the Charity for using software and other computing
resources in the Charity. For instance, develop anti-malware, antivirus or full symmetric
encryption innovations are not across the board on current accessible advanced mobile phones.
2.3 Severity of risk to privacy employee data
Impact 4
Maximum
4 8 12
(Mobile Device
attack)
16
(Denial of
Service)
CLOUD PRIVACY AND SECURITY
use of social media has been helping in maintaining a keen approach to enhance the
communication with people in organization and society. Therefore, there is a huge data transfer
done over the social media websites. Therefore, there has been a great chance of cyber-breach
over these websites. The Charity might suffer with these problems in the future. Therefore, a
strong secured protocol is required for restricting cyber-attacks in the Charity.
Mobile device attacks: The utilization of advanced mobile phones has expanded and
cloud availability is presently not any more constrained to PC or work area figuring gadgets.
Assaults are currently rising that are focused for versatile gadgets and depend on highlights
generally connected with PCs and work areas, including rich application programming interfaces
(APIs) that encouraging group of people correspondences and foundation administrations,
dependably on remote Internet access, and substantial nearby information abilities (Rewadkar &
Ghatage , 2014). As versatile gadgets currently have these proportionate highlights, Internet-
based spyware, virus or even physical attacks may probably cause against cell phones, as they
are conceivably a less dangerous focus on attacker that wishes for staying undetected. This is for
the most part bolstered by the way that most cell phones do not have the comparable security
highlights empowered, or for some situation accessible. The HR management of the Charity has
been implanting SaaS cloud model in the Charity for using software and other computing
resources in the Charity. For instance, develop anti-malware, antivirus or full symmetric
encryption innovations are not across the board on current accessible advanced mobile phones.
2.3 Severity of risk to privacy employee data
Impact 4
Maximum
4 8 12
(Mobile Device
attack)
16
(Denial of
Service)
12
CLOUD PRIVACY AND SECURITY
from the data subjects
3
Significant
3
(Mash-up
authorization)
6 9 12
2
Limited
2 4
(Side
Channel
attacks)
6
(Social
networking
attacks)
8
1
Negligible
1 2 3 4
1
Negligible
2
Limited
3
Significant
4
Maximum
Likelihood
(Source: Created by Author)
Risk Classes Factor
High Risk 16
Risk 12-15
Reduced Risk 6-11
Low Risk 1-5
3. Digital Identity issues
Identity deals with the existence in the real world. It can be any entity including person or
computer system. There are some unique identifiers in these entities including DNA and
fingerprints. However, in the case of online identity, person over the social networks is
recognized as avatar or persona (Behl & Behl, 2012). Therefore, the social roles of these avatars
is categorized as online identity. After that, digital identity refers to the set of claims that can be
CLOUD PRIVACY AND SECURITY
from the data subjects
3
Significant
3
(Mash-up
authorization)
6 9 12
2
Limited
2 4
(Side
Channel
attacks)
6
(Social
networking
attacks)
8
1
Negligible
1 2 3 4
1
Negligible
2
Limited
3
Significant
4
Maximum
Likelihood
(Source: Created by Author)
Risk Classes Factor
High Risk 16
Risk 12-15
Reduced Risk 6-11
Low Risk 1-5
3. Digital Identity issues
Identity deals with the existence in the real world. It can be any entity including person or
computer system. There are some unique identifiers in these entities including DNA and
fingerprints. However, in the case of online identity, person over the social networks is
recognized as avatar or persona (Behl & Behl, 2012). Therefore, the social roles of these avatars
is categorized as online identity. After that, digital identity refers to the set of claims that can be
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
CLOUD PRIVACY AND SECURITY
made by a digital subject about another subject. This might help in describing the capacities of
the contextual information. Claim is a function of the attributes of the digital subject as:
id = {c1, c2, . . . , cn}
Where ci is a function fi of the attributes {a1, . . . , am} of the digital entity. The digital
identity can be written:
id = {f1(N ame), f2(DateOfBirth)}
with { f1(Name) = Name
{f2(DateOfBirth) = Age > 18
The first issue is identity theft. In this case, attacker uses digital identity of another
identity for impersonating them. The security that helps in matching the identity threat is the
authentication. This is one of the security standards that helps in verifying digital identity of an
entity. Confidentiality is one of the major treat to the digital identity. The personal data of the
users including employee are breached out of the database. Various sensitive data including login
Id, passwords and biometric data need not to be shared with anyone (Sabahi, 2012). The
confidentiality property helps in assuring that only intended entities are allowed to access to
content of the message. The digital identity has been addressing the authorization property.
However, the claims might express entity capacities for refereeing other customers. The rights
associated with the laws of digital identity has been issued in the context that might help in
maintaining security of data and information online.
There has been various cases of misuse of digital identity. Digital identity has been used
for accessing sensitive data and revocation that in normal forms. There has been several cases of
CLOUD PRIVACY AND SECURITY
made by a digital subject about another subject. This might help in describing the capacities of
the contextual information. Claim is a function of the attributes of the digital subject as:
id = {c1, c2, . . . , cn}
Where ci is a function fi of the attributes {a1, . . . , am} of the digital entity. The digital
identity can be written:
id = {f1(N ame), f2(DateOfBirth)}
with { f1(Name) = Name
{f2(DateOfBirth) = Age > 18
The first issue is identity theft. In this case, attacker uses digital identity of another
identity for impersonating them. The security that helps in matching the identity threat is the
authentication. This is one of the security standards that helps in verifying digital identity of an
entity. Confidentiality is one of the major treat to the digital identity. The personal data of the
users including employee are breached out of the database. Various sensitive data including login
Id, passwords and biometric data need not to be shared with anyone (Sabahi, 2012). The
confidentiality property helps in assuring that only intended entities are allowed to access to
content of the message. The digital identity has been addressing the authorization property.
However, the claims might express entity capacities for refereeing other customers. The rights
associated with the laws of digital identity has been issued in the context that might help in
maintaining security of data and information online.
There has been various cases of misuse of digital identity. Digital identity has been used
for accessing sensitive data and revocation that in normal forms. There has been several cases of
14
CLOUD PRIVACY AND SECURITY
the digital identity theft in the organizations (Juels, Oprea, & Bowers, 2017). Using anyone
identity has been a legally penalized by the government. Confidentiality and Personal data theft
have been same in respect to property an attack on security protocols. The HR management of
the Charity has been engaged in the maintenance of the security of the digital identity of the
employees. Therefore this has gained more attention in the market. Cloud computing is mainly
used for the data storage purposes. Large amount of data and information of cloud users are
stored over the cloud storage through internet. Therefore, security of data and information is an
important aspect for the cloud computing services and providers The biometric data has been
stored over the cloud that has helped in maintaining a keen approach to the maintenance if the
data storage.
4. Provider Issues
The adoption of SaaS model by the HR management of the Charity has been facing some
of issues related to security of the employee data over cloud. The approach has been helping in
using updated software and programs as a service in the company. The use of SaaS model in the
organization has been beneficial for the development of the organization. Therefore, thus
condition has allowed reduce in the cost of software, operating systems and other computing
resources (Khan, 2016). The Service Level Agreement (SLA) done with the SaaS simply verifies
improvement in the services provided by service provider to Charity. There has been breach in
the data stored over the cloud. Therefore, the SLA has been misaligned with the organization by
service provider. The HR management of the Charity have to look after this matters this was
proposed by the department. Legal policy needs to be imposed in the provider that might help in
getting to a solution of the issue. The SaaS provider might face different issues related to the
breaching out of data during transfer. The privacy and confidentiality of data and information
CLOUD PRIVACY AND SECURITY
the digital identity theft in the organizations (Juels, Oprea, & Bowers, 2017). Using anyone
identity has been a legally penalized by the government. Confidentiality and Personal data theft
have been same in respect to property an attack on security protocols. The HR management of
the Charity has been engaged in the maintenance of the security of the digital identity of the
employees. Therefore this has gained more attention in the market. Cloud computing is mainly
used for the data storage purposes. Large amount of data and information of cloud users are
stored over the cloud storage through internet. Therefore, security of data and information is an
important aspect for the cloud computing services and providers The biometric data has been
stored over the cloud that has helped in maintaining a keen approach to the maintenance if the
data storage.
4. Provider Issues
The adoption of SaaS model by the HR management of the Charity has been facing some
of issues related to security of the employee data over cloud. The approach has been helping in
using updated software and programs as a service in the company. The use of SaaS model in the
organization has been beneficial for the development of the organization. Therefore, thus
condition has allowed reduce in the cost of software, operating systems and other computing
resources (Khan, 2016). The Service Level Agreement (SLA) done with the SaaS simply verifies
improvement in the services provided by service provider to Charity. There has been breach in
the data stored over the cloud. Therefore, the SLA has been misaligned with the organization by
service provider. The HR management of the Charity have to look after this matters this was
proposed by the department. Legal policy needs to be imposed in the provider that might help in
getting to a solution of the issue. The SaaS provider might face different issues related to the
breaching out of data during transfer. The privacy and confidentiality of data and information
15
CLOUD PRIVACY AND SECURITY
has to be maintained in the organization for the development in the market. The data flow in the
cloud has been intercepted by different viruses and malwares (Flint, 2017). These small
programs have breached out data and information form the medium. The backup of the data has
not been kept in the cloud that might cause a huge loss to the company.
The availability of data is a main factor in this case as all data need to be shown to the
general employee. The employee data has been considered to be sensitive data as there are
several personal data and information stored over the internet. The accessibility of the SaaS
model services have been helping in maintaining the importance of data. SaaS solution can be
accessed with the help of mobile devices (Khan, 2016). Therefore, vulnerabilities have been
found in the mobile devices. Various sites are accessed by the mobile phones and there is a low
security protocol installed in them. Therefore, viruses and malwares can directly attack mobile
devices in order to breaching out data and information from it. The decision making systems of
the stakeholders have been tampered in the Charity. Therefore, smart and instant decisions are
not prepared by the stakeholders resulting in the degradation of the organization. The threat of
data quality has been increased in the arena as the security of the data has been over focused in
the company. There have been many cases of hardware failure in the organization. This has
been causing data loss to the company, employee data has been stored over the local storage in
the company. However, due to cyber-attacks in the central database in the organization has led
to the loss of the data and information of the employees (Ahmed & Litchfield, 2016). However,
company used to keep normal data over the pubic cloud node, still this is a loss to the company.
Therefore, external hackers have been creating a loophole in the security protocols of that
organization and cloud computing. Several cyber-attacks have been reported in the recent years
that has been a critical concern about the organization. The personal information has been stored
CLOUD PRIVACY AND SECURITY
has to be maintained in the organization for the development in the market. The data flow in the
cloud has been intercepted by different viruses and malwares (Flint, 2017). These small
programs have breached out data and information form the medium. The backup of the data has
not been kept in the cloud that might cause a huge loss to the company.
The availability of data is a main factor in this case as all data need to be shown to the
general employee. The employee data has been considered to be sensitive data as there are
several personal data and information stored over the internet. The accessibility of the SaaS
model services have been helping in maintaining the importance of data. SaaS solution can be
accessed with the help of mobile devices (Khan, 2016). Therefore, vulnerabilities have been
found in the mobile devices. Various sites are accessed by the mobile phones and there is a low
security protocol installed in them. Therefore, viruses and malwares can directly attack mobile
devices in order to breaching out data and information from it. The decision making systems of
the stakeholders have been tampered in the Charity. Therefore, smart and instant decisions are
not prepared by the stakeholders resulting in the degradation of the organization. The threat of
data quality has been increased in the arena as the security of the data has been over focused in
the company. There have been many cases of hardware failure in the organization. This has
been causing data loss to the company, employee data has been stored over the local storage in
the company. However, due to cyber-attacks in the central database in the organization has led
to the loss of the data and information of the employees (Ahmed & Litchfield, 2016). However,
company used to keep normal data over the pubic cloud node, still this is a loss to the company.
Therefore, external hackers have been creating a loophole in the security protocols of that
organization and cloud computing. Several cyber-attacks have been reported in the recent years
that has been a critical concern about the organization. The personal information has been stored
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
CLOUD PRIVACY AND SECURITY
over the cloud computing that has been creating benefit for the employee. However, they can
access it form anywhere over the internet. This has been drawing attention of the inside
attackers in the organizations. Therefore, various employee data has been breached out. There
has been several security protocols failure in the organization that has been beneficial for the
intruders to breach into the security database of the company. Therefore, database of the
company has been breached out and employee data and information has been breached out of the
database.
The access control has been maintained by the database administrator that helps in
providing control to ne body. Therefore, the use of database can be accessed by the database
administrator only. The use of cloud computing has been helping in storing professional and
private of the organization. The employee data and information of the Charity has been
uploaded over the cloud. The threat of data quality has been increased in the arena as the
security if the data has been over focused in the company. There have been many cases of
hardware failure in the organization. This has been causing data loss to the company, employee
data has been stored over the local storage in the company (Rajasekaran, et al., 2016). However,
due to cyber-attacks in the central database in the organization has led to loss of data of the
employees. The company is also using SaaS for getting benefit of the services. However, there
have been various security issues in the employee data of the Charity. Therefore, hosting if the
cloud platforms server the intense has been an important issue trending in the organization. The
negative effects of the cyber-attacks in the cloud storage database has been a great loss to the
Charity.
CLOUD PRIVACY AND SECURITY
over the cloud computing that has been creating benefit for the employee. However, they can
access it form anywhere over the internet. This has been drawing attention of the inside
attackers in the organizations. Therefore, various employee data has been breached out. There
has been several security protocols failure in the organization that has been beneficial for the
intruders to breach into the security database of the company. Therefore, database of the
company has been breached out and employee data and information has been breached out of the
database.
The access control has been maintained by the database administrator that helps in
providing control to ne body. Therefore, the use of database can be accessed by the database
administrator only. The use of cloud computing has been helping in storing professional and
private of the organization. The employee data and information of the Charity has been
uploaded over the cloud. The threat of data quality has been increased in the arena as the
security if the data has been over focused in the company. There have been many cases of
hardware failure in the organization. This has been causing data loss to the company, employee
data has been stored over the local storage in the company (Rajasekaran, et al., 2016). However,
due to cyber-attacks in the central database in the organization has led to loss of data of the
employees. The company is also using SaaS for getting benefit of the services. However, there
have been various security issues in the employee data of the Charity. Therefore, hosting if the
cloud platforms server the intense has been an important issue trending in the organization. The
negative effects of the cyber-attacks in the cloud storage database has been a great loss to the
Charity.
17
CLOUD PRIVACY AND SECURITY
5. Data Sensitivity Issues
With the outsourced cloud storage option for which the users only pay for consumed
resources (in the pay as you go model) the service providers offers a shared pool of configurable
resources. User of the services can scale up and down the required resources according to their
needs. This resources includes storage capacities or computing resources. However, with all the
benefits of cloud services there are some certain security issues are also related to the services
that may have significant and bad impact on the users of services (Shei, Mouratidis, & Delaney,
2017). These security issues include the data breach or cyber-attacks that are distributed inside
the virtualized environment in which services as well as organizational data are distributed
among some networked resources of Cloud Service Provider.
The computing resources in the virtualized environment consist of vulnerabilities that
includes loss of confidentiality, data integrity and privacy of the business and personal data.
From the organizational perspective these stored data in the cloud and security concerns are quite
legitimate as this may lead to the loss of business due to the lack of confidence of the users about
the privacy of the data shared with the organization. Even though there are numerous solutions
are developed including numerous tools and protocols in order to implement anonymization as
well as encryption of stored data so that the confidentiality of the data can be maintained (Garg
& Babbar, 2017). Even though there are numerous solutions have been developed but yet not
have been widely adopted.
The privacy of the data in the cloud infrastructure mainly impacted due to lack of user
control over the architecture, unauthorized secondary usage by unauthorized users, training and
expertise, high complexity level in the regulatory compliance, data flow restrictions are the main
challenges in maintaining privacy of data in cloud environment.
CLOUD PRIVACY AND SECURITY
5. Data Sensitivity Issues
With the outsourced cloud storage option for which the users only pay for consumed
resources (in the pay as you go model) the service providers offers a shared pool of configurable
resources. User of the services can scale up and down the required resources according to their
needs. This resources includes storage capacities or computing resources. However, with all the
benefits of cloud services there are some certain security issues are also related to the services
that may have significant and bad impact on the users of services (Shei, Mouratidis, & Delaney,
2017). These security issues include the data breach or cyber-attacks that are distributed inside
the virtualized environment in which services as well as organizational data are distributed
among some networked resources of Cloud Service Provider.
The computing resources in the virtualized environment consist of vulnerabilities that
includes loss of confidentiality, data integrity and privacy of the business and personal data.
From the organizational perspective these stored data in the cloud and security concerns are quite
legitimate as this may lead to the loss of business due to the lack of confidence of the users about
the privacy of the data shared with the organization. Even though there are numerous solutions
are developed including numerous tools and protocols in order to implement anonymization as
well as encryption of stored data so that the confidentiality of the data can be maintained (Garg
& Babbar, 2017). Even though there are numerous solutions have been developed but yet not
have been widely adopted.
The privacy of the data in the cloud infrastructure mainly impacted due to lack of user
control over the architecture, unauthorized secondary usage by unauthorized users, training and
expertise, high complexity level in the regulatory compliance, data flow restrictions are the main
challenges in maintaining privacy of data in cloud environment.
18
CLOUD PRIVACY AND SECURITY
In order to mitigate privacy of data in cloud environment, Ren & Gao, (2016) suggested
use of Homomorphic encryption technique. This solution is based on the computing technique
over encrypted data stored in cloud in which it is not necessary for parties to know the public or
private keys belonging to different parties who are the users of the cloud storage space. In order
to ensure confidentiality of organizational data owner organization or individual uploads
encrypted data using the public key and process engine reads data from cloud it would not
requires private key to decrypt data and complete processing.
On the other hand, Ahmed & Litchfield, (2016) proposed the anonymization of data in
the cloud. In the approach an integration architecture is proposed in order to perform aggregated
queries over anonymized individual and organizational data sets coming from different sources.
In this approach, data subject identifiers are removed by the providers while applying two-level
encryption technique through the use of the PKI certificates and hashing methodology. Sensitive
information is then anonymized using open-source toolkits. At the last stage the data is encrypted
granularly by utilizing cloud provider’s public key.
Conclusion
This has been concluded that cloud computing has helped in providing simplified
services to the Charity. The use of cloud computing in organization has helped in maintaining
development of company in the market. The cloud services has been dealing with the storage of
the employee data over the internet. The HR management of the Charity has been implanting
SaaS cloud model in the Charity for using software and other computing resources in the
Charity. However, security issues in cloud computing have been discussed in report. The
existing security threats to the employee data has been discussed in the report. The new security
threats to the employee data have been explained in the report. The use of the risk severity
CLOUD PRIVACY AND SECURITY
In order to mitigate privacy of data in cloud environment, Ren & Gao, (2016) suggested
use of Homomorphic encryption technique. This solution is based on the computing technique
over encrypted data stored in cloud in which it is not necessary for parties to know the public or
private keys belonging to different parties who are the users of the cloud storage space. In order
to ensure confidentiality of organizational data owner organization or individual uploads
encrypted data using the public key and process engine reads data from cloud it would not
requires private key to decrypt data and complete processing.
On the other hand, Ahmed & Litchfield, (2016) proposed the anonymization of data in
the cloud. In the approach an integration architecture is proposed in order to perform aggregated
queries over anonymized individual and organizational data sets coming from different sources.
In this approach, data subject identifiers are removed by the providers while applying two-level
encryption technique through the use of the PKI certificates and hashing methodology. Sensitive
information is then anonymized using open-source toolkits. At the last stage the data is encrypted
granularly by utilizing cloud provider’s public key.
Conclusion
This has been concluded that cloud computing has helped in providing simplified
services to the Charity. The use of cloud computing in organization has helped in maintaining
development of company in the market. The cloud services has been dealing with the storage of
the employee data over the internet. The HR management of the Charity has been implanting
SaaS cloud model in the Charity for using software and other computing resources in the
Charity. However, security issues in cloud computing have been discussed in report. The
existing security threats to the employee data has been discussed in the report. The new security
threats to the employee data have been explained in the report. The use of the risk severity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
CLOUD PRIVACY AND SECURITY
matrix have been done in security issues of the cloud computing. The privacy issues related to
the employee data have been discussed in the report. The severity matrix of the privacy in the
cloud computing has been analysed. The digital identity issues in the SaaS solution have been
analysed in the report. Proper solution to the digital threats in the SaaS solutions have been
provided in the report.
CLOUD PRIVACY AND SECURITY
matrix have been done in security issues of the cloud computing. The privacy issues related to
the employee data have been discussed in the report. The severity matrix of the privacy in the
cloud computing has been analysed. The digital identity issues in the SaaS solution have been
analysed in the report. Proper solution to the digital threats in the SaaS solutions have been
provided in the report.
20
CLOUD PRIVACY AND SECURITY
References
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Cimler, R., Matyska, J., Balík, L., Horalek, J., & Sobeslav, V. (2015). Security issues of
mobile application using cloud computing. In Afro-European Conference for Industrial
Advancement (pp. 347-357). Springer, Cham.
Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging
threats and current solutions. omputers & Electrical Engineering, 59, 126-140.
Coughlin, M., Keller, E., & Wustrow, E. (2017). Trusted Click: Overcoming Security issues
of NFV in the Cloud. In Proceedings of the ACM International Workshop on Security in
Software Defined Networks & Network Function Virtualization (pp. 31-36). ACM.
Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Why employees share information
security advice? Exploring the contributing factors and structural patterns of security
advice sharing in the workplace. Computers in Human Behavior, 67, 196-206.
Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., & Sridaran, R. (2017).
Cloud Security Issues and Challenges. In Big Data Analytics (pp. 499-514). Singapore:
Springer.
CLOUD PRIVACY AND SECURITY
References
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Cimler, R., Matyska, J., Balík, L., Horalek, J., & Sobeslav, V. (2015). Security issues of
mobile application using cloud computing. In Afro-European Conference for Industrial
Advancement (pp. 347-357). Springer, Cham.
Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging
threats and current solutions. omputers & Electrical Engineering, 59, 126-140.
Coughlin, M., Keller, E., & Wustrow, E. (2017). Trusted Click: Overcoming Security issues
of NFV in the Cloud. In Proceedings of the ACM International Workshop on Security in
Software Defined Networks & Network Function Virtualization (pp. 31-36). ACM.
Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Why employees share information
security advice? Exploring the contributing factors and structural patterns of security
advice sharing in the workplace. Computers in Human Behavior, 67, 196-206.
Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., & Sridaran, R. (2017).
Cloud Security Issues and Challenges. In Big Data Analytics (pp. 499-514). Singapore:
Springer.
21
CLOUD PRIVACY AND SECURITY
De Carvalho, C. A., de Castro Andrade, R. M., de Castro, M. F., Coutinho, E. F., &
Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud
computing. Computers & Electrical Engineering.
Demchenko, Y., Turkmen, F., Slawik, M., & de Laat, C. (2017). Defining Intercloud
Security Framework and Architecture Components for Multi-Cloud Data Intensive
Applications. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM
International Symposium (pp. 945-952). IEEE.
Duncan, B., Zhao, Y., & Whittington, M. (2017). Corporate Governance, Risk Appetite and
Cloud Security Risk: A Little Known Paradox. How Do We Square the Circle?. In Eighth
International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD
COMPUTING 2017). IARIA.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information Security,
13(2), 113-170.
Flint, D. (2017). Storms Ahead for Cloud Service Providers. Business Law Review, 38(3),
125-126.
Garg, A., & Babbar, H. (2017). Cloud Security: A Big Challenge, Issues and Solutions.
Imperial Journal of Interdisciplinary Research, 3(3).
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical
review. International Journal of Computer Network and Information Security, 6(3), 20.
CLOUD PRIVACY AND SECURITY
De Carvalho, C. A., de Castro Andrade, R. M., de Castro, M. F., Coutinho, E. F., &
Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud
computing. Computers & Electrical Engineering.
Demchenko, Y., Turkmen, F., Slawik, M., & de Laat, C. (2017). Defining Intercloud
Security Framework and Architecture Components for Multi-Cloud Data Intensive
Applications. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM
International Symposium (pp. 945-952). IEEE.
Duncan, B., Zhao, Y., & Whittington, M. (2017). Corporate Governance, Risk Appetite and
Cloud Security Risk: A Little Known Paradox. How Do We Square the Circle?. In Eighth
International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD
COMPUTING 2017). IARIA.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information Security,
13(2), 113-170.
Flint, D. (2017). Storms Ahead for Cloud Service Providers. Business Law Review, 38(3),
125-126.
Garg, A., & Babbar, H. (2017). Cloud Security: A Big Challenge, Issues and Solutions.
Imperial Journal of Interdisciplinary Research, 3(3).
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical
review. International Journal of Computer Network and Information Security, 6(3), 20.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22
CLOUD PRIVACY AND SECURITY
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Lie, D. (2015). The state of public
infrastructure-as-a-service cloud security. ACM Computing Surveys (CSUR), 47(4), 68.
Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K.
R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention
as a service. Journal of Network and Computer Applications, 74, 98-120.
Juels, A., Oprea, A., & Bowers, K. D. (2017). Security Issues for Cloud Computing [3]. 4(5).
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud. Security and
Compliance-A Semantic Approach in End to End Security. International Journal Of
Mechanical Engineering And Technology (Ijmet), 8(5).
Khan, M. A. (2016). A survey of security issues for cloud computing. Journal of Network
and Computer Applications, 71, 11-29.
Khan, N., & Al-Yasiri, A. (2016). Cloud security threats and techniques to strengthen cloud
computing adoption framework. International Journal of Information Technology and
Web Engineering (IJITWE), 11(3), 50-64.
Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic
algorithms. International Journal of Innovative Research in Computer and
Communication Engineering, 3(1), 148-155.
CLOUD PRIVACY AND SECURITY
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Lie, D. (2015). The state of public
infrastructure-as-a-service cloud security. ACM Computing Surveys (CSUR), 47(4), 68.
Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K.
R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention
as a service. Journal of Network and Computer Applications, 74, 98-120.
Juels, A., Oprea, A., & Bowers, K. D. (2017). Security Issues for Cloud Computing [3]. 4(5).
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud. Security and
Compliance-A Semantic Approach in End to End Security. International Journal Of
Mechanical Engineering And Technology (Ijmet), 8(5).
Khan, M. A. (2016). A survey of security issues for cloud computing. Journal of Network
and Computer Applications, 71, 11-29.
Khan, N., & Al-Yasiri, A. (2016). Cloud security threats and techniques to strengthen cloud
computing adoption framework. International Journal of Information Technology and
Web Engineering (IJITWE), 11(3), 50-64.
Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic
algorithms. International Journal of Innovative Research in Computer and
Communication Engineering, 3(1), 148-155.
23
CLOUD PRIVACY AND SECURITY
Koorevaar, T., Pourzandi, M., & Zhang, Y. (2016). U.S. Patent No. 9,304,801. Washington,
DC: U.S. Patent and Trademark Office.
Krasnyanskaya, T. M., & Tylets, V. G. (2015). Designing the cloud technologies of
psychological security of the person. Вопросы философии и психологии, (3), 192-199.
Krishna, B. H., Kiran, S., Murali, G., & Reddy, R. K. (2016). Security Issues In Service
Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions
and institutional evolution. Telecommunications Policy, 37(4), 372-386.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Luna, J., Taha, A., Trapero, R., & Suri, N. (2017). Quantitative reasoning about cloud
security using service level agreements. IEEE Transactions on Cloud Computing.
Maier, M., & Verikoukis, C. (2014, July). Inside smart FiWi-HetNets and the explosion of
mobile data traffic. In Transparent Optical Networks (ICTON), 2014 16th International
Conference on (pp. 1-4). IEEE.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. . (2017).
Individual differences and information security awareness. Computers in Human
Behavior, 69, 151-156.
Mishra, A. (2017). Cloud Computing Models: Background, Data security, & Security Issues.
Journal of Web Development and Web Designing, 2(1,2).
CLOUD PRIVACY AND SECURITY
Koorevaar, T., Pourzandi, M., & Zhang, Y. (2016). U.S. Patent No. 9,304,801. Washington,
DC: U.S. Patent and Trademark Office.
Krasnyanskaya, T. M., & Tylets, V. G. (2015). Designing the cloud technologies of
psychological security of the person. Вопросы философии и психологии, (3), 192-199.
Krishna, B. H., Kiran, S., Murali, G., & Reddy, R. K. (2016). Security Issues In Service
Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions
and institutional evolution. Telecommunications Policy, 37(4), 372-386.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Luna, J., Taha, A., Trapero, R., & Suri, N. (2017). Quantitative reasoning about cloud
security using service level agreements. IEEE Transactions on Cloud Computing.
Maier, M., & Verikoukis, C. (2014, July). Inside smart FiWi-HetNets and the explosion of
mobile data traffic. In Transparent Optical Networks (ICTON), 2014 16th International
Conference on (pp. 1-4). IEEE.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. . (2017).
Individual differences and information security awareness. Computers in Human
Behavior, 69, 151-156.
Mishra, A. (2017). Cloud Computing Models: Background, Data security, & Security Issues.
Journal of Web Development and Web Designing, 2(1,2).
24
CLOUD PRIVACY AND SECURITY
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Mohammad, A., Kak, S. M., & Alam, M. A. (2017). Cloud Computing: Issues and Security
Challenges. International Journal, 8(2).
Mumme, D. C., Wallace, B., & McGraw, R. (2017). Cloud Security via Virtualized Out-of-
Band Execution and Obfuscation. In Cloud Computing (CLOUD), 2017 IEEE 10th
International Conference, 286-293.
Rai, R., Sahoo, G., & Mehfuz, S. (2013). Securing software as a service model of cloud
computing: Issues and solutions. arXiv preprint arXiv:1309.2426.
Rajasekaran, S., Ni, Z., Shah, N., Chawla, H. S., Wood, T., & Berger, E. (2016). Scalable
Cloud Security via Asynchronous Virtual Machine Introspection. In HotCloud.
Rakovic, V., Denkovski, D., Atanasovski, V., & Gavrilovska, L. (2016, May). Radio
resource management based on radio environmental maps: Case of Smart-WiFi.
In Telecommunications (ICT), 2016 23rd International Conference on (pp. 1-5). IEEE.
Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A Comprehensive Survey on Security
in Cloud Computing. Procedia Computer Science, 465-472.
Ren , Q., & Gao, H. (2016). Research on Information Security in Cloud Computing
Environment. Electronics Science Technology and Application, 3(1), 42-45.
Rewadkar, D. N., & Ghatage , S. Y. (2014). Cloud storage system enabling secure privacy
preserving third party audit. In Control, Instrumentation, Communication and
CLOUD PRIVACY AND SECURITY
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Mohammad, A., Kak, S. M., & Alam, M. A. (2017). Cloud Computing: Issues and Security
Challenges. International Journal, 8(2).
Mumme, D. C., Wallace, B., & McGraw, R. (2017). Cloud Security via Virtualized Out-of-
Band Execution and Obfuscation. In Cloud Computing (CLOUD), 2017 IEEE 10th
International Conference, 286-293.
Rai, R., Sahoo, G., & Mehfuz, S. (2013). Securing software as a service model of cloud
computing: Issues and solutions. arXiv preprint arXiv:1309.2426.
Rajasekaran, S., Ni, Z., Shah, N., Chawla, H. S., Wood, T., & Berger, E. (2016). Scalable
Cloud Security via Asynchronous Virtual Machine Introspection. In HotCloud.
Rakovic, V., Denkovski, D., Atanasovski, V., & Gavrilovska, L. (2016, May). Radio
resource management based on radio environmental maps: Case of Smart-WiFi.
In Telecommunications (ICT), 2016 23rd International Conference on (pp. 1-5). IEEE.
Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A Comprehensive Survey on Security
in Cloud Computing. Procedia Computer Science, 465-472.
Ren , Q., & Gao, H. (2016). Research on Information Security in Cloud Computing
Environment. Electronics Science Technology and Application, 3(1), 42-45.
Rewadkar, D. N., & Ghatage , S. Y. (2014). Cloud storage system enabling secure privacy
preserving third party audit. In Control, Instrumentation, Communication and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
25
CLOUD PRIVACY AND SECURITY
Computational Technologies (ICCICCT), 2014 International Conference (pp. 695-699).
IEEE.
Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.
Yigitcanlar, T., Edvardsson, I. R., Johannesson, H., Kamruzzaman, M., Ioppolo, G., &
Pancholi, S. (2017). Knowledge-based development dynamics in less favoured regions:
insights from Australian and Icelandic university towns. European Planning
Studies, 25(12), 2272-2292.
Young, R., & Grant, J. (2015). Is strategy implemented by projects? Disturbing evidence in
the State of NSW. International Journal of Project Management, 33(1), 15-28.
Zibouh, O., Dalli, A., & Drissi, H. (2016). Cloud computing security through parallelizing
fully homomorphic encryption applied to multi-cloud approach. Journal of Theoretical
and Applied Information Technology, 87(2), 300.
CLOUD PRIVACY AND SECURITY
Computational Technologies (ICCICCT), 2014 International Conference (pp. 695-699).
IEEE.
Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.
Yigitcanlar, T., Edvardsson, I. R., Johannesson, H., Kamruzzaman, M., Ioppolo, G., &
Pancholi, S. (2017). Knowledge-based development dynamics in less favoured regions:
insights from Australian and Icelandic university towns. European Planning
Studies, 25(12), 2272-2292.
Young, R., & Grant, J. (2015). Is strategy implemented by projects? Disturbing evidence in
the State of NSW. International Journal of Project Management, 33(1), 15-28.
Zibouh, O., Dalli, A., & Drissi, H. (2016). Cloud computing security through parallelizing
fully homomorphic encryption applied to multi-cloud approach. Journal of Theoretical
and Applied Information Technology, 87(2), 300.
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.