Cloud Computing: Security & Privacy

Verified

Added on  2020/03/16

|23
|6055
|34
AI Summary
This assignment delves into the multifaceted security challenges inherent in cloud computing. It examines various threats such as data breaches, unauthorized access, and vulnerabilities in cloud infrastructure. The importance of robust security measures, encryption techniques, access control policies, and privacy-preserving practices is emphasized. Moreover, the ethical implications of big data analytics and user privacy in cloud environments are discussed.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT RISK MANAGEMENT
IT Risk Management
Name of the Student
Name of the University
Author’s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
IT RISK MANAGEMENT
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................4
Migration of Database to Cloud..................................................................................................4
Financial Service Sectors.............................................................................................................5
Security Posture...........................................................................................................................6
Probable Security Risks and Threats...........................................................................................9
Conclusion.....................................................................................................................................14
References......................................................................................................................................17
Document Page
2
IT RISK MANAGEMENT
Executive Summary
The main aim of this report is to understand the case study of Aztek. Aztek is an organization
that does its task in the AFSS or Australian Financial Services Sector. The superior executives in
both the business divisions and technology within the organization have gathered a particular
collection of various projects or specifically have taken various decisions from the relevant
strategists, who would be extremely helpful for the company and funding can be easily done for
the deployment. These strategies or the decisions normally involve various projects like the
allowing of the employees for bringing their own typical devices. These particular devices
usually include the tablets, their laptops and the mobile phones in their particular workplace and
all the devices to be used as the main or the major devices for the completion of their tasks in the
work and attaining the goals and objectives of the organization. The second decision that the
company has taken is for the migration of databases, data sources or the applications to a specific
cloud hosting solution externally. The third decision that is undertaken by them is the
outsourcing of the main functions of information technology. These functions usually include the
management of desktop, the development of applications or the network to a particular third
party. The last project is the up gradation, update or introduction of the major technologies like
the platforms and applications of the mobile and the migration of the networking technology,
which is improved. The typical example is the IPv6 or Internet Protocol Version 6. Moreover, a
corporate wide email archive is to be created for the purpose and benefits of compliances, up
gradation and updating the operating systems of desktop and several applications. The objective
of this typical report is to recognize the relevant risks that can occur in the company when the
applications and databases are migrated to an external cloud service. Moreover, the following
Document Page
3
IT RISK MANAGEMENT
report also focuses on the measures that can be taken to reduce the security threats,
vulnerabilities and risks involved in information system of Aztek.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
IT RISK MANAGEMENT
Introduction
Cloud computing is the process or technique, which acts as the tool or technique for
transferring any type of confidential data or information or any type of services that are related to
computing. These various services of computing are of several types (Dinh et al., 2013). The
services include analytics, storage, servers, networking or even software. Several other services
are also present in cloud computing. The companies or organizations, which help in providing
the above mentioned services within the cloud, are called the cloud providers or the providers of
the cloud. These particular companies or organizations get money after providing the services of
cloud computing (Chaisiri, Lee & Niyato, 2012). This is most used technology in today’s world.
It is the best technology for transferring any data with security. The major advantage or benefit
of cloud computing is that it does not incur much cost and is affordable by all organizations. This
particular advantage makes cloud computing much popular and acceptable by almost all
organizations and companies. The second advantage of cloud computing is that it provides
security to the data that is to be transferred. Intrusion is prevented by the utilization of cloud
computing (Garg, Versteeg & Buyya, 2013). Aztek is an organization, which does its operation
in the Australian Financial Services Sector. The senior executives in both the technology and
business divisions within the company have collected a collection of several projects or rather
have taken certain decisions from the respective strategists that would be helpful for the
organization and could be easily funded for the deployment. The decisions or the strategies
include several projects such as the enabling the employees for bringing their own devices (Lee
& Zomaya, 2012). These devices include the laptops, their tablets and their mobile phones in
their respective workplace and the devices to be utilized as the major or the main devices in
completing their tasks in the work and achieving the organizational goals and objectives. The
Document Page
5
IT RISK MANAGEMENT
second decision undertaken by the company is to migrate their all of the applications, databases
or data sources to a cloud hosting solution externally. The third decision is to outsource the
major functionalities of information technology (Almorsy, Grundy & Müller, 2016). These
functionalities include the development of applications, management of desktop or the network
to a specific third party. The final project is to upgrade, update or introduce the main
technologies like the applications and platforms of mobile and to migrate to the networking
technology that is improved. The example is Internet Protocol Version 6. Moreover, a corporate
wide email archive is to be created for the purpose and benefits of compliances, up gradation and
updating the operating systems of desktop and several applications (Gampala, Inuganti &
Muppidi, 2012). These projects will help Aztek to achieve its organizational goals and
organizations.
The following report covers the project of migration of database to the cloud for Aztek.
They have decided to migrate their database to the cloud (Gupta, Seetharaman & Raj, 2013).
There are various cloud infrastructures and platforms present in the market and Aztek have
decided to select one of them. However, there are always some of the major risks and threats in
the cloud and cloud infrastructure (Lee & Zomaya, 2012). The report covers the effective
decision making for the migration of data. Moreover, security postures, the probable risks,
vulnerabilities and threats are also mentioned here. The data security is also given in the report.
Discussion
Migration of Database to Cloud
Migration of data to the cloud would be one of the best decisions for Aztek. Database
migration helps to reduce the overall risk or threat for risks related to data like the loss of data
Document Page
6
IT RISK MANAGEMENT
(Hamlen et al., 2012). The best type of cloud infrastructure is the Microsoft Azure and the
Amazon Web Services or AWS. Aztek should migrate their database in these two cloud
infrastructures. The main advantages of migration of database in cloud are as follows:
i) Scalability: The data migration makes the database and data scalable enough to be
accessed by all (Gupta, Seetharaman & Raj, 2013).
ii) Flexibility: The data migration makes the database and data flexible.
iii) Cost Effective: Data migration is not at all costly and can be easily afforded by all
organization, irrespective of its size (Beloglazov, Abawajy & Buyya, 2012).
iv) High Security: The next advantage of migration of data and database is that it
provides extreme security to the database.
Microsoft Azure and Amazon Web Services or AWS are the best cloud infrastructures
for any organization. The best benefit that Aztek would get after this migration is that all the data
is not needed to be migrated (Almorsy, Grundy & Müller, 2016). Shifting only the database will
be helpful. Every single data and information is not needed to be shifted.
Financial Service Sectors
Aztek is an organization, which does its operation in the Australian Financial Services
Sector. The management of the stakeholder is the most important component in any organization
(Behl & Behl, 2012). Stakeholders of an organization are those people who help in the entire
process of an organization. There is always an interface between the stakeholders of an
organization and technologists of an organization. The financial services sectors are the interface
or the common boundary between the stakeholders and technologists of the organization. The

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
IT RISK MANAGEMENT
stakeholders deal with all the finance related decisions in the organization and each and every
decision undertaken is clarified and checked by the stakeholders of the company. Whereas, the
technologists are responsible for the technical and the technological growth and downfall of an
organization (Almorsy, Grundy & Müller, 2016). The technologists deal with the technical and
the non technical benefits and disadvantages of the organization. They look into the matter so
that every thing is under control. These technical things involve the information system of the
organization. The information is the most important system for any organization and the
confidential data or information is stored and recorded in that particular system. The financial
service sector is the mixture of both technology and finance (Hashizume et al., 2013). It is an
information system that stores all the important data or information related to the finance
department or financial team of a particular organization. Often there exists clash between the
finance department and the technologists of an organization. Aztek should look in to the matter
so that there exists no loopholes in the financial service sectors of Aztek.
Security Posture
Security posture of any company organization is the complete security plan of that
organization. Security posture is the approach or the step, an organization takes for its
organizational security (Arora, Parashar & Transforming, 2013). This posture involves
everything, right from the planning till the implementation of the security plan. The security
posture contains each and every policy, that is the technical, non technical. Moreover, the
processes, the procedures and the security measures that can control and protect the database or
data from any type of security threats or risks (Hashem et al., 2015). These risks can be both
internal and external. All organizations or companies are always vulnerable to potential
Document Page
8
IT RISK MANAGEMENT
information technology security risks and breaches (Dinh et al., 2013). The major reasons for
worrying in any type of security breaches or security threats are as follows:
i) Hackers: They are the most dangerous and vulnerable persons who breach the entire
system of any organization (Hashizume et al., 2013). They get into the system of users and
further breach them so that the information is stolen or lost.
ii) Script Kiddies: They are the newest generations of hackers. They are not skilled
hackers but try to hack any system with the help of malicious scripts (Kliazovich, Bouvry &
Khan, 2012). Sometimes, even they turn out to be vulnerable and risky for the organization.
iii) Dishonest Employees: Employees are the ones, who have every knowledge of an
organization’s information system or database. It often happens that when an employee leaves an
organization or is driven out of an organization, has a grudge over the organization and tries to
breach the security system or help others in breaching the system (Lee & Zomaya, 2012). They
take out the company’s confidential data or information and breach them. Aztek should be
careful about their employees.
iv) Spammers: These hackers normally send vulnerable emails to the victims (Lin &
Chen, 2012). The moment the user opens the email, the spammer gets the complete access of the
information system or the computer of the user. These are extremely common in all
organizations.
There are few trends in the security posture of any organization. they are as follows:
Document Page
9
IT RISK MANAGEMENT
i) Cloud Adoption: Cloud computing plays a significant role in the security posture of an
organization (Khalil, Khreishah & Azeem, 2014). It is the safest and the best technology utilized
for transferring data or any services.
ii) Cloud Application Usage: The migration to the cloud architecture would be the best
for Aztek organization as it will help them in reducing the huge complexities of database
migration.
iii) Encryption: The most simple and efficient way of protecting data and database and
providing security is the encryption. The data is encoded or encrypted into a cipher text and the
intruder is unable to crack that data (Lin et al., 2013). Aztek should opt for encryption as it
would be the best measure for their security posture.
The mitigation plans for the current security posture of Aztek are as follows:
i) Anti virus: Installation of anti virus in the information system of any organization helps
to reduce or mitigate the security threats or risks (Vatsalan et al., 2017). Moreover, anti virus
prevents any type of intrusion in the cloud infrastructure of platform easily. Anti virus is not at
all costly and can be easily afforded by all organizations.
ii) Firewalls: This is the second security measure after anti virus. These are somehow
similar to anti virus and help to detect and prevent the security risks and threats. This is exactly
same as the walls (Kshetri, 2014). The walls protect any house or building from any type of
threat or risks. Similarly, firewalls secure and protect the computer architecture or information
system from any type of security threats or risks.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
IT RISK MANAGEMENT
iii) Security Policies: This is the third way of securing the data or information (Chen &
Zhang, 2014). The security policies or the standards secure the information system or cloud
platform and infrastructure to protect and secure the services.
iv) Proper Storage: For cloud computing, storage is the most important feature (Nafi et
al., 2013). If the storage of the cloud is not perfect, there is always a chance of losing the data
and the database.
v) Virtual Private Network: VPN or Virtual Private Network helps in providing a private
network in a public network (AlZain et al., 2012). This network is utilized in receiving or
sending information or data.
Probable Security Risks and Threats
Various security threats and risks are present in the information system or cloud
infrastructure and platform. The probable risks and threats are as follows:
i) Malicious Activities: These are the most dangerous activities for any security system.
a) Malicious Code or Software: This type of code or software is injected within a system
by a hacker to infect the system (Chen & Zhao, 2012). This code is malicious in nature and can
replicate itself in the system. It formats the entire system and the important data gets lost.
b) Denial of Service: This type of threat is done by denying the service of the system. The
owner of the system has no idea about this attack and when tries to access the system, the service
is denied (Liu, 2012). The hacker gets the complete access to the system.
c) Abuse of Information Leakage: This type of security threat leaks the information with
wrong intentions and the user suffers from trouble.
Document Page
11
IT RISK MANAGEMENT
d) Abuse of Authorization: The authorized users are stopped or abused in this particular
type of threat.
e) Receiving Unsolicited E-mails: This is another dangerous security threat where the
victim receives a fake email and the moment he opens the mail, his system is corrupted and the
confidential information is stolen (Iankoulova & Daneva, 2012).
f) Identity theft: The identity of the authorized user is theft in this particular security
threat and the hacker acts as the user.
g) Remote Activities: This is another dangerous attack where the execution of activities is
done remotely (Bonomi et al., 2012).
h) Unauthorized Installation of Software: Software installation plays a significant role in
any system (Gellman, 2012). When the user installs an authorized software, he himself invites
hackers in his system.
ii) Unintentional Damage or Loss of Information or IT Assets: This is the second
category of security threats in any organization (Behl & Behl, 2012). These threats mostly occur
unintentionally or by losing any information or important assets. This category can be further
classified into several threats. They are follows:
a) Destruction of records: This is the most dangerous threat under this category. Every
organization or agency stores its data in its information system (Hashem et al., 2015). When
these records are destructed by any means either by system formatting or by unintentional cause
of an employee., it leads to major problem.
Document Page
12
IT RISK MANAGEMENT
b) Loss of data in the clouds: Any sort of loss of data in the clouds either intentionally or
by unintentionally is another important security threat (Lu et al., 2014). This loss of data can lead
the organization to serious problems.
c) Loss of device or storage: Devices and storage are the assets for any organization
(Herbst, Kounev & Reussner, 2013). When these devices and storages are lost, it causes major
issues in the organization.
d) Leakage of data: The leakage of data in various applications is another serious security
threat for any organization (Thuraisingham, 2015). The confidential data should be safe and
secured within the organization.
iii) Eavesdropping or Interception or Hijacking: This is the third category of security
threats. These are always caused intentionally (Hashem et al., 2015). The category has several
security threats in it. They are as follows:
a) Eavesdropping: The hacker is able to read every data or information of the victim
(Chen, Mao & Liu, 2014). The user does not have any idea about this type of threat. Once the
data is modified, the user gets to know about it.
b) Interception of messages: The information or messages are intercepted or hijacked
through this security breach.
c) Network Traffic Manipulation: This is another serious issue for any information
system (Gonzalez et al., 2012). The hacker manipulates the network traffic and the victim does
not get the chance to access the network.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
IT RISK MANAGEMENT
d) Man in the middle: The hacker sits in between the network and the user and thus
intercepts the network (Gonzalez et al., 2012). Often, he changes the entire data and the user gets
the changed information.
iv) Legal: This particular category deals with all the legal issues and the threats under the
section of legal (Hashem et al., 2015). The security threats under legal section are as follows:
a) Violation of Laws: Any sort of violation in the laws or regulations is a serious security
breach.
b) Breach of Legislation: This is another major security threat (Hashem et al., 2015).. The
legislation is breached in this threat.
c) Failure to meet contractual requirements: Any sort of failure to reach the requirements
of a contract is another security threat and can lead to prison.
d) Judiciary decisions or court orders: All court orders should be followed and violation
of such decisions or orders is a serious security threat.
v) Organizational: This is the fifth and the last security threat applicable to big data asset
(Herbst, Kounev & Reussner, 2013). This only happens when there is a shortage of skills, which
means if an organization lacks skilled workers and employees, this type of problem can occur.
The above mentioned security risks or threats become dangerous for any organization. In
Aztek, the security risks can be reduced or mitigated by means of several and various measures
(Garrison, Kim & Wakefield, 2012). The risks or the threats can be mitigated by certain
measures. They are as follows:
Document Page
14
IT RISK MANAGEMENT
i) Anti virus: Installation of anti virus in the information system of any organization helps
to reduce or mitigate the security threats or risks (Hashem et al., 2015). Moreover, anti virus
prevents any type of intrusion in the cloud infrastructure of platform easily. Anti virus is not at
all costly and can be easily afforded by all organizations.
ii) Firewalls: This is the second security measure after anti virus. These are somehow
similar to anti virus and help to detect and prevent the security risks and threats. This is exactly
same as the walls (Dinh et al., 2013). The walls protect any house or building from any type of
threat or risks. Similarly, firewalls secure and protect the computer architecture or information
system from any type of security threats or risks. These security policies often help big
organizations like Aztek in reducing the risks or threats in the information system of that
organization.
iii) Security Policies: This is the third way of securing the data or information (Gonzalez
et al., 2012). The security policies or the standards secure the information system or cloud
platform and infrastructure to protect and secure the services. These security policies often help
big organizations like Aztek in reducing the risks or threats in the information system of that
organization.
iv) Proper Storage: For cloud computing, storage is the most important feature. If the
storage of the cloud is not perfect, there is always a chance of losing the data and the database.
v) Virtual Private Network: VPN or Virtual Private Network helps in providing a private
network in a public network (Gampala, Inuganti & Muppidi, 2012). This network is utilized in
receiving or sending information or data.
Document Page
15
IT RISK MANAGEMENT
vi) Encryption: The most simple and efficient way of protecting data and database and
providing security is the encryption (Garrison, Kim & Wakefield, 2012). The data is encoded or
encrypted into a cipher text and the intruder is unable to crack that data.
vii) Control of Software: The installation of any software plays the most important role
in any information system (Dinh et al., 2013). This is to be installed in such a way that the
software can be controlled or managed easily.
viii) Maintenance: This is again another important feature for securing any database or
information system (Gampala, Inuganti & Muppidi, 2012). If the system is not maintained
periodically, there is a high chance that the system may corrupt and crash and the data would get
lost.
The above mentioned recommendations for mitigating the information technology risks,
threats and vulnerabilities would be extremely helpful for Aztek.
Conclusion
Therefore, from the above report, it can be concluded that cloud computing is the best
tool for the transfer of any service and data. It is the procedure or the technique that acts as the
technique or tool for the transfer of any type of important and confidential information, data or
any kind of services, which are related to cloud computing. The cloud computing services
normally include the storage, analytics, networking, servers or even any software. Various other
services are also present in the cloud computing. The various organizations or companies that
help for providing the above-mentioned services within a specific cloud are called the cloud
providers. These particular companies or organizations get cash when they have provided the
typical services of cloud computing. This is the most utilized technology in modern world. It is

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
IT RISK MANAGEMENT
the best technology for the transfer of any type of data with utmost security. The main benefit or
advantage of cloud computing is that it does not require much money and can be afforded by all
the organizations. This particular benefit makes cloud computing much acceptable and popular
by almost all the companies and organizations. The second benefit of cloud computing is that it
security is provided to the information, which is to be transferred. Cloud computing helps to
prevent intrusion. Aztek is a specific organization that does its function in the Australian
Financial Services Sector or AFSS. The higher authorities in both the divisions of business and
the technology within the company have accumulated a group of various projects or rather have
undertaken specific decisions from the strategists, which would be absolutely helpful for the
organization. These strategies or decisions involve various projects like the allowance of the
staffs for bringing the devices. These devices normally involve the tablets, the laptops and their
mobile phones in their particular workplace and also the devices are to be used as the main or the
major devices for the completion of their responsibilities in the work and attaining the goals and
objectives of the company. The second decision that the organization has taken is the migration
of their all of the databases, data sources and the applications to a typical cloud hosting solution
externally. The third decision is the outsourcing of the main functions of information technology.
These functions usually include the management of desktop, development of applications or the
network to a typical third party. The last project is the up gradation, update or the introduction of
the major technologies like the platforms and applications of mobile and the migration to the
networking technology, which is improved. The best example is Internet Protocol Version 6 or
IPv6. These projects will help Aztek to attain the goals and organizations of the organization.
The above report discusses about the entire procedure of the database migration to the cloud.
Several types of cloud platforms and infrastructures are present in the market. Aztek should opt
Document Page
17
IT RISK MANAGEMENT
for any one of the cloud platform or infrastructure. The security risks, threats and vulnerabilities
that are related to the information technology are also given in the above report with proper
details. The three types of cloud services are the Infrastructure as a Service or IaaS, Platform as a
Service or PaaS and Software as a Service or SaaS. The procedure of securing the data in the
cloud and information system is also given in the above report.
Document Page
18
IT RISK MANAGEMENT
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
AlZain, M. A., Pardede, E., Soh, B., & Thom, J. A. (2012, January). Cloud computing security:
from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International
Conference on (pp. 5490-5499). IEEE.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Behl, A., & Behl, K. (2012, October). An analysis of cloud computing security issues.
In Information and Communication Technologies (WICT), 2012 World Congress on (pp.
109-114). IEEE.
Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics
for efficient management of data centers for cloud computing. Future generation
computer systems, 28(5), 755-768.
Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its role in
the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Chaisiri, S., Lee, B. S., & Niyato, D. (2012). Optimization of resource provisioning cost in cloud
computing. IEEE Transactions on Services Computing, 5(2), 164-177.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
IT RISK MANAGEMENT
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and
technologies: A survey on Big Data. Information Sciences, 275, 314-347.
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Gampala, V., Inuganti, S., & Muppidi, S. (2012). Data security in cloud computing with elliptic
curve cryptography. International Journal of Soft Computing and Engineering
(IJSCE), 2(3), 138-141.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud
computing. Communications of the ACM, 55(9), 62-68.
Gellman, R. (2012, August). Privacy in the clouds: risks to privacy and confidentiality from
cloud computing. In Proceedings of the World privacy forum,.
Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., & Pourzandi,
M. (2012). A quantitative analysis of current security concerns and solutions for cloud
computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11.
Document Page
20
IT RISK MANAGEMENT
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by
small and medium businesses. International Journal of Information Management, 33(5),
861-874.
Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2012). Security issues for cloud
computing. Optimizing Information Security and Advancing Privacy Assurance: New
Technologies: New Technologies, 150.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1),
5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing: What
It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
Iankoulova, I., & Daneva, M. (2012, May). Cloud computing security requirements: A
systematic review. In Research Challenges in Information Science (RCIS), 2012 sixth
international conference on (pp. 1-7). IEEE.
Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: a
survey. Computers, 3(1), 1-35.
Document Page
21
IT RISK MANAGEMENT
Kliazovich, D., Bouvry, P., & Khan, S. U. (2012). GreenCloud: a packet-level simulator of
energy-aware cloud computing data centers. The Journal of Supercomputing, 62(3),
1263-1283.
Kshetri, N. (2014). Big data׳ s impact on privacy, security and consumer
welfare. Telecommunications Policy, 38(11), 1134-1145.
Lee, Y. C., & Zomaya, A. Y. (2012). Energy efficient utilization of resources in cloud computing
systems. The Journal of Supercomputing, 60(2), 268-280.
Lin, A., & Chen, N. C. (2012). Cloud computing as an innovation: Percepetion, attitude, and
adoption. International Journal of Information Management, 32(6), 533-540.
Lin, C., Su, W. B., Meng, K., Liu, Q., & Liu, W. D. (2013). Cloud computing security:
architecture, mechanism and modeling. Chinese Journal of Computers, 36(9), 1765-1784.
Liu, W. (2012, April). Research on cloud computing security problem and strategy. In Consumer
Electronics, Communications and Networks (CECNet), 2012 2nd International
Conference on (pp. 1216-1219). IEEE.
Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving
computing in big data era. IEEE Network, 28(4), 46-50.
Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2013). A newer user authentication,
file encryption and distributed server based cloud computing security architecture. arXiv
preprint arXiv:1303.0598.
Thuraisingham, B. (2015, March). Big data security and privacy. In Proceedings of the 5th ACM
Conference on Data and Application Security and Privacy (pp. 279-280). ACM.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
IT RISK MANAGEMENT
Vatsalan, D., Sehili, Z., Christen, P., & Rahm, E. (2017). Privacy-Preserving Record Linkage for
Big Data: Current Approaches and Research Challenges. In Handbook of Big Data
Technologies (pp. 851-895). Springer International Publishing.
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]