Evaluating Security and Privacy Challenges in Cloud Computing
VerifiedAdded on 2020/04/07
|9
|2067
|44
AI Summary
Cloud computing has become a pivotal technology for both small and large organizations aiming to enhance their business operations. However, this shift brings significant security and privacy challenges that need addressing. This paper examines these challenges, particularly the risks involved in processing and storing sensitive data within cloud environments. The potential for compromised confidentiality due to unauthorized access is highlighted, with emphasis on how social media integration can exacerbate privacy concerns. Various strategies for mitigating these risks are discussed, including encryption techniques and robust authentication and authorization policies. By understanding these security dynamics, organizations can better manage their cloud resources, ensuring data protection and maintaining compliance with legal standards.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Information Security
2017
2017
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Security and privacy issues in cloud computing
Contents
Introduction:..........................................................................................................................................2
Research questions:...............................................................................................................................2
Discussion:............................................................................................................................................2
Privacy and Security concerns:..............................................................................................................3
Mitigation action plan............................................................................................................................5
Application of the cloud computing technologies:................................................................................6
Vague Areas:.........................................................................................................................................6
Challenges and problem area.................................................................................................................6
Recommendations:................................................................................................................................6
Conclusion:............................................................................................................................................7
References:............................................................................................................................................7
1
Contents
Introduction:..........................................................................................................................................2
Research questions:...............................................................................................................................2
Discussion:............................................................................................................................................2
Privacy and Security concerns:..............................................................................................................3
Mitigation action plan............................................................................................................................5
Application of the cloud computing technologies:................................................................................6
Vague Areas:.........................................................................................................................................6
Challenges and problem area.................................................................................................................6
Recommendations:................................................................................................................................6
Conclusion:............................................................................................................................................7
References:............................................................................................................................................7
1

Security and privacy issues in cloud computing
Introduction:
The digital innovation in the information technology is equipped with security risks and
challenges. The data services associated with the business operation can be efficiently
performed with the use of cloud computing environment. The cloud computing paradigm is
adopted by every small and large organization for enhancing their business operations. The
capabilities of the existing system can be completely changed with the implementation of
cloud computing platform. The cloud computing platforms are of three types which are
classified as platform as a service, software as a service, and an infrastructure as a service.
The cloud computing is an effective technique for managing resources among the
participating units to resolve the issues of conflicts. This new technology is equipped with
some security challenges which should be taken under consideration to resolve the security
challenges which results in the effective working of the enterprise. The computer programs,
data, and information can be outsourced with the use of this newer technology (Rosado,
2013). The complexity of the business operations can be resolved with the implementation of
cloud platform for easy availability of resources on demand. The adaptable programs of the
cloud computing helps the user to customise with the data and information of their own
choice (Liu, 2009).
Research questions:
What are the security concerns in cloud computing technology?
What are the privacy concerns in cloud computing technology?
What is the risks mitigation plans associated with the cloud computing technology?
Discussion:
The discussion forum is on the topic named as security and privacy issues in cloud
computing. In this paper, we are going to highlights the security and privacy issues which are
incorporated with the implementation of cloud computing technology. The privacy of the
data is the crucial concern for the enterprise. The privacy legislation laws should be followed
for storing the confidential information of the user on the cloud. The data leakages take place
during the sending and retrieving data on request of the user. The confidentiality of the
information can be lost during data transfer. It is recommended that the legislation policies
2
Introduction:
The digital innovation in the information technology is equipped with security risks and
challenges. The data services associated with the business operation can be efficiently
performed with the use of cloud computing environment. The cloud computing paradigm is
adopted by every small and large organization for enhancing their business operations. The
capabilities of the existing system can be completely changed with the implementation of
cloud computing platform. The cloud computing platforms are of three types which are
classified as platform as a service, software as a service, and an infrastructure as a service.
The cloud computing is an effective technique for managing resources among the
participating units to resolve the issues of conflicts. This new technology is equipped with
some security challenges which should be taken under consideration to resolve the security
challenges which results in the effective working of the enterprise. The computer programs,
data, and information can be outsourced with the use of this newer technology (Rosado,
2013). The complexity of the business operations can be resolved with the implementation of
cloud platform for easy availability of resources on demand. The adaptable programs of the
cloud computing helps the user to customise with the data and information of their own
choice (Liu, 2009).
Research questions:
What are the security concerns in cloud computing technology?
What are the privacy concerns in cloud computing technology?
What is the risks mitigation plans associated with the cloud computing technology?
Discussion:
The discussion forum is on the topic named as security and privacy issues in cloud
computing. In this paper, we are going to highlights the security and privacy issues which are
incorporated with the implementation of cloud computing technology. The privacy of the
data is the crucial concern for the enterprise. The privacy legislation laws should be followed
for storing the confidential information of the user on the cloud. The data leakages take place
during the sending and retrieving data on request of the user. The confidentiality of the
information can be lost during data transfer. It is recommended that the legislation policies
2

Security and privacy issues in cloud computing
should be used for uploading the information of the user of the cloud computing platform.
The security procedures should be used for securing the personal and confidential
information of the user. The authentication and authorization procedures should be used for
storing the data on the cloud platform for reducing the risks associated with the transaction
related with the fetching of the information.
Privacy and Security concerns:
From the analysis and research paradigm, it has been identified that the cloud computing
technology is equipped with two concern areas which are classified as control over data
transfer and dependency on the providers of cloud computing (Mathew, 2015).
The following table shows the list of issues occurs due to the data loss in cloud computing
technology:
Issues Description
Loss of data control It is the most ridiculous problem of cloud
computing technology. The data is get out of
control from the hands of the user. It is not
the secure method to store data on the system
of the cloud computing service providers
(Hamlen, 2010). The transparency between
users and the processed data is not accurate.
The processing of the data cannot be
controlled by the users.
Operations of data mining The techniques of data mining can be
efficiently performed by the cloud computing
service providers. The confidentiality of the
data can be damaged due to the processing
and storage of sensitive data. The inclusion
of social media platform can affect the
privacy of the data(Sun, 2014 ).
Use of mobile devices The data available on the cloud can be
fetched with the help of mobile devices
which can harm the sensitivity of the
3
should be used for uploading the information of the user of the cloud computing platform.
The security procedures should be used for securing the personal and confidential
information of the user. The authentication and authorization procedures should be used for
storing the data on the cloud platform for reducing the risks associated with the transaction
related with the fetching of the information.
Privacy and Security concerns:
From the analysis and research paradigm, it has been identified that the cloud computing
technology is equipped with two concern areas which are classified as control over data
transfer and dependency on the providers of cloud computing (Mathew, 2015).
The following table shows the list of issues occurs due to the data loss in cloud computing
technology:
Issues Description
Loss of data control It is the most ridiculous problem of cloud
computing technology. The data is get out of
control from the hands of the user. It is not
the secure method to store data on the system
of the cloud computing service providers
(Hamlen, 2010). The transparency between
users and the processed data is not accurate.
The processing of the data cannot be
controlled by the users.
Operations of data mining The techniques of data mining can be
efficiently performed by the cloud computing
service providers. The confidentiality of the
data can be damaged due to the processing
and storage of sensitive data. The inclusion
of social media platform can affect the
privacy of the data(Sun, 2014 ).
Use of mobile devices The data available on the cloud can be
fetched with the help of mobile devices
which can harm the sensitivity of the
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Security and privacy issues in cloud computing
information (Monikandan, 2012). The data
can be easily transferred between the mobile
devices which can be the reason of hacking.
Remote access of cloud data The remote accessing of the data available on
the network can result into eavesdropping of
the data. The other issues which are associate
with the remote accessing of the data are
denial of service attack, DNS spoofing, and
others.
Paradigm shift The shifting of the cloud computing
paradigm result into traditional risks
associated with the data transfer. The data
can be divided into users, internet service
provider, and cloud service provider. The
legislative compliance of the data will create
the security concern for the availability of the
data. The dispersion of cloud data centre will
results into inadequacy in the data
management techniques
External auditing of the cloud service
providers
The technical control for data management
on the cloud service provider through the
inclusion external auditing will create a
problematic situation for cloud management
of data
Data deletion procedures It is difficult to delete all the copies of the
data available on the cloud computing
infrastructure. Data deletion is the mandatory
process in the cloud computing environment.
Legislation process used for data protection
and privacy
The global services provided for managing
the protection of data and privacy associated
with the legislation.
Reliability and security issues The telecommunication network on the cloud
computing environment raises the reliability
4
information (Monikandan, 2012). The data
can be easily transferred between the mobile
devices which can be the reason of hacking.
Remote access of cloud data The remote accessing of the data available on
the network can result into eavesdropping of
the data. The other issues which are associate
with the remote accessing of the data are
denial of service attack, DNS spoofing, and
others.
Paradigm shift The shifting of the cloud computing
paradigm result into traditional risks
associated with the data transfer. The data
can be divided into users, internet service
provider, and cloud service provider. The
legislative compliance of the data will create
the security concern for the availability of the
data. The dispersion of cloud data centre will
results into inadequacy in the data
management techniques
External auditing of the cloud service
providers
The technical control for data management
on the cloud service provider through the
inclusion external auditing will create a
problematic situation for cloud management
of data
Data deletion procedures It is difficult to delete all the copies of the
data available on the cloud computing
infrastructure. Data deletion is the mandatory
process in the cloud computing environment.
Legislation process used for data protection
and privacy
The global services provided for managing
the protection of data and privacy associated
with the legislation.
Reliability and security issues The telecommunication network on the cloud
computing environment raises the reliability
4

Security and privacy issues in cloud computing
and security issues associated with the data
The following table are the issues related with the cloud computing service providers:
The availability of the data on demand is the major issues with the cloud computing
service providers. The continuity of the business depends on the availability of the
data on time
No formal contract between cloud service providers and the associated customers
which raises the concern of hacking.
Traditional risks associated with the telecommunication services
Technical issues associated with the cloud computing service providers.
Mitigation action plan
The security risks associated with the cloud platform can be reduced by focusing on the
following areas:
Segregation of the data: The segregation issues exist in the sharing of the data. The
authentication and authorization policies should be used for preventing the leakages of data to
the third party. After the confirmation of the authorization, data should be provided to the
requesting parties.
Analysis of the data location: The legal issues can be associated with the data stored on
different locations. The server location should be checked for transferring of data because the
privacy laws should be followed if the data is getting transferred to the other countries. The
data should be prohibited from sending it to the different locations.
Procedures and security standards: The encryption and cryptography procedures should be
used for identifying the data and sending it securely over the network.
Access control policies: The access control policies should be used for accessing the required
information from the cloud. It helps in minimizing the risks associated with the un-
authenticated access of data
Auditing procedures: The contract should be signed for auditing the security procedures of
the enterprise. It helps in minimizing the risks associated with the un-ethical auditing of the
security procedures (Sen, 2015).
5
and security issues associated with the data
The following table are the issues related with the cloud computing service providers:
The availability of the data on demand is the major issues with the cloud computing
service providers. The continuity of the business depends on the availability of the
data on time
No formal contract between cloud service providers and the associated customers
which raises the concern of hacking.
Traditional risks associated with the telecommunication services
Technical issues associated with the cloud computing service providers.
Mitigation action plan
The security risks associated with the cloud platform can be reduced by focusing on the
following areas:
Segregation of the data: The segregation issues exist in the sharing of the data. The
authentication and authorization policies should be used for preventing the leakages of data to
the third party. After the confirmation of the authorization, data should be provided to the
requesting parties.
Analysis of the data location: The legal issues can be associated with the data stored on
different locations. The server location should be checked for transferring of data because the
privacy laws should be followed if the data is getting transferred to the other countries. The
data should be prohibited from sending it to the different locations.
Procedures and security standards: The encryption and cryptography procedures should be
used for identifying the data and sending it securely over the network.
Access control policies: The access control policies should be used for accessing the required
information from the cloud. It helps in minimizing the risks associated with the un-
authenticated access of data
Auditing procedures: The contract should be signed for auditing the security procedures of
the enterprise. It helps in minimizing the risks associated with the un-ethical auditing of the
security procedures (Sen, 2015).
5

Security and privacy issues in cloud computing
Notification sends to security vulnerabilities: The immediate notices should be sending to the
organization on the occurrence of vulnerabilities in the enterprise.
Application of the cloud computing technologies:
Devices used for cloud accessing
Management browser relationship with thin clients
Broadband accessing with the high speed data
Data storage on server platform
Virtualization
Management of application program interface
Vague Areas:
Application programming interface is used for managing cloud environment for increasing
the capabilities of the communication medium. The open communication infrastructure of the
cloud computing environment is equipped with risks and security concern. The development
of the new opportunities is comprised of many risks.
Challenges and problem area
The privacy concern has the negative and the positive impact on the working of the cloud
computing operations. The privacy obligations should be associated with the sending of the
private information of the user (Padhy, 2011). The information available on the cloud should
be implemented with the use of privacy compliance program. The security procedures should
be developed for insourcing and outsourcing of the data. The contract with the cloud service
providers should be reviewed and periodically updated. The public key infrastructure
mechanism should be used for securing the information on the cloud platform. The individual
consents should be used for retrieving the personal information (Hussain, 2015).
Recommendations:
The contract should be signed between the user and the cloud computing service providers
which provides transparency in managing risks and legal compliance issues with data
management schemes (Wayne, 2013). The complaints of the customers should be handled by
the cloud service providers at glance. The adequate facility of communication helps in
minimizing the risks associated with the data management schemes such as spoofing attack,
denial of service attack, and eavesdropping (Abbas, 2010). The obligations should be ensured
6
Notification sends to security vulnerabilities: The immediate notices should be sending to the
organization on the occurrence of vulnerabilities in the enterprise.
Application of the cloud computing technologies:
Devices used for cloud accessing
Management browser relationship with thin clients
Broadband accessing with the high speed data
Data storage on server platform
Virtualization
Management of application program interface
Vague Areas:
Application programming interface is used for managing cloud environment for increasing
the capabilities of the communication medium. The open communication infrastructure of the
cloud computing environment is equipped with risks and security concern. The development
of the new opportunities is comprised of many risks.
Challenges and problem area
The privacy concern has the negative and the positive impact on the working of the cloud
computing operations. The privacy obligations should be associated with the sending of the
private information of the user (Padhy, 2011). The information available on the cloud should
be implemented with the use of privacy compliance program. The security procedures should
be developed for insourcing and outsourcing of the data. The contract with the cloud service
providers should be reviewed and periodically updated. The public key infrastructure
mechanism should be used for securing the information on the cloud platform. The individual
consents should be used for retrieving the personal information (Hussain, 2015).
Recommendations:
The contract should be signed between the user and the cloud computing service providers
which provides transparency in managing risks and legal compliance issues with data
management schemes (Wayne, 2013). The complaints of the customers should be handled by
the cloud service providers at glance. The adequate facility of communication helps in
minimizing the risks associated with the data management schemes such as spoofing attack,
denial of service attack, and eavesdropping (Abbas, 2010). The obligations should be ensured
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Security and privacy issues in cloud computing
with the confidentiality and accuracy of data. The data should be deleted from the cloud
platform to minimize the risks of potential attacks. The backup data should be managed on
the customer end to overcome the problem of failure. The secured telecommunication
services should be used to overcome the problem of denial of service attacks. The proactive
action plan should be prepared by the professionals to overcome the problem of new risks.
The auditing procedures should be used for providing adequate and accurate information to
the users.
Conclusion:
The cloud computing paradigm is adopted by every small and large organization for
enhancing their business operations. The capabilities of the existing system can be
completely changed with the implementation of cloud computing platform. The
confidentiality of the data can be damaged due to the processing and storage of sensitive data.
The inclusion of social media platform can affect the privacy of the data. The encryption
technique and policies of authorisation and authentication should be used for securing the
privacy of the data available on the cloud.
References:
Abbas, H. (2010). Security and privacy issues in cloud computing. Retrieved from
https://link.springer.com/article/10.1007/s12243-017-0578-3
Hamlen, K. (2010). Security issues for cloud computing. Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.376.3145&rep=rep1&type=pdf
Hussain, I. (2015). Security issues in cloud computing-A review. Retrieved from
http://www.ijana.in/papers/V6I2-6.pdf
Liu, Y. (2009). A survey of security and privacy challenges in cloud computing. Retrieved
from http://jcse.kiise.org/files/V9N3-01.pdf
Mathew, A. (2015). Survey paper on security and privacy issues in cloud storage system.
Retrieved from
http://blogs.ubc.ca/computersecurity/files/2012/04/AMathew_EECE572B_Survey_23
062102.pdf
7
with the confidentiality and accuracy of data. The data should be deleted from the cloud
platform to minimize the risks of potential attacks. The backup data should be managed on
the customer end to overcome the problem of failure. The secured telecommunication
services should be used to overcome the problem of denial of service attacks. The proactive
action plan should be prepared by the professionals to overcome the problem of new risks.
The auditing procedures should be used for providing adequate and accurate information to
the users.
Conclusion:
The cloud computing paradigm is adopted by every small and large organization for
enhancing their business operations. The capabilities of the existing system can be
completely changed with the implementation of cloud computing platform. The
confidentiality of the data can be damaged due to the processing and storage of sensitive data.
The inclusion of social media platform can affect the privacy of the data. The encryption
technique and policies of authorisation and authentication should be used for securing the
privacy of the data available on the cloud.
References:
Abbas, H. (2010). Security and privacy issues in cloud computing. Retrieved from
https://link.springer.com/article/10.1007/s12243-017-0578-3
Hamlen, K. (2010). Security issues for cloud computing. Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.376.3145&rep=rep1&type=pdf
Hussain, I. (2015). Security issues in cloud computing-A review. Retrieved from
http://www.ijana.in/papers/V6I2-6.pdf
Liu, Y. (2009). A survey of security and privacy challenges in cloud computing. Retrieved
from http://jcse.kiise.org/files/V9N3-01.pdf
Mathew, A. (2015). Survey paper on security and privacy issues in cloud storage system.
Retrieved from
http://blogs.ubc.ca/computersecurity/files/2012/04/AMathew_EECE572B_Survey_23
062102.pdf
7

Security and privacy issues in cloud computing
Monikandan, S. (2012). Privacy in cloud computing. Retrieved from
http://airccj.org/CSCP/vol2/csit2331.pdf
Padhy, R. (2011). Cloud computing: Security issues and research challenges. Retrieved from
http://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf
Rosado, D. (2013). An analysis of security issues for cloud computing. Retrieved from
http://mdatechsys.com/project/Secure%20Computing/An%20analysis%20of
%20security%20issues%20for%20cloud%20computing.pdf
Sen, J. (2015). Security and privacy issues in cloud computing. Retrieved from
https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pd
f
Sun, Y. (2014). Data security and privacy in cloud computing. Retrieved from
https://www.researchgate.net/publication/274230804_Data_Security_and_Privacy_in
_Cloud_Computing
Wayne, A. (2013). Cloud hooks: Security and privacy issues in cloud computing. Retrieved
from http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=906716
8
Monikandan, S. (2012). Privacy in cloud computing. Retrieved from
http://airccj.org/CSCP/vol2/csit2331.pdf
Padhy, R. (2011). Cloud computing: Security issues and research challenges. Retrieved from
http://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf
Rosado, D. (2013). An analysis of security issues for cloud computing. Retrieved from
http://mdatechsys.com/project/Secure%20Computing/An%20analysis%20of
%20security%20issues%20for%20cloud%20computing.pdf
Sen, J. (2015). Security and privacy issues in cloud computing. Retrieved from
https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pd
f
Sun, Y. (2014). Data security and privacy in cloud computing. Retrieved from
https://www.researchgate.net/publication/274230804_Data_Security_and_Privacy_in
_Cloud_Computing
Wayne, A. (2013). Cloud hooks: Security and privacy issues in cloud computing. Retrieved
from http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=906716
8
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.