Community based charity locates and provides training services, support services, mental health services and accommodation to the people suffering from various disadvantages. The community has decided to join a community cloud provided by a public cloud vendor for providing a number of applications to their support staffs as well as administrative users. The data contained in the applications are time sensitive and confidential. The community can also be used for storing the data possessed by charity. A database working on the SaaS model of cloud computing can be used to hold the data. The charity has selected me as their Principal consultant. I am supposed to prepare this report, which would propose the security and privacy policies for the usage of the charity. This report would also contain the risks that charity might face while planning moves in the field of HR.
Cloud computing is of great use to various organizations. The charity has decided to implement SaaS to their operations. SaaS, also known as Software as services allows users to use various applications by accessing internet. These applications are supposed to be cloud-based. SaaS is used on the policy of Pay-as-you-go (Rittinghouse & Ransome, 2016). In this policy, the users only pay for service they use, neither less nor more. Organization rents the service from a local service provider and users utilize them by connecting it by accessing internet. One of the most important advantages provided by SaaS is that it allows the employees of an organization to mobilize their work. They can connect with these applications from any device that has the ability to access internet. Along with providing advantages, SaaS also provide some risks to the organizations. These threats are mentioned below the discussion part of the report.
Risks on employee data in HR database: HR is one of the heads of an organization who has a huge amount of data saved in database. The data is regarding, employees, how employees work, various departments in the organization, number of people needed to be recruited, the recruitment process and many more (Botta, De Donato & Persico, 2016). This data is of much importance to the HR as well as organization. The data in HR database of great importance and should be secured from cyber criminals who might steal the data and use it for bad purposes. Every organization invests a huge lump sum of money to secure the data from criminals but they find some or the other to hack accounts and steal the desired data (Botta, De Donato & Persico, 2016). Securing data in HR database is no easy task. It results in various threats to the organization. These threats are mentioned below.
Risks to employee data on migration to SaaS application: nowadays data security is the main concern of the companies. Most of the organizations move their applications into SaaS and some are still in the run to integrate it to their business (Rao & Selvamani, 2015). Every SaaS provide offers various set of capabilities to secure data. The capabilities are useful to the organization depending on its requirements. The organizations can customize the platform by adding the desired requirement. Integration of business with SaaS provides various advantages to the organization, along with that it also provide some threats to the employee data. The major disadvantage of SaaS is that it connects all the systems together. As a result, if some issue occurs in one part of the system, the whole system breaks down along with the systems connected to it. The charity might lose data while it migrates its system to SaaS. This would not allow the organizations to transfer the sensitive data (Zhang, Chen & Wong, 2017). Most of the service providers assure that the data of the organization would not be lost, but in case it is lost for any reason, they would not be held responsible for it. A proper research has to be carried out by the organization before integrating their systems with SaaS.
Consequences of the risks: data regarding employees might be lost for some reason. This creates a problem for the organization as well as its operation. The consequences of the lost data on organizations are as follows.
Threats on data in HR database: HR database contains huge number of information, which is useful for organization as well as employees. Various risks can be occurred to the employee data present in the HR database. These threats are as follows:
Risks to employee data after migrating to SaaS: migrating the system to SaaS would be very helpful for the charity. Most of the organization has integrated their business with SaaS. SaaS service providers assure that the data would be safe. There are means by which employee data might get lost or stolen. The risks to employee data after migrating to SaaS are in huge number. They are mentioned below
Consequences of the risks: the risks occurred to the employee data would have various consequences on the employees and the organization. These consequences are as follows
Digital identity is very useful for various organizations. It helps in securing the personal data of a user. It helps the user create a fake identity with the help of that identity the user would be able to use various applications without any fear of personal data getting lost (Chang, Benantar & Chang, 2014). The department of organization that deals with financial transactions carried out by users and the company itself attracts the hackers. The actual threat in using digital identity is that it might be hacked similar to the real identity. Identity theft is the major threat imposed by digital identity. Hackers might use a digital identity in order to mislead the digital identity of the user. Phishing is a very common threat among organizations. In this kind of threat, a particular website is attacked and users using that website are invited to log in to the website using their digital identities (Li, Li & Chen, 2015). Data theft is a dangerous threat faced by people using digital identity.
The migration to SaaS can be done without the identified threats by following various steps. These steps are as follows
Some issues of ethics, jurisdiction or data sensitivity should be followed by the charity. They are as follows
Conclusion
From this report, it can be concluded that if the charity integrates cloud computing into its business it would be beneficial for the charity but it would also impose serious threats to the company. Some disadvantages are data theft, security issues, hijacking of employee data, no control over the data and many more. These threats can be prevented by following various steps such as two-step verification process, considering some ethical issues and many more.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2015). A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing, 3(2), 233-244.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, D. Y., Benantar, M., Chang, J. Y. C., & Venkataramappa, V. (2014). U.S. Patent No. 8,769,622. Washington, DC: U.S. Patent and Trademark Office.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Services Computing, 9(1), 138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1-12.
Manuel, P. (2015). A trust model of cloud computing based on Quality of Service. Annals of Operations Research, 233(1), 281-292.
Novotny, H. M., DePaul, K. E., Sankalia, A., Nta, P., & Larsen, R. (2015). U.S. Patent No. 9,137,304. Washington, DC: U.S. Patent and Trademark Office.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12-22.
Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364-368.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Samanthula, B. K., Elmehdwi, Y., Howser, G., & Madria, S. (2015). A secure data sharing and query processing framework via federation of cloud computing. Information Systems, 48, 196-212.
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2017). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, (1), 1-1.
Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., & Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Computing Surveys (CSUR), 47(4), 65.
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42-61.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download