What Are The Security Concerns In Cloud Computing Technology?
What Are The Privacy Concerns In Cloud Computing Technology?
What Is The Risks Mitigation Plans Associated With The Cloud Computing Technology?
The digital innovation in the information technology is equipped with security risks and challenges. The data services associated with the business operation can be efficiently performed with the use of cloud computing environment. The cloud computing paradigm is adopted by every small and large organization for enhancing their business operations. The capabilities of the existing system can be completely changed with the implementation of cloud computing platform. The cloud computing platforms are of three types which are classified as platform as a service, software as a service, and an infrastructure as a service. The cloud computing is an effective technique for managing resources among the participating units to resolve the issues of conflicts. This new technology is equipped with some security challenges which should be taken under consideration to resolve the security challenges which results in the effective working of the enterprise. The computer programs, data, and information can be outsourced with the use of this newer technology (Rosado, 2013). The complexity of the business operations can be resolved with the implementation of cloud platform for easy availability of resources on demand. The adaptable programs of the cloud computing helps the user to customise with the data and information of their own choice (Liu, 2009).
The discussion forum is on the topic named as security and privacy issues in cloud computing. In this paper, we are going to highlights the security and privacy issues which are incorporated with the implementation of cloud computing technology. The privacy of the data is the crucial concern for the enterprise. The privacy legislation laws should be followed for storing the confidential information of the user on the cloud. The data leakages take place during the sending and retrieving data on request of the user. The confidentiality of the information can be lost during data transfer. It is recommended that the legislation policies should be used for uploading the information of the user of the cloud computing platform. The security procedures should be used for securing the personal and confidential information of the user. The authentication and authorization procedures should be used for storing the data on the cloud platform for reducing the risks associated with the transaction related with the fetching of the information.
From the analysis and research paradigm, it has been identified that the cloud computing technology is equipped with two concern areas which are classified as control over data transfer and dependency on the providers of cloud computing (Mathew, 2015).
Issues |
Description |
Loss of data control |
It is the most ridiculous problem of cloud computing technology. The data is get out of control from the hands of the user. It is not the secure method to store data on the system of the cloud computing service providers (Hamlen, 2010). The transparency between users and the processed data is not accurate. The processing of the data cannot be controlled by the users. |
Operations of data mining |
The techniques of data mining can be efficiently performed by the cloud computing service providers. The confidentiality of the data can be damaged due to the processing and storage of sensitive data. The inclusion of social media platform can affect the privacy of the data(Sun, 2014 ). |
Use of mobile devices |
The data available on the cloud can be fetched with the help of mobile devices which can harm the sensitivity of the information (Monikandan, 2012). The data can be easily transferred between the mobile devices which can be the reason of hacking. |
Remote access of cloud data |
The remote accessing of the data available on the network can result into eavesdropping of the data. The other issues which are associate with the remote accessing of the data are denial of service attack, DNS spoofing, and others. |
Paradigm shift |
The shifting of the cloud computing paradigm result into traditional risks associated with the data transfer. The data can be divided into users, internet service provider, and cloud service provider. The legislative compliance of the data will create the security concern for the availability of the data. The dispersion of cloud data centre will results into inadequacy in the data management techniques |
External auditing of the cloud service providers |
The technical control for data management on the cloud service provider through the inclusion external auditing will create a problematic situation for cloud management of data |
Data deletion procedures |
It is difficult to delete all the copies of the data available on the cloud computing infrastructure. Data deletion is the mandatory process in the cloud computing environment. |
Legislation process used for data protection and privacy |
The global services provided for managing the protection of data and privacy associated with the legislation. |
Reliability and security issues |
The telecommunication network on the cloud computing environment raises the reliability and security issues associated with the data |
The security risks associated with the cloud platform can be reduced by focusing on the following areas:
Segregation of the data: The segregation issues exist in the sharing of the data. The authentication and authorization policies should be used for preventing the leakages of data to the third party. After the confirmation of the authorization, data should be provided to the requesting parties.
Analysis of the data location: The legal issues can be associated with the data stored on different locations. The server location should be checked for transferring of data because the privacy laws should be followed if the data is getting transferred to the other countries. The data should be prohibited from sending it to the different locations.
Procedures and security standards: The encryption and cryptography procedures should be used for identifying the data and sending it securely over the network.
Access control policies: The access control policies should be used for accessing the required information from the cloud. It helps in minimizing the risks associated with the un-authenticated access of data
Auditing procedures: The contract should be signed for auditing the security procedures of the enterprise. It helps in minimizing the risks associated with the un-ethical auditing of the security procedures (Sen, 2015).
Notification sends to security vulnerabilities: The immediate notices should be sending to the organization on the occurrence of vulnerabilities in the enterprise.
Application programming interface is used for managing cloud environment for increasing the capabilities of the communication medium. The open communication infrastructure of the cloud computing environment is equipped with risks and security concern. The development of the new opportunities is comprised of many risks.
The privacy concern has the negative and the positive impact on the working of the cloud computing operations. The privacy obligations should be associated with the sending of the private information of the user (Padhy, 2011). The information available on the cloud should be implemented with the use of privacy compliance program. The security procedures should be developed for insourcing and outsourcing of the data. The contract with the cloud service providers should be reviewed and periodically updated. The public key infrastructure mechanism should be used for securing the information on the cloud platform. The individual consents should be used for retrieving the personal information (Hussain, 2015).
The contract should be signed between the user and the cloud computing service providers which provides transparency in managing risks and legal compliance issues with data management schemes (Wayne, 2013). The complaints of the customers should be handled by the cloud service providers at glance. The adequate facility of communication helps in minimizing the risks associated with the data management schemes such as spoofing attack, denial of service attack, and eavesdropping (Abbas, 2010). The obligations should be ensured with the confidentiality and accuracy of data. The data should be deleted from the cloud platform to minimize the risks of potential attacks. The backup data should be managed on the customer end to overcome the problem of failure. The secured telecommunication services should be used to overcome the problem of denial of service attacks. The proactive action plan should be prepared by the professionals to overcome the problem of new risks. The auditing procedures should be used for providing adequate and accurate information to the users.
Conclusion:
The cloud computing paradigm is adopted by every small and large organization for enhancing their business operations. The capabilities of the existing system can be completely changed with the implementation of cloud computing platform. The confidentiality of the data can be damaged due to the processing and storage of sensitive data. The inclusion of social media platform can affect the privacy of the data. The encryption technique and policies of authorisation and authentication should be used for securing the privacy of the data available on the cloud.
References:
Abbas, H. (2010). Security and privacy issues in cloud computing. Retrieved from https://link.springer.com/article/10.1007/s12243-017-0578-3
Hamlen, K. (2010). Security issues for cloud computing. Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.376.3145&rep=rep1&type=pdf
Hussain, I. (2015). Security issues in cloud computing-A review. Retrieved from https://www.ijana.in/papers/V6I2-6.pdf
Liu, Y. (2009). A survey of security and privacy challenges in cloud computing. Retrieved from https://jcse.kiise.org/files/V9N3-01.pdf
Mathew, A. (2015). Survey paper on security and privacy issues in cloud storage system. Retrieved from https://blogs.ubc.ca/computersecurity/files/2012/04/AMathew_EECE572B_Survey_23062102.pdf
Monikandan, S. (2012). Privacy in cloud computing. Retrieved from https://airccj.org/CSCP/vol2/csit2331.pdf
Padhy, R. (2011). Cloud computing: Security issues and research challenges. Retrieved from https://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf
Rosado, D. (2013). An analysis of security issues for cloud computing. Retrieved from https://mdatechsys.com/project/Secure%20Computing/An%20analysis%20of%20security%20issues%20for%20cloud%20computing.pdf
Sen, J. (2015). Security and privacy issues in cloud computing. Retrieved from https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pdf
Sun, Y. (2014). Data security and privacy in cloud computing. Retrieved from https://www.researchgate.net/publication/274230804_Data_Security_and_Privacy_in_Cloud_Computing
Wayne, A. (2013). Cloud hooks: Security and privacy issues in cloud computing. Retrieved from https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=906716
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download