Cloud Computing: Privacy and Security Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Cloud computing has been gaining popularity for the last few decades. In fact, small as well as large organizations have realized the potential of cloud in saving costs of procurement, installation and maintaining data storage systems.

Synchronized sectors, including banking, have realized such benefits in utilizing cloud computing. It is imperative for organizations to make rational decisions before transferring data and information to the cloud.

Despite the variety of advantages, the concept has presented to the end-users, there is also a range of risks associated with data and information security and privacy. However, limited research has been conducted, considering that the concept is relatively new.

This study explores the confidentiality, information integrity, data theft, information loss, data location, data deletion, malicious insiders and account hijacking as well as data segregation.

By utilizing this literature, the researcher aims to propose ways in which privacy and security of data can be guaranteed.

Cloud computing can be regarded as the transfer and storage of data in shared networks. Contemporarily, customers loose personal data and information to malicious individuals.

Thus, this study has been motivated by the increasing use of cloud services that expose data to potential mishandling and disclosure.

The research hence seeks to make appropriate mitigation recommendations against data security and privacy on clouds. In clarifying this study, the risks involved with clouding require further research.

That is, there is a variety of gaps in previous works, as they have not sufficiently addressed data security and privacy. In order to accomplish this, the research method utilized in this research require existing literature on cloud computing.

The researcher’s knowledge of cloud computing was also imperative. Limited knowledge by stakeholders necessitated the analysis of cloud computing unit.

According to literature review, the client organization risks the information and data being exposed by the host’s staff. Electronic Privacy Information Center (EPIC) has addressed such concerns. Cloud computing involves storing data and information on shared networks.

Hence, research questions included whether the concept has been previously threatened. The methodology utilized sought to consider whether existing literature has sufficient information on data security and privacy on clouds or not.

The research found three main cloud-computing platforms namely Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).

The information security concerns that organizations require to address before engaging a cloud-computing provider include confidentiality, information integrity, data theft, information loss, data location, data deletion, malicious insiders, account hijacking and data segregation.

This research argues that the priority of the customer in utilizing cloud service converts from that of installing and maintaining the equipment to service accessibility, the degree of performance of the cloud, data privacy, information security and data control to save costs.

In view of this, the research recommends that the first step towards ensuring confidentiality, security and privacy of data and information stored in cloud is to ensure that agreements of service include these provisions.

The agreements should also stipulate circumstances that may make the provider to disclose part or full information to third parties, including government authorities as information and data has been disclosed to unauthorized individuals in the past.

The study also argues that cloud hosts have mishandled client information in the past, including Facebook and Google. It then recommends auditing in closing the gaps.

The research is essential theoretically in the sense that it creates a platform for further research. Inherently, it makes practical contributions that should be considered to moderate against data or information privacy and security.

The research concludes that there is dire need for further research into privacy and security issues with regard to cloud computing.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, July 9). Cloud Computing: Privacy and Security. https://ivypanda.com/essays/cloud-computing-summary/

Work Cited

"Cloud Computing: Privacy and Security." IvyPanda, 9 July 2019, ivypanda.com/essays/cloud-computing-summary/.

References

IvyPanda. (2019) 'Cloud Computing: Privacy and Security'. 9 July.

References

IvyPanda. 2019. "Cloud Computing: Privacy and Security." July 9, 2019. https://ivypanda.com/essays/cloud-computing-summary/.

1. IvyPanda. "Cloud Computing: Privacy and Security." July 9, 2019. https://ivypanda.com/essays/cloud-computing-summary/.


Bibliography


IvyPanda. "Cloud Computing: Privacy and Security." July 9, 2019. https://ivypanda.com/essays/cloud-computing-summary/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1