Identifying Cloud Computing Risks

The previous chapter has provided a good review of cloud computing. There are some issues and risks mentioned, but this chapter will be more aware of the danger that is described in Cloud Computing’s previous research. Risk can be divided into two areas; risks of privacy in these areas and (data) are related to security risks. We will try to give examples of real life related risks to get clear effects about these risks. With the selection of papers we found a very risky paper. It also gives a good and popular paper very much, in this area also appears in comparison to other papers. Other papers also support the statements described in this big cloud-threatening paper. We can see this paper as a summary of the various issues related to the risks.

Privacy and privacy risk
A research by Netop and Gellman (2009) developed with the whole list of results in the cloud computing area for the world’s privacy forum. We will discuss more risks than this research. It is usually facing common threats that are cloud computing confidentiality and confidentiality.
Cloud computing depends on the users and customers providing their cloud when it is in accordance with their privacy or privacy. The provider of cloud computing services determines what policies are held. Imagine that these providers have the ability to change their policies too. This can completely change privacy for customers. (For instance, when data stored by cloud users is stored in the initial policy used). Changing policies that allow insights into this data for third parties depends on the importance of data being used (Gellman 2009). Another example is that cloud providers can extract information from different organizations in the cloud. You can see the information that appears in any way. It can also find information that is commercially valuable to them. What’s important is that most cloud users (clients) generally do not know the full policy and thus do not know very well that they come in front of their data after entering the cloud (Brodden 2008) .
It brings us to the next point where cloud users have problems sharing their information with the cloud provider. It is not a problem on ourselves, but in certain cases (and are) laws that tell us some information should not be with third parties (Gellman 2009). In this case the third party will provide the cloud. There are many examples to think about; Privacy rules contained in specific laws regarding client’s personal information, such as phone number and address (Pearson 2009). When an organization uses cloud computing and hosted information in the cloud, they are actually sharing customer information with the third party. These rules and regulations will reduce the effect of using cloud computing. Organizations will need to run the software on their own servers to keep information that is legally bound to specific laws.
When there is no rules about sharing some information with third parties providing cloud computing, another problem arises. The combined sensitive information in the cloud can be controlled by a weak privacy. When this data is stored in your own database, you can determine how you want to protect this data and you are the only entity that can access this data. When you want to share this information with a specific organization or not. When all this information is in the cloud, they decide on the privacy of the data. Other organizations can easily extract information more easily than cloud providers, when this data will be stored in your own database. For example, the DNA database is. This database can find a special treatment for people with a disease to save the DNA. When this database is stored on its hepatitis Center or the investigative institution can determine if they want to share it with the police department. The police department may be in incredible search and the DNA database will have to work. Although, when the investigation agency does not want to provide database information, he promised his counter-confidentiality, will not have access to the police department. On the other hand, if this information is in the cloud, and the cloud provider is not familiar with the importance of data and confidentiality as promised by the Investigation Agency, they will provide this information to police police easily.
Before that, we discussed the privacy and personal information law. Rules are different in countries, so it is important to know where the data is in the cloud.

Leave a Reply

Your email address will not be published. Required fields are marked *