The Cloud Threatening Legal Storm Security Failing

Authors

  • Divya Hada M.Tech CS, Jayoti Vidyapeeth Women’s University, Jaipur, Rajasthan, India.

Abstract

Cloud computing is a double-edged sword from the privacy and security standpoints. Despite its potential to provide a low cost security, organizations may increase risks by storing sensitive data in the cloud. In this thesis, we analyze how the cloud’s characteristics such as newness, nature of the architecture, and attractiveness and vulnerability as a cybercrime target are tightly linked to privacy and security. We also investigate how the track Security Threats to affects privacy and security issues in the cloud. Cloud computing poses privacy concerns because the service provider can access the data that is on the cloud at any time. It could accidentally or deliberately alter or even delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order even without a warrant. That is permitted in their privacy policies which users have to agree to before they start using cloud services. Solutions to privacy include policy and legislation as well as end users' choices for how data is stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access. According to the Cloud Security Alliance, the top three threats in the cloud are "Insecure Interfaces and API's", "Data Loss & Leakage", and "Hardware Failure" which accounted for 29%, 25% and 10% of all cloud security outages respectively together these form shared technology vulnerabilities.

Published

2015-06-30

How to Cite

Divya Hada. (2015). The Cloud Threatening Legal Storm Security Failing. International Journal of Innovative Computer Science & Engineering, 2(3). Retrieved from https://ijicse.in/index.php/ijicse/article/view/40

Issue

Section

Articles