CNN News Website Analysis
CNN News Website Analysis
1. Abstract...............................................................................................2
2. Introduction........................................................................................3
3. Main body...........................................................................................4
4. Findings.............................................................................................10
5. Conclusion and Recommendation..................................................11
6. References.........................................................................................11
Issues of Privacy and Security in Cloud
Computing
Abstract
Cloud computing is a rapidly evolving model; it inherits new aspects and functionalities from
time to time. We define cloud computing based on five attributes: shared resources, massive
scalability, elasticity, pay as you go and self-provisioning of resources [1]. Cloud computing
has generated a large amount of interest in market and make high growth. Cloud computing is
expected to be a significant booster for those companies who want to grow faster using IT.
Cloud computing increase the growth up to 27% [1]. The regular and increasing use of cloud
computing also increase the growth of cloud computing as the use increase new challenges
occur like privacy and security. In this report we talk about what are challenges and issues we
face today in cloud computing regarding privacy and security.
Introduction
For many years the Internet has been represented on network diagrams by a cloud symbol
until 2008 when a variety of new services started to emerge and new variety of technology
came out in which cloud computing is one of them. Cloud computing enlarge the activities
such as the use of social networking sites; however, most of the time cloud computing is
concerned with accessing online software applications, data storage and processing power.[4]
We have here distinguished a couple of basic issues for trusted distributed computing and
also a few late works examine the most basic issues on cloud security and privacy. We can
recognize between various administration level assentions, by their variable level of shared
obligation among cloud suppliers and the clients. [4]
Basic security issue is client data safety and client privacy. If we want to safe our data then
we should take care when selecting the cloud server. We should read the documentation
carefully so there would be no problem in future regarding safety and privacy.
Main body
Cloud computing involves hosting rather than local severs, to make data and services easily
accessible across locations and devices. It is a system where most businesses and people
work from more than one computing device. [2] Cloud computing is considered by many IT’s
to indicate a new era in computing based on access rather than ownership. Cloud features
include elasticity, shared resources, and the potential for maximal resource utilization. [2]
But before we go to issues we have to know about types of cloud computing: public cloud,
Private cloud and hybrid cloud. These three types have different functionality and different
level of security like who can access and who can’t. And there are also model for cloud
computing: iaas (infrastructure as a service), saas (software as a service), paas (platform as a
service).these are three service delivery models. They are simultaneously called as SPI
model.
As
we
know cloud computing is increasing gradually, however it has number of drawbacks and
many of them are related to privacy and security. Privacy and security are inherent challenges
in cloud computing because their very nature involves storing unencrypted data on a machine
owned and operated by someone other than the original owner of the data. [2] Issues arise
from lack of data control, lack of trust of all parties with access, uncertainty about the status
of data (whether it has been destroyed when it should, or whether there has been a privacy
breach), and compliance with legal flow of data over borders. [2]
Now we discuss about privacy issues:
Data protection:
Data security plays an important role in cloud computing environment where encryption
technology is the best option. If we talk about security of transmitted data, then SSL
encryption is the best option to secure your online communications as well provides
authentication to your website and business that assures the data integrity and the user’s
information is not altered during transmissions. [2]
User control:
This can be both a legal issue and one raised by consumers. SaaS environment offers the
control of consumers’ data to the service provider so; data visibility and control will be
limited. In that case, there is a threat of data stolen, miss-used, as consumers may have no
control over cloud. [2] Even data transparency is missing for example, where the data is, who
owns it. However, data exposure can also be possible during data transferring. [2]
Unauthorized usage:
The service provider may gain income from secondary usage of data. Agreements between
clients and providers must be specific about unauthorized usage as it will enhance the trust
and lessen the security worries. [2]
Cloud computing eliminates many of the financial risks that had been inherent to doing
business digitally. It provides a platform for sharing information all over the world, in an age
where most business involves global elements.[2] Along with mobile devices and increasingly
reliable internet, cloud computing is another step in pulling down distance between the
business and teamwork.[2]
Findings
There are many issues in the security of cloud computing which are need to be solved in
order to make clouds more secure to check the security of a cloud the following areas must be
consulted with the cloud service providers.
There are many solutions that we have found:
Multifactor authentication:
If the cloud providers provide the multifactor authentication for example one time password
then the security of the data will be higher as it will be protected by multi factors. Multifactor
authentication makes the level of protection of data more high. [3]
Access to data:
There should be access protocols for data accessing mean which can access which data and
which user not access. IT is in charge of checking the quality of the structure and for
observing cloud condition (who is accessing the data).
Encryption of backups:
Cloud data that is backed-up should be encrypted otherwise there is no meaning of having
data. If not does this any hacker can access your data and you can loss your data in other
words your data would not be safe if not encrypted.
Secure data destruction:
Secure destruction of data is necessary because if the destruction of data is not secured then
there would be more risks of data leakage. It means any hacker or person can retrieve that
data if it is not safely deleted.
If the encrypted techniques are created and tested by experienced persons there would be
more chance that your data is safe.[3]
Conclusions:
Cloud computing is the most fast and emerging technology which provide most facilities of
both software and hardware over internet and provide those facilities that we want. It can be
said that it is less expansive technology to share data over internet. As there are many
advantages, there are also a lot of issues in cloud computing. The issues are privacy and
security of data. In this report, I tried to find out the security issues in cloud computing and
good architectures for computation are all are explained. This research will help you to
understand the security level of cloud computing whether it is safe to save the data to cloud
and what standards must be checked before uploading data to clouds. Hence you will
conclude that clouds are safe to store data or not.
References:
1. Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an
enterprise perspective on risks and compliance. " O'Reilly Media, Inc.".
2. Security and Privacy Issues in Cloud Computing https://www.narga.net/security-
privacy-issues-cloud-computing/
3. Security and Privacy Issues in Cloud Computing Environment
https://www.longdom.org/open-access/security-and-privacy-issues-in-cloud-
computing-environment-2165-7866-1000216.pdf
4. Security and Privacy Issues in Cloud Computing
https://www.researchgate.net/publication/260671144_Security_and_Privacy_in_Clou
d_Computing
5. X. Huang et al., "Cost-Effective Authentic and Anonymous Data Sharing with
Forward Security," in IEEE Transactions on Computers, vol. 64, no. 4, pp. 971-983, 1
April 2015, doi: 10.1109/TC.2014.2315619.
6. Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud
Comput., 1(1), 54-57.
7. El Makkaoui, K., Ezzati, A., Beni-Hssane, A., & Motamed, C. (2016, May). Cloud security and
privacy model for providing secure cloud services. In 2016 2nd international conference on
cloud computing technologies and applications (CloudTech) (pp. 81-86). IEEE.