Page 22 - cloudComputing-En-V3
P. 22

1. Inaccessibility of Services
                       As mentioned earlier, access to services in the cloud is related
                       to the presence of the Internet and the speed at which you can
                       access cloud services is determined by the speed of your
                       connection. Therefore, if the Internet connection is lost or the
                       speed of this connection is not at the appropriate speed, this
                       results in inaccessibility of these services or discomfort due to
                       slow access.

                     2. Data Security
                       When storing data about users and their business, they place full
                       trust in cloud providers to secure and protect this data. So, cloud
                       providers like Microsoft Azure and Amazon Web Service invest
                       a lot of resources and money to implement and improve cloud
                       security.

                       However, putting data in the cloud instead of saving it locally
                       with client devices opens the door to security risks. For example,
                       if cloud service providers are hacked this will lead to access to
                       huge amounts of data. Here, it is worth noting the great interest
                       and various attempts by researchers, specialized companies,
                       and service providers in providing best practices and proposals
                       to overcome this challenge that faces the use of cloud
                       computing services. The aim of these trials is to allow the users
                       to get the benefits from the provided cloud services while
                       maintaining the confidentiality and security of user data through
                       for example using the encryption, two-factor authentication,
                       auditing, reviewing access keys, credentials and recycling them,
                       etc., to reduce security risks as much as possible.

                     3. Hacking and Legal Risks
                       Hacking is another important risk to consider when moving to
                       the cloud, especially as organizations store financial, healthcare,
                       credit card or any regulated data. By law, organizations are
                       responsible for protecting these data, and knowing where they
                       are stored, who is allowed to access them, what measures are
                       in place to protect them, and other considerations under local
                       and international regulations. Although cloud service providers
                       are responsible for protecting data and adhering to these local
                       and international regulations, organizations or individuals using
                       these services still have some responsibility in facing the data
                       breach.

15 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024
   17   18   19   20   21   22   23   24   25   26   27