Page 22 - cloudComputing-En-V3
P. 22
1. Inaccessibility of Services
As mentioned earlier, access to services in the cloud is related
to the presence of the Internet and the speed at which you can
access cloud services is determined by the speed of your
connection. Therefore, if the Internet connection is lost or the
speed of this connection is not at the appropriate speed, this
results in inaccessibility of these services or discomfort due to
slow access.
2. Data Security
When storing data about users and their business, they place full
trust in cloud providers to secure and protect this data. So, cloud
providers like Microsoft Azure and Amazon Web Service invest
a lot of resources and money to implement and improve cloud
security.
However, putting data in the cloud instead of saving it locally
with client devices opens the door to security risks. For example,
if cloud service providers are hacked this will lead to access to
huge amounts of data. Here, it is worth noting the great interest
and various attempts by researchers, specialized companies,
and service providers in providing best practices and proposals
to overcome this challenge that faces the use of cloud
computing services. The aim of these trials is to allow the users
to get the benefits from the provided cloud services while
maintaining the confidentiality and security of user data through
for example using the encryption, two-factor authentication,
auditing, reviewing access keys, credentials and recycling them,
etc., to reduce security risks as much as possible.
3. Hacking and Legal Risks
Hacking is another important risk to consider when moving to
the cloud, especially as organizations store financial, healthcare,
credit card or any regulated data. By law, organizations are
responsible for protecting these data, and knowing where they
are stored, who is allowed to access them, what measures are
in place to protect them, and other considerations under local
and international regulations. Although cloud service providers
are responsible for protecting data and adhering to these local
and international regulations, organizations or individuals using
these services still have some responsibility in facing the data
breach.
15 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024