· be affected by the attack of just

Security and privacy:

Securing data is among the biggest concerns
in cloud computing. As cloud computing signifies an advanced computing model,
there is a major doubt of how data at all levels can be secured (e.g host,
application, network, …) The fact that valued business data have to be put
outside of the organization’s firewall creates a big concern to the company as
well as the clients. Numerous clients will be affected by the attack of just
one site. Organizations nowadays have to face several requirements in order to
secure the information of each individual, and it is not certain that whether
these requirements will help protecting these information or whether the
organization will violate the regulations as of these new model. (Voorsluys W,
Broberg J, Buyya R, 2011)

In 2014, the once Internet giant – Yahoo had been the victim of the
biggest data breach in the history where 3-billion user account had been affected:
real name, email address, date of birth, telephone numbers had been conceded. (Armerding,


Cyber attack:

Another big concern about cloud computing is
where application and website hosted on the cloud will be attacked by hackers.

This occurs when a vulnerable part of an application or website is detected and
hackers will change the normal execution. A malicious program will be used to
inject the malware into the cloud. This will lead the hackers to do whatever
they want (e.g: data steals, eavesdropping, … )

One of the most famous forms of cyber attack is SQL. The idea of
this attack is to change the structure of the cloud. The cyber hackers use a
sequence of indecorous code in order to get in charge of the cloud (usually the
target is servers or databases). Also hackers will inject numerous of code to
avoid the login stage and gain access to databases and take control of the
whole systems. (Tejinder, S. M. & Sanjay, J., 2015)


Insider attack:

Information breach from inside is as dangerous as cyber attack. The
shared access creates high chances of other people accessing to other people
information. The most famous case of insider attack was create by Vodafone
where 2 millions customer records were invaded. Everything that store in the
cloud will be for anyone to obtain, including private information, data,
rational property if an employees gain access to others cloud. Therefor, security
level of cloud environment is in critical warning owing to insider attack as cloud
admin can be posed by other people or mole to gain access to all data and steal
information. (Stack Tunnel, 2017)