Weijia Chen

Chen 2

WeijiaChen

KristenFoster

CO150-403

November16th,2014

Streakingof the Netizens

Cloudstorage technology is an emerging in recent years based on thenetwork storage technology, it is aim of providing more storageservice to users through the Internet. For this new technology canbring convenience to people, but most of them still hold wait-and-seeattitude. This kind of phenomenon from the storage of the key problemis security. Cloud storage means that data stored in the machinewhich the user doesn’t have control-ability, and these data alsomay not be controlled by service provider. How to guarantee thesafety of the data? How can people believe that data service providerwill not sell information? Have the hacker broke into cloud storageplatform stealing user account caused by the data leak? Also, cloudstorage is based on network, the data in the process of uploading anddownloading is more likely to be hacked, and tampered by hacker.These problems are the cloud storage users concerned. In the Novemberof last year, hackers stole the nearly two million accounts involvedFacebook, Gmail, YouTube, Twitter, and LinkedIn (McCartney).Moreover,the supplier shut down and data storm can cause that users cannot beable to access the data in the cloud (L0rd). However, the argument onthat these data loss event even often occur, but most people don’ttake this issue seriously. The paper is an argument of storingpersonal data in the cloud can be a problem. Three reasons whichsupport my claim and counterarguments will be discussed in thefollowing paragraphs.

First,hackers, has always been a headache problems for Internet or systemusers, cloud storage is not exceptional also. SteveWozniak, Apple’s co-founder, showed the cloud storage is anightmare for users (Matyszczyk). In cloud, the user has virtually nocontrol of any data, they have surrendered the control and ownershipof the data when they signed user agreement (Matyszczyk). As anincreasing number of users deposit confidential data in cloud storageproviders’ castle, more hackers could break through the wall. Thisis a never-ending battle, and usually most home users cannotwithstand a skilled hacker (Cloud Storage). In addition, hackers’attack could lead to the leak of users’ privacy. Being stored nudepicture in the cloud was leaked that seems to have exposed theproblem which the virtual storage inherent insecurity. Hacker couldthrough security protocol vulnerabilities opens the door to theprivate data (Cloud Storage). Once the images and other data werestored in the cloud, it becomes more difficult to control who canaccess it, even if we think this is a private data (Swan). Moreimportantly, although now many users have become savvier to selectthemselves photos uploaded online, but they may not realize that thephotos which they think have been safely stored photos can viamalevolent people to access and release (Swan).

However,some people think cloud storage is connectivity and convenience tothem. As long as there is network, users can access the data in thecloud at anytime and anywhere, and users can share file andinteraction between different clouds. But this is also convenient forhackers to spread malware. For example, Dropbox, which is a popularcould storage service, was attacked by a Chinese cyber-spying teamcalled Comment Crew at last year. They just need to sign up for afree Dropbox account, upload malicious contemn, and then open andallow other users to share it (Kalyani). Also, the attacker may bedisguised behind the trusted Dropbox brand, increasing thepossibility of interacting malicious files from personal or corporateDropbox users (Kalyani). In addition, hackers based on relevance ofdocuments in the account to expand the user’s loss. For example, inAugust 2012, wiredtechnology journalist Mat Honan was brutally hacked.In up to accountlost after 15 minutes, Mat Honan’s Gmail and Twitter account alsowere stolen because of a file which stored in iCloud (Kelly). Becausedecoding user’s password is as easy as winking for hackers. Hackersvia brute force password by the software, and they just needsufficient computing power and time (Isaacson). Lost account does notonly mean lost files and data for users, just like wired technologyjournalist Mat Honan. Losing an account data could lead to the otherassociated account be stolen.

Thegovernment’s monitoring and the seizure of data is the secondproblem of cloud storage. As people rely increasingly on the Internetand mobile phones, the government requiresthe cooperation of the private sector that monitoring and extract thepersonal information through cloud (MacKinnon). A famous event, Prismplan, the government through the cloud monitoring citizens andgovernment officials at the same time. The NSA can directly extractthe information from the service provider’s servers in the UnitedStates, such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL,Skype, YouTube, Apple (Gellman and PoitrasJune). People’s movementsare under the supervision of the government, there is no privacy atall in front of the government. America’s huge privacy watch scaredof people, politicians and privacy regulators felt indignation forthis event (Perez5).The right of privacy is one of the basic rights of each user, thegovernment unscrupulous monitoring is infringement of user’s right.In addition, the author Kopczynski indicate if the data is said whatyou did wrong, then the reader will interpret all the related thingsyou’ve done.

Protectivemonitoring Governmentmonitoring can be of great benefit to companies to secure their data. Effective protective monitoring enables a company to detect andreact to attempts by fraudsters and hackers. Governmentmonitoring entails use of technology to evaluate the risk posed bydifferent entities within the cloud environment in an unremitting andautomated manner. In entails periodic test out of systems against thesecurity control that are put in place by government to safeguarddata (Davis1).In the process of monitoring the government provides information tovarious organizations so that they are able to know the weakness intheir security system and understand and perk up the risk profile oftheir cloud system. Itis worth noting that government surveillance is meant to hamperaction by hackers and fraudsters that might injure the business. Though large collection of data about various important aspects of anorganization might fall into the hand of the government, under thesurveillance Act forbid government officials from releasing thisinformation to third parties who might harm the operations of anorganization or user (Davis1). Inadditional the harm caused by surveillance and government monitoringcan be countered by allowing companies to issue a transparentstatement of the data collection requested by the governmentagencies. This is to ensure that consumer trust is not lost. Cloudservice providers needs to be transparent when they are sharingsensitive user data and information (Dell 3) Itis also worth noting that in cloud storage security is a jointventure between government program manager and the cloud serviceprovider in question. The joint responsibility for securitynecessitate that each party’s procedures and policies are congruentso that there is no bleach (Davis1). Government program managers depending on the nature of data andinformation gathered may transmit data and applications to thirdparty cloud, but even in doing so they do not have authority totransfer the peril of operating in the cloud. At the end of the daythe program manager is accountable for integrity, confidentiality andavailability of data irrespective of where it resides (Davis1). A problem detected in the process of government monitoring willgo a long way in forearming cloud service providers and users of theeminent danger from intruders. Nonetheless,Surveillance and monitoring elevates concerns about security andprivacy of user information in the cloud services. I some casesgovernment agencies have to apply back-door methods and crack encrypttechnologies in order to access what they want. Globally known cloudservice providers such as Google, Apple and Amazon are negativelyaffected by such action. Customers have raised concern about theprivacy and confidentiality of their information and data stored incloud storage (Davis1).

Atlast, a very sensitive problem is that the employee who works at thesupplier may peep the data or steal the data and sell them. This is abig problem about personal morality. Some people may think it isbetter to have employees because they can help users to monitor theirdata on cloud storage and make sure these data are safe. In fact, itis really a good way to avoid criminalgangswho want to steal the personal data from cloud storage. However, someemployees for their own personal benefit will try to steal thepersonal data from users and thus sell it to someone else. Forexample, according to “Akamai employee tried to sell secrets toIsrael” (McMillan 2011). A 43 years old former Akamai employee haspleaded guilty to espionage charges after offering to hand overconfidential information about the web acceleration company to anagent posing as an Israeli consular official in Boston. Under thiscase, users are hard to know the situation of their data even italready stolen by other people. So it is a big problem that if theemployee who work at the supplier but has bad personal morality.Also, here has another case is relate to this problem. According to“How to Make Sure Company Secrets Stay When Employees Move On”(Richmond 2012). Nearly 60 percent employees steal companies’information when they leave or are fired, with 67 percent of themtaking it to a new job. From this article, we can know it is alreadybecome very pervasive that employees steal information from theircompanies. So using cloud storage, we should have this anxious thatour personal data may be steal by the employees who work at thesuppliers. To sum up, the problem of employees steal the personaldata from users is one of the disadvantages that I think cloudstorage is negative to us.

Anorganization can make frantic effort to safeguard the data in thecloud, but it is a gargantuan task to prevent employees from sharinginformation and data through cloud based instruments such as Googledrive (Palermo 1). It is better to have employeesbecause they can help users to monitor their data on cloud storageand make sure these data are safe. In fact, it is really a good wayto avoid criminal gangs who want to stealthe personal data from cloud storage. Employees in modernorganization habitually move, store, and share information and datain the cloud storage appliance.

Theutter ease and expediency with which people work in partnership, andpool resources an aspect that enhances productivity (Palermo 1). Even though data devices are notabsolutely secure, the top information and technology department canallow the employees to interact with information and data in thecloud storage in different ways but at the same time securing it fromunauthorized persons (Richmond 1.

Evenwith these benefit the moment a user saves data and information inthe public cloud, it is apparent that the security of the data islost. An employee can exchange and share data with any person theywant, even when they no longer work in the company (Palermo 1). Worse still they account can behacked and as such completely compromise the security of the userdata in the cloud storage. It is clear the security of data in thecloud storage depends on the feeble hope it shall remain protected bythe employees.

Conclusion

Cloudstorage entails storing data and other information in electronicdevices in a storage system maintained by a third party. It serves asa replacement whereby instead of saving data in the user’s orcompany’s computer hardware or other local storage tools, it isstored in a remote database. One of the major issues that emanatefrom cloud storage techniques is the question on who actually ownsthe data in the cloud system. Should the owner, the company thatstores the data and the fate of the data after a client cuts contactwith the company that stores the data?

On the other hand the two principal concerns relating to cloudstorage are security and dependability.To secure client data cloudstorage companies use encryption technique, authentication andauthorization processes. But even with these defensive measures, theinformation and data store in the cloud storage is vulnerable tohackers, who can access it through back-door exchange and share datawith any person they want, even when they no longer work in thecompany. Worse still they account can be hacked and as suchcompletely compromise the security of the user data in the cloudstorage. A discontented employee can modify or obliterate data andinformation while government monitoring means that user privacy isabused. Government agencies apply back-door methods and crackencrypts technologies in order to access what they want, and thiscompromises the privacy of the users. All these security threatsnecessitates for an investment in security measure in order toprevent data and information theft or corruption.

.

.

WorkCitied

“CloudStorage: Is it Secure?” Askbobrankin.com.n.d.Web. 17 November 2014.

Best,Samuel, Brian Krueger, and Shanna Pearson-Merkowitz. &quotAl QaedaVersus Big Brother: Anxiety About Government Monitoring And SupportFor Domestic Counterterrorism Policies.&quot&nbspPoliticalBehavior&nbsp34.4(2012): 607-625.&nbspAcademicSearch Premier.Web. 19 Nov. 2014.

Davis,Kirk. NSASurveillance Taking a Toll on U.S. Cloud Computing Companies. 2014.Retrieved from:https://blog.spideroak.com/20140220211535-nsa-surveillance-taking-a-toll-on-us-cloud-computing-companies

Dell.Protect data stored and shared in public cloud storage. 2013.http://i.dell.com/sites/doccontent/shared-content/data-sheets/en/Documents/Dell_Data_Protection_Cloud_Edition_Data_Sheet.pdf

Gellman,Barton and Laura PoitrasJune. “U.S., British intelligence miningdata from nine U.S. Internet companies in broad secret program.”Wshingtonpost.com.7 June 2013. Web. 19 November 2014.

Isaacson,Betsy. “It`s Now Easier For Hackers To Crack Crazy-ComplexPasswords.” Huffingtonpost.com.28 August 2013. Web. 17 November 2014.

Kalyani,M. “Hackers in the Cloud.” Spideroak.com.6August 2013. Web. 19 November 2014.

Kelly,Heather. “Apple account hack raises concern about cloud storage.”Cnn.com.7 August 2012. Web. 17 November 2014.

L0rdCrusAd3r. “Problems Faced by Cloud Computing.”Packetstormescurity.net.N.p.n.d. Web. 17 November 2014.

MacKinnon,Rebecca. “We`re losing control of our digital privacy.” Cnn.com.29 January 2012. Web. 19 November 2014.

Matyszczyk,Chris. “Woz: The cloud is a nightmare.” Cnet.com. 5 August 2012.Web. 17 November 2014.

McCartney,Jennifer. “The top 10 data breaches of the past 12 months.”Techradar.com.21stMay. Web. 20 Oct. 2014.

Palermo,Elizabeth. EmployeeBuy-In Is Key to Cloud Security.Business News Daily.2013.Retrievedfrom:http://www.businessnewsdaily.com/4435-cloud-security-small-business.html

Perez,Juan Carlos, et al. &quotIT Moves To The Cloud Despite NSASnooping.&quot&nbspComputerworld&nbsp47.22(2013): 5.AcademicSearch Premier.Web. 24 Oct. 2014.

Richmond,Riva. Howto Make Sure Company Secrets Stay When Employees Move On.2012. Retrieved from: http://www.entrepreneur.com/article/223768

Swan,Noelle. “Nude celebrity photo hack: How safe is your data in cloudstorage?” Csmonitor.com.2 September 2014. Web. 17 November 2014.

Zarrell,Rachel. “JenniferLawrence, Victoria Justice, Other Celebs Victims of More Leaks, AppleDenies&nbspBreach.” Buzzfeed.com.31August, 2014. Web. 17thNovember 2014.