Investigating the Security and Privacy Implications of Cloud-Based Disaster Recovery
DOI:
https://doi.org/10.22399/ijcesen.4921Keywords:
Cloud Computing Security, Disaster Recovery, Data Privacy, Access Control, Encryption Mechanisms, Security FrameworksAbstract
The article explores security weaknesses in cloud disaster recovery setups. One of the major concerns is that confidential information may be exposed unintentionally during replication. The article also highlights that if the recovery environment's access control is not robust, it can be a great exploit for hackers to gain unauthorized access. Furthermore, the privacy aspect is affected due to data residency and multi-tenant isolation issues. In the same article, it is pointed out that protection such as encryption, identity management, and network security controls is are way in which the system can be shielded against threats. The next paragraph talks about the need for having proper governance in place as a prerequisite for deploying security recovery architectures. Apart from that, regular reviews of the system, execution of data handling measures, and preparation for the response team in the event of an incident are also part of the organization’s playbook. The last sentence states that companies should not forget the challenge of striking a balance between the need to recover operations and protect data so as not to lose their resilience, and at the same time not break the rules.
References
[1] P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Special Publication 800-145, Sep. 2011. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-145/final
[2] Elaine Hulitt and Rayford B. Vaughn, "Information System Security Compliance to FISMA Standard: A Quantitative Measure," Proceedings of the International Multiconference on Computer Science and Information Technology, 2008. [Online]. Available: https://annals-csis.org/proceedings/2008/pliks/99.pdf
[3] Debabrata Nayak, "Understanding the Security, Privacy and Trust Challenges of Cloud Computing," Journal of Cyber Security and Mobility, 2012. [Online]. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=11059777
[4] Ievgeniia Kuzminykh et al., "Information Security Risk Assessment," MDPI, 2021. [Online]. Available: https://www.mdpi.com/2673-8392/1/3/50
[5] Lisa J. Sotto et al., "Privacy and Data Security Risks in Cloud Computing," Electronic Commerce & Law Report, 2010. [Online]. Available: https://www.hunton.com/media/publication/3733_Privacy-Data_Security_Risks_in_Cloud_Computing_2.10.pdf
[6] Keiko Hashizume et al., "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, 2013. [Online]. Available: https://link.springer.com/content/pdf/10.1186/1869-0238-4-5.pdf
[7] Muhammad Faheem Mushtaq, "Cloud Computing Environment and Security Challenges: A Review," (IJACSA) International Journal of Advanced Computer Science and Applications, 2017. [Online]. Available: https://www.researchgate.net/profile/Muhammad-Mushtaq-20/publication/320802850
[8] Milan Chauhan and Stavros Shiaeles, "An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions," MDPI, 2023. [Online]. Available: https://www.mdpi.com/2673-8732/3/3/18
[9] Fariba Ghaffari et al., "Security Considerations and Requirements for Cloud Computing," 8th International Symposium on Telecommunications, 2016. [Online]. Available: https://www.researchgate.net/profile/Fariba-Ghaffari/publication/315468942
[10] Ali Gholami and Erwin Laure, "SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS," arXiv, 2015. [Online]. Available: https://arxiv.org/pdf/1601.01498
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.