You are on page 1of 6

Turkish Journal of Computer and Mathematics Education Vol.12 No.

7 (2021), 1433-1438
Research Article
Cloud Computing Ethical Issues: A Review Paper To Investigate And Provide Suggestions
For Solving Data Privacy Issues Of Cloud Computing

Mirza Mohammed Akram Baig


Senior Member of Technical Staff, Illumio Inc

Article History: Received: 11 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published
online: 16 April 2021

Abstract: The era of cloud computing in the IT industry has just begun. Cloud computing on the Internet has a robust
machine system. It focuses on the convergence of interconnected computing systems with networks, applications and
the Internet. It has different advantages over grid computers and other networking systems. Cloud computing is one
of the new generations of structural processing, which creates a promising solution to manage explosive enrollment
in a multi-faceted environment and information size. One of the foundations is concerned from the standard
registration structures to the Cloud ethical thinking. Ethical problems in certain situations rely on particular
requirements and needs. In any case, we plan to be aware of the ethical issues of Cloud, born of the important idea of
new invention in contrast to the obvious conditions. There are many new models that influence behavioral issues in
the Cloud, for example, security, protection, measuring, and making measurements. In addition to the latest
specifications, many guidelines and protocols called Terms and Conditions (T&C) characters are impacted in the cloud
network. Terms and Conditions is a setting that reflects customer rights and obligations, Cloud suppliers, and
outsiders. In this ongoing exploration activity, we plan to research the bat's goal new levels of influence on behavior
in the Cloud, and at the same time, talk about what all these steps mean in conduct. Also, we think about relationships
between Terms and Conditions, rules and conduct. Finally, we take a quick glance at the ethical issues in the cloud as
opposed to general web applications. This paper provides a summary of the computing test of clouds is been presented
by reviewing more than 30 cloud-related articles. The results of this review reflect the face of the IT industry before
and after computers.
Keywords: Cloud Computing, IaaS, PaaS, SaaS, Ethical Issues.

1. Introduction
Cloud infrastructure enables people to view preferred online apps from everywhere in the world. On the other
hand, cloud computing has identified many ethical issues associated such as pushing of data from local networks to
remote data centers. Historically, businesses used to purchase their own computing systems to run their projects, such
as corporate finance, content delivery, payroll services, etc. In conventional networks, resources and applications are
collected and transmitted locally, offering multiple options for sending and consuming data. Compared to cloud
computing, cloud shares controls and commitments between app owners and cloud service providers. If the server is
not shared compared to the shared infrastructure paradigm and a particular data security approach is accepted,
unwanted access to data will easily be avoided. However, owing to technological and technology updates and
upgrades, the infrastructure involves the procurement of computer hardware and high maintenance costs. Moreover,
it does not encourage the infrastructure's ability to increase or decrease in line with the actual resource needs.
Cloud computing is inclined to such issues (significant expense investment funds and adaptability) by
diverting chiefs to simply additional time installments as expenses emerge. Regardless, the Cloud is as yet youthful,
so good discourse is more intriguing right now, not like those of customary balance models, so it ought to be
completely evolved. Besides this, there is a different business model offered by Cloud. A prime example is SaaS
(Software-as-a-Service), where explicit Internet management is delivered by cloud providers, for example, Dropbox
and Google Docs. The second type of centralized management framework (IaaS), in which hardware assets (for
example, CPU, memory, data storage, and data transfer capacity) are incorporated into clients. With this self-
regulatory approach, customers can make their own visual equipment and demonstrate their ability to repair visual
equipment and system management (e.g., fire logs). The image of this model is Amazon management and Microsoft
Azure. The third model is the PaaS (Platform as a Service), where outside the framework is a phased development
program. PaaS makes event transformation, testing, and implementation an intelligent, quick, and basic process.
2. Cloud computing
Cloud computing has two meanings. The most common meaning is the unfinished burden of running
remotely through the Web in the service provider's server farm, often referred to as the “public cloud”. This
acknowledged distributed concept is all expressed in well-known public cloud offerings such as Amazon Web Services

1433
Cloud Computing Ethical Issues: A Review Paper To Investigate And Provide Suggestions For Solving
Data Privacy Issues Of Cloud Computing
(AWS), the Salesforce CRM System, and Microsoft Azure. These days, most associations have received a multi-cloud
approach, which really implies they utilize numerous public cloud executive organizations (Hussein & Khalid, 2016).
The second importance of cloud computing describes its function: virtual asset pools, from raw data capacity
to application utility, can be accessed on-demand. When customers get cloud benefits, vendors use progressive
mechanization to meet those requirements instead of manual configuration. The key advantage is agility: the ability
to apply disjointed figures, inventory, and organizational assets to unresolved burdens vary, and a large number of
pre-built governments can be utilized.
2.1 Advantage of cloud computing
● Automatic software integration- In the cloud, software integration happens automatically. Therefore, you
don't need to do any additional work to tailor and upgrade the app to your requirements.
● Reliability - Unwavering quality is probably the greatest advantage of distributed computing. You can
generally get the most recent insights concerning the change.
● Transportation - Employees working in workplaces or distant regions can without much of a stretch access
every accessible help. All they require is a web association.
● Capacity Unlimited capacity limit - The cloud gives limitless capacity. You can rapidly add the last portion
whenever with a month-to-month charge.
● Communication - Cloud computing platforms can help employees in different regions work together more
easily and safely.
● Rapid upgrades - At last, distributed computing offers you the chance to send quicker. So, when you choose
to utilize the cloud, your whole framework can be completely operational in a second. Or on the other hand,
the time required relies upon the innovation utilized in your business (Januzaj et. al., 2021).
2.2 Disadvantage of cloud computing
● Performance Can Change - While working in the cloud, your application chips away at a synchronous
worker that conveys merchandise to different associations. Any inadmissible presentation or DDOS assaults
on your inhabitant could influence your shared property display.
● Technical issues - Cloud naming is consistently inclined to elimination and other exceptional issues. For
sure, the associations of the best cloud associations can manage this troublesome circumstance without
keeping up with high upkeep prerequisites.
● Cloud Security Threat- Another disadvantage when working with distributed computer administrators is a
security risk. Before accepting cloud naming, you should know exactly how to share all of your organization's
relevant details with a co-op operator. Programmers can access this data.
● Low bandwidth- Many cloud specialist organizations limit the transfer speed use of their clients.
Accordingly, if your association surpasses as far as possible, extra expenses might be critical (Januzaj et al.,
2021).
● Lack of support- Cloud computing organizations can't give the correct client care. Also, they need their
clients to depend on FAQs or online assistance, which can be an overwhelming assignment for uninformed
representatives.
3. Cloud computing services-
Cloud computing provides three types of services.
a. Infrastructure as a Service, - "Basic as a Service" (IaaS) refers to online management that offers high-
quality APIs used to extract various low-level organizational strategies such as real asset registration,
location, knowledge sharing, ranking, protection, validation, and more. The hypervisor uses equipment seen
as guests. Hypervisor pools within the cloud environment can catch a wide variety of virtual machines and
the potential to calculate profits here and there as evolving consumer needs. Linux administrators execute on
different assignments to a single Linux kernel that runs directly on real machines. Linux collections and word
spaces are advanced Linux tools that are used to lock, secure, and deal with components. Specifically, IaaS
allows the web business a way to build and improve interest rates. Both PaaS and SaaS mists are based on
IaaS mist, as the organization provides the product as a manager and provides a framework for conducting
the product. Deciding to use the IaaS cloud asks you to look forward to a more environmentally friendly
environment, but with that expectation comes flexibility(Abdel-Basset et al., 2021). Amazon EC2 and
Rackspace Cloud are IaaS models.
b. Platform as a Service (PaaS) - In cloud computing PaaS models, cloud providers transmit a computer
component, typically including a framework, language usage, data set, and web function. App developers
build and run their apps on the cloud platform rather than specifically buy and work with secret computers
and system layers. With some PaaS, the primary PC and asset capacity on the scale, therefore, integrates with
the application so that the cloud client does not have to distribute the goods manually. dialects, libraries,

1434
Mirza Mohammed Akram Baig

administration, and resources suggested by the supplier. The buyer does not maintain or monitor the essential
cloud portion, including the network, personnel, operating systems, or functionality, but has control over the
configured software and configurations that could be the weather collection that simplifies the procedure.
c. Software as a service (SaaS) - In Software as a Service (SaaS), customers have access to system applications
and information. Cloud providers deal with the basics and categories used by applications. SaaS is sometimes
referred to as a "highly sought after the system" and is usually limited to compensation for each use or
membership fee. (Abdel-Basset et al., 2021) In the SaaS model, cloud providers start and launch an
application in the cloud with multiple customers accessing the product to cloud customers. Cloud Clients do
not deal with the framework of the cloud and the phase in which the application operates. This eliminates the
need to launch and run the program on PC client clients, which improves storage and support.
Moreover, power enabled the consumer to use vendor applications running on cloud infrastructure.
Applications are available on various client gadgets using a sophisticated visual interface, for example, an Internet
browser (for example, an email) or an interactive overlap. The buyer prepares not to succeed or regulate any hidden
infrastructure of cloud, counting network, operating systems, staff, object loading, and personal application
capabilities, with the proposed release of customized customer system settings.
4. Cloud computing ethical issues-
Cloud computing is based on paradigm shifts, which have a profound effect on good computer behavior. The
main elements of this transition are:
1. Transfer control to third party service;
2. The information is stored on multiple sites managed by multiple organizations; and
3. Various services can work in a network.
● Unauthorized access, data fraud, infrastructure failure, or unavailability are some of the risks of losing control of
third-party services; moreover, it is difficult to determine the cause and cause of the problem. The system can
cross the boundaries of multiple organizations and security boundaries. This process is called de-boundaryization
(C.Chou, 2015). As a result of the demarcation, "the operation aspects of the IT infrastructure of the company
are not only blurred, but the response criteria are becoming progressively apparent."
● The confusing design of cloud management can make it difficult to find out who knows when something
unfortunate happens. (Faragardi, 2017) In many cases or in unforeseen circumstances, many things add to the
work with unintended consequences, some of which have the potential to prevent these effects, so no one can be
regarded as competent, "a lot of hands-off."
● The pervasive and limitless data sharing and force inside the affiliation test the individual assurance of
information, the privilege or capacity of people to execute singular orders upon grouping, use, and exposure of
their own data; this tests the certainty and trust today that improves the information local area. Misrepresentation
and burglary are considered in view of the unauthorized acceptance of personal information available for use and
by new forms of dissemination by cooperating organizations and may also pose a threat to computer distribution.
● Bonding is an essential part of a distributed computer; Satisfactory data on how information is stored within the
cloud and liability distribution are key to supporting ethics in computer integration. Recorded evidence allows
us to reduce the obligation; however there can be a tension between protection and commitment and it is
important to build something that is being recorded, and who is coming to the record (Gazzar et al., 2016).
● Unnecessary dependence on cloud service providers (called vendor lock-in) is a major problem, and the current
NIST suspension function is trying to solve this problem. Another customer issue is that, in future research, only
a few firms can control market demand and decide regulations and costs.
5. Factor affecting cloud computing ethics:
There are different levels of performance that affect the emergence of some cloud-based ethical issues in
Cloud computing. One of them, security, protection, equity, and performance measures strongly influence ethical
issues. (Moura & Hutchison, 2016) In this article, we demonstrate how each of these mechanical standards can directly
affect behavioral thinking in Cloud computing. In upcoming research, we will clarify how these models are defined
and structured in relation to Cloud performance.

● Privacy and Security: When an unauthorized person accesses your cloud information - whether by an engineer
or a cloud service provider - you may be unsure of how and with which your information will be treated, which
may result in fewer ethical issues. Therefore, safety and security equipment is clearly the basis for avoiding such
ethical questions.
● Compliance: The key privacy issues and security measures form a set of standards. Cloud services must meet
certain performance standards, in other words, compliancy including a group of criteria to be reasoned during
maintenance and planning. When a cloud system in a SaaS model with specific privacy or security requirements

1435
Cloud Computing Ethical Issues: A Review Paper To Investigate And Provide Suggestions For Solving
Data Privacy Issues Of Cloud Computing
is to be introduced in the market (for example, an application containing client payment guarantees), it should
fulfill the pre-characterized guidelines. Besides this, picking a cloud supplier to get to IaaS or PaaS
administrations is perhaps the greatest hindrance. On the off chance that a cloud supplier contradicts consistency,
they can't be chosen as a client-supplier with consistent necessities.
● Performance Indicators: A service level agreement (SLA) defines the awaited presentation of services given,
which is part of standard conditions, on the basis of performance indicators. Application availability and event
time are only some examples of SLA. As the result of a gap of SLA execution guidelines, there is a service of
paid customer fines (Singh et al., 2016) The SLA performance indicator is not very strong, which means that in
the event of a minor breach, there will be no compensation for the breach of the SLA.

6. Solutions towards solving cloud computing ethical issues


As a result of privacy issues surrounding data storage, ethical issues have arisen from the computer. Different
systems have been received to secure client data and information on cloud workers. Examination directed shows that
cloud suppliers encode the information put away on their workers to guarantee security, uprightness, and secrecy.
Besides, the studies show that encryption is the most common solution for data encryption. Encryption uses the key
to encrypt data into ciphertext, and people who do not have access to the key cannot understand the text. Therefore,
even if the attacker was able to steal data from the cloud server, he may not be able to understand encrypted data.
The study recommends the use of cloud tracking (CTB) and cloud protection systems to protect the cloud
environment in preventing service attacks. CTB is used to use data marketing algorithms to specify and identify attack
sources. CTB is applied to the edge of the router and identifies system vulnerabilities by filtering data packets that
enter and leave the network. If it is determined that an attack is occurring somewhere, a warning will be sent to the
administrator to prevent the computer from accessing cloud services (S Dove et al., 2017).
Cloud computing vendors can verify their data structures and information using biometric highlights for
representatives. The biometric structures as discussed in use the predominance of the human novel, for example, the
faces of the accents, the fingerprints, the vocal cords, and the iris test. In this way, only authorized customers are
allowed to access certain information at limited times, which is more productive than the use of personal code. In
addition, double matrix entities having records of who receives the information, which means in the event that the
information entered is retaliated for assistance, the organization will easily identify who accessed or destroyed the
information.
Moreover, a study noticed that it is the duty of cloud clients to guarantee that virtual machines are utilized to
accomplish cloud executives. One of the approaches to ensure with virtual machines is to utilize antivirus and firewall
to shield structures from customary assaults, for instance, diseases and worms. have shown that end customers can
also use disruptive environment frameworks to monitor overall traffic through a cloud network, log records, and
customer practices to determine if clients are neglecting customer routes. Any client found to be abusing the security
arrangements or authorized use is classified as spam and is prevented from accessing cloud management.

7. Research gap
There are major breaches of Amazon Cloud Services. They have used various methods of attack (signature
inscription and site inscription) to test programs that are considered "secure". Based on research results, Amazon has
verified privacy risks and acted quickly. Amazon Web Services (AWS) provides its customers with cloud computing
and hosting services, as well as services such as Twitter, Cloud computing can be a major future computer paradigm.
The concept of processing and storing software and data on less expensive infrastructure is becoming more popular.
Today, research results prove that the security of these services has dropped to a promising level. Clouds for business
users - they can lease server capacity and storage for a very short period of time. For example, by issuing invoices for
service-based services, customers can save on the cost of purchasing software and hardware non-compliance with
legal requirements. However, "real" attacks are not uncommon in the eyes of the public. "By launching an attack on
different XML signature packages, we have succeeded in getting customers of all the cloud management authorities.
This allows creating a new section in the individual cloud, from deleting and adding the picture.
Investigators are suspicious that due to inconsistencies in performance and security due to standards
associated with web services, many cloud products are at risk of being attacked by signature packages. Moreover,
researchers found spaces in the Amazon web service, cross-site scripting attack. This has alarming results where
researchers see common communications as potentially dangerous, i.e., cyber-response, and Amazon's cloud-based
vulnerability. According to industry statistics, the gain of European cloud services will more than double over the next
five years. Therefore, we need to understand the security risks of using the computing of clouds. This is very important
and should be avoided forever. The industry has taken immediate action: in line with our recommendations, Amazon
and Eucalyptus have confirmed security violations and are addressing them promptly.

1436
Mirza Mohammed Akram Baig

8. Conclusion
The utmost sanctuary stresses by the cloud computation model are the main form of asset sharing. Progress
in cloud computing transforms the information technology horizon and eventually makes data computing a reality.
However, this gives the research community a wide range of advantages, but also numerous challenges in this area,
such as automated placement of resources, energy management, and information security. Many other things still have
to be addressed. Opportunities for a pioneering contribution are ample in this field and will add substantial
advancement to the industry. In this article, we gave a summary of cloud computing and offered an overview of
cutting-edge research and possible problems that the research community will have to look into it. Cloud computing
is only at an early level in R&D, and We hope that our paper will improve awareness of cloud computing and the
various research concerns, thereby enhancing further research in this area.
Cloud computing marks the beginning of another era in the field of information and innovation as it carries
a global vision for development that can change the way registration is completed. Clients are currently learning about
this innovation and the transition from a standard subscription to a cloud computer will happen continuously. Included
in this innovation, engineers who have original ideas about online providers will not currently spend large sums of
money on building their product and equipment infrastructure but can instead embark on successful service
management. For cloud providers, profits are gained in the scale economy with high productivity as the customer base
grows and the technology organization's ability to replicate between a large customer base. Contrary to many of the
benefits associated with distributed computers, there is a definite difficulty as well. These challenges include security,
security, and reliability of the information, inconsistencies in administrative access, interoperability issues due to the
combination of amazing incomprehensible systems in various professional co-ops, challenges in testing and deploying
computer dissemination, significant data transmission costs, and bugs in large distributed structures. The clever,
productive, and highly effective arrangements designed to overcome the difficulties associated with computer
distribution are enrolled in this report after thorough and thorough research of related writing. Computing that has
been distributed as a new function is in the early stages of its development and there is still a lot that can be admitted
that cannot be found in a new work going on in this way.

References
1. Abdel-Basset, M., Mohamed, M., & Chang, V. (2021). A framework for evaluating cloud computing
services. Retrieved 28 January 2021, from https://doi.org/10.1016/j.future.2018.03.014
2. Abed, Y., & Chavan, M. (2019). The challenges of institutional distance: Data privacy issues in cloud
computing. Science, Technology and Society, 24(1), 161-181.
https://doi.org/10.1177%2F0971721818806088
3. C.Chou, D. (2015). Cloud computing risk and audit issues.
https://doi.org/https://doi.org/10.1016/j.csi.2015.06.005
4. Ethical issues in cloud computing. Collegenote.pythonanywhere.com. (2021). Retrieved 28 January 2021,
from https://collegenote.pythonanywhere.com/curriculum/cloud-computing-csit/78/409/.
5. Faragardi, H. (2017). Mdpi.com. Retrieved 28 January 2021, from https://www.mdpi.com/2504-
3900/1/3/166/pdf#:~:text=There%20are%20multiple%20technological%20criteria,on%20ethics%20in%20t
he%20Cloud.
6. Faragardi, H. R. (2017). Ethical considerations in cloud computing systems. In Multidisciplinary Digital
Publishing Institute Proceedings (Vol. 1, No. 3, p. 166). https://doi.org/10.3390/IS4SI-2017-04016
7. Gazzar, R., Hustad, E., & H.Olsen, D. (2016). Understanding cloud computing adoption issues: A Delphi
study approach. https://doi.org/https://doi.org/10.1016/j.jss.2016.04.061
8. Ghorbel, A., Ghorbel, M., & Jmaiel, M. (2017). Privacy in cloud computing environments: a survey and
research challenges. The Journal of Supercomputing, 73(6), 2763-2800. https://doi.org/10.1007/s11227-016-
1953-y
9. Hussein, N., & Khalid, A. (2016). Tarjomefa.com. Retrieved 28 January 2021, from
https://tarjomefa.com/wp-content/uploads/2018/11/9355-English-TarjomeFa.pdf.
10. Inam ul Haq, M. (2018). Diva-portal.org. Retrieved 28 January 2021, from https://www.diva-
portal.org/smash/get/diva2:1309139/FULLTEXT01.pdf.
11. Januzaj, Y., Ajdari, J., & Selimi, B. (2021). DBMS as a Cloud service: Advantages and Disadvantages.
Retrieved 28 January 2021, from https://doi.org/10.1016/j.sbspro.2015.06.412
12. Kadhim, Q., & Yusof, R. (2018). ShieldSquare Captcha. Iopscience.iop.org. Retrieved 28 January 2021,
from https://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012006/pdf.
13. Kshetri, N. (2021). Core.ac.uk. Retrieved 28 January 2021, from
https://core.ac.uk/download/pdf/345078779.pdf.

1437
Cloud Computing Ethical Issues: A Review Paper To Investigate And Provide Suggestions For Solving
Data Privacy Issues Of Cloud Computing
14. Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing.
https://doi.org/https://doi.org/10.1016/j.jnca.2015.11.015
15. Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., & Ullah, A. (2017). Cloud computing
environment and security challenges: A review. International Journal of Advanced Computer Science and
Applications, 8(10), 183-195.
https://www.researchgate.net/profile/Arif_Ulah/publication/320802850_Cloud_Computing_Environment_a
nd_Security_Challenges_A_Review/links/5aa00bc0a6fdcc22e2cc4910/Cloud-Computing-Environment-
and-Security-Challenges-A-Review.pdf
16. N.Birje, M., S. Challagidad, P., Goudar, R., & T. Tapale, M. (2017). Cloud computing review: concepts,
technology, challenges and security. https://doi.org/https://doi.org/10.1504/IJCC.2017.083905
17. Radwan, T., Azer, M., & Abdelbaki, N. (2017). Cloud computing security: challenges and future
trends. International Journal Of Computer Applications In Technology, 55(2), 158.
https://doi.org/10.1504/ijcat.2017.082865
18. S Dove, E., Joly, Y., & Tassé, A. (2017). Genomic cloud computing: legal and ethical points to consider.
https://doi.org/https://doi.org/10.1038/ejhg.2014.196
19. Singh, S., Jeong, Y., & Park, J. (2016). A survey on cloud computing security: Issues, threats, and
solutions. Journal Of Network And Computer Applications, 75, 200-222.
https://doi.org/10.1016/j.jnca.2016.09.002
20. Yang, C., Huang, Q., Li, Z., Liu, K., & Hu, F. (2017). Big Data and cloud computing: innovation
opportunities and challenges. International Journal of Digital Earth, 10(1), 13-53.
https://doi.org/10.1080/17538947.2016.1239771

1438

You might also like