Keywords

1 Introduction

In the last two decades, we have witnessed the exponential growth of internet and the emergence of an ever-connected and intertwined world. This has paved the road for the fourth industrial revolution encompassing the cyber-physical era. In such a world, organizations have no choice but to become more agile in order to cater the growing clients’ demands. Two decades ago and before the emergence of smart phones, our connectivity to the world through the internet was relatively limited. We communicated with friends primarily via telephone and emails. We worked in physical offices and communicated directly with corporate administration and the physical resources. Fast forward to the present day, it is evident that communication makes heavy use of smart phones and social media platforms. The concept of the office has undergone substantial transformation to the point at which we are able to access resources from anywhere without being physically in the office.

The concept of cloud computing is not a new concept. The creation of ARPANET project in 1969, was the first step toward building cloud computing. The ARPANET (Advanced Research Project Agency Network) project was designing and implementing a network through which different kind of computers connect and communicate with each other within cloud known also as Internet. As Internet bandwidth and communication speed grew, more computers were able to connect to each other over a wide area network. Moreover, the advancement of virtualization technologies allowed computers to share their resources more effectively and efficiently. The development of grid computing made it possible for advanced parallel computing and CPU resource sharing. In addition, Web 2.0 technology provided a two-way communication system and paved the way for the rise of social media networks (SMNs). All of this has helped to shape cloud computing technology as we know today. Companies such as Salesforce.com and Amazon Web Services (AWS) were among the first companies to offer commercial cloud services. AWS provides services such as storage and computation via websites allowing a diverse set of devices access cloud resources by the means of a thin client application. Major IT companies such as IBM, Microsoft, Google and VMware among others offer cloud services.

Cloud Computing enables organizations to expand or contract on demand and provide services at reduced cost. By migrating to such solutions, organizations can reduce capital and operational expenditures and at the same time be more efficient. Although cloud solutions provide many advantages there remain serious challenges ahead. As per a survey done by International Data Corporation (IDC) in 2009, security was found to be the main concern that organizations have in adopting a cloud solution [1]. In this paper, we will investigate various privacy and security challenges organizations face in adopting cloud solutions in quest for developing a robust security and privacy framework. Specifically, we intend to identify the main differentiators of a cloud and a traditional security through the lens of Privacy-by-Design (PbD) framework.

Our main research questions are as follow: (a) are there any differences between privacy and security issues in a cloud environment and a non-cloud environment? and (b) how PbD framework can improve the design and implementation of the next generation cloud.

To answer the questions outlined above, we provide an extensive literature review to identify and map the work done by other researchers and practitioners in the field. The output of this research will help organizations focus on the relevant security and privacy concerns when adopting a new cloud solution.

1.1 Research Methodology Overview

The content and data sources of this study come from four main sources as outlined below: (a) peer reviewed articles and literature, (b) reports from industry research organizations such as Gartner, IDC, CSA, SANS, NIST and others, and (c) survey and studies conducted by consulting firms such and Deloitte, EY, PWC among others.

For the sake of content analysis we used NVIVO software (version 11.0). NVIVO provides features such as matrix coding that help researchers to code text documents for further analysis. In total, we’ve studied 121 documents from the above list in which 84 relevant literature and articles were chosen for further analysis.

2 Cloud Computing Market Overview

Although the concept of cloud computing has been around for some time, mainstream adoption of cloud services did not start until late 1990 and early 2000. Cloud computing first appeared on the Gartner hype cycle in 2008. Hype cycle is a well-known industry graph which presents emerging technologies and estimates time period required for such technologies to mature and become main stream. In 2008, Gartner estimated that it would take 2 to 5 years for cloud computing to be adopted as a mainstream technology. To identify the adoption state of cloud computing, we have tracked the movement of cloud computing on the Gartner hype cycle from the year 2008 to 2014. The graph below shows the way in which cloud computing moved on the hype cycle during these years. It can be seen from the graph that cloud computing has passed the peak of inflated expectation and it is on its way to become a mature technology. However, even in 2014, Gartner expected that the time required for mainstream adoption of cloud computing would be 2 to 5 years. From Gartner’s estimation, cloud computing is still not a mature technology and will continue to evolve in the coming years (Fig. 1).

Fig. 1.
figure 1

State of cloud computing on Gartner hype cycle from 2008–2014

Cloud computing can impact various sections of the IT ecosystem from infrastructure to platforms to services. Moreover, cloud computing can impact various organizations and end user based on the type of applications and services they use. When evaluating the market value of cloud computing it is important to understand what aspects of cloud computing are being evaluated. For example, is the evaluation looking at services offered via Software-as-a-Service (SaaS) or Platform-as-a-Service (PaaS) and/or in combination of Infrastructure-as-a-Service (IaaS)? Or is it also taking into consideration other factors such as cloud advertising cost and the cost of cloud management? As per Gartner the public cloud services is forecasted to reach $204 Billion in 2016 [2]. Beside SaaS, PaaS, and IaaS, Gartner also includes among others, cloud business process services, cloud management and security as a service. For example cloud management and security services has shown an increase of 24% from 5.0 billion dollars in year 2015 to 6.2 billion in 2016 [3].

The second source from which market value estimates were collected was IDC. IDC estimated the public IT cloud services at $57.8 billion in 2015 (IDC 2015). If we add up the Gartner market value for SaaS, PaaS, and IaaS for 2015 we get $51.4 billion which is close to IDC’s evaluation of $57.8 billion. Hence, it can be concluded that IDC is only including three main cloud services i.e. SaaS, PaaS, and IaaS when estimating the cloud market value. IDC also predicts that the cloud spending will grow to $112 billion in 2019 [4]. Cisco Global Cloud Index (CGI) provides also valuable forecasting data for the future market distribution of cloud services categorized by service models and deployment modes. This index attempts to forecast and map the global cloud-based IP traffic. Table 1 below summarizes CGI’s predictions for 2019 [5].

Table 1. Cisco Global Cloud Index 2019

By looking at the market size estimation and the future prediction of cloud, it is clear that cloud computing is not only here to stay, but will also shape the future of the IT world. Many organizations and businesses have started to embrace cloud solutions. As per a survey done by KPMG in 2011, 81% of businesses were in early or advance stages of experimentation or full implementation of cloud solutions [6]. Among the companies which are adopting cloud solutions, small and medium enterprises (SMEs) are the ones which are realizing the most benefit [33]. This is primarily because smaller companies can adopt cloud solutions faster with fewer hurdles. AMI Partners predicted that SMEs will spend up to $100 billion on cloud computing by 2014 [7].

3 Data Security and Privacy Challenges

Online cybercrime activities are not only increasing day by day, but they are also becoming more sophisticated and targeted. Cyber war does not recognize any borders and cyber criminals are targeting organizations across the globe because of various financial, political, or even personal reasons. In a data breach study conducted by IBM and the Ponemon Institute in 2016, it was estimated that on average the cost of a data breach is estimated $4 USD and that the cost of each stolen record has increased from $154 in 2015 to $158 in 2016 [8].

To demonstrate the financial, privacy and social impact of a data breach, we have provided some examples of the most famous breaches in the recent years. Examples below are just some of many incidents which occur on a daily basis across the world. The aftermath of a data breach can sometime affect individuals and organizations for many years. Organizations affected by data breach lose their trust among their clients which will eventually result in loss of business (Table 2).

Table 2. Some examples of recent data breaches

Given that many organizations have started to shift their services to cloud, cloud environments have become an attractive target for hackers. Hence, organizations should be extra cautious of the security and privacy measures when moving their services to the cloud.

3.1 Cloud Security and Privacy

As discussed above, the use of cloud computing is on the rise. Organizations have to face the fact that their employees will be using cloud-based services regardless of organizations’ policies [9] As per cloud survey done by IDC in 2015, more than 43% of organizations expect that within five years the majority of their IT services will be delivered through cloud. The same report predicts that by 2018 half of the IT spending will be cloud based and that by then industry cloud creation will be seen as a top market entry strategy for IT providers [4]. In addition, a survey conducted by IDC in 2009 indicates that security is among of the main challenges facing the adoption of cloud [10]. Similar concern was echoed by other surveys conducted by Deloitte, Forrester, EY, and KPMG. For example a survey conducted by EY in 2013 shows that 43% of organizations indicate that their information security budgets are on the rise [11].

Within security, issues around trust and privacy are becoming CIOs top concerns. A survey by Deloitte in 2013 revealed that 78% of IT managers considered that the lack of trust in security was the biggest barrier to the adoption of cloud technologies [12]. The same survey showed that insufficient data security and risk of data availability, open compliance and legal issues, and the risk of losing governance or control over data [12] to be the main challenges of cloud adoption. A KPMG survey in 2014 revealed that 53% of organizations believe that data loss and privacy risk are the main challenges of doing business in cloud [13]. The same survey showed that in 2014 security and data privacy was identified to be of greater concern than cost when adopting a cloud solution [13]. Another research survey by Forrester in 2013 indicated that 50% of businesses in Europe and North America view security as the number one reason for not adopting a cloud solution [11]. Similarly, EY’s global information security survey in 2013 indicates that 25% of organization admit that cloud computing has changed their risk exposure in the last 12 months [11].

3.2 Literature Review and Related Work

A clear majority of reviewed research articles were associated with to the following categories.

  1. 1.

    Threats and vulnerabilities in cloud

  2. 2.

    Issues around privacy, compliance, audit, legal, and trust in cloud

  3. 3.

    Challenges organizations face in adopting a cloud solution

  4. 4.

    Solutions and recommendations for cloud security concerns and issues

A list of all keywords and phrases associated with our literature review has been generated, but due to the page limitation we excluded the list from our appendix.

We could not find any literature during the time of this study (2015–2016) that considered cloud computing design and implementation from the perspectives of the PbD framework. In fact those articles dealing with cloud security have considered privacy as subset of overall cloud security but not as its own specific domain.

4 Data Analysis and Results

In this section we will present the results of our content analysis. In total, we have reviewed over 121 academic and industry reports. For the purpose of content analysis, 84 of the most relevant literature were selected and analyzed by using NVIVO software package. NVIVO software was very helpful in performing thematic analysis and data comparison. Out of 84 papers chosen for this study, 51 focused on cloud security issues, 13 focused on cloud adoption issues, 17 articles focused on cloud security business adoption issues (including the e-commerce), and 3 papers were focused on privacy issues.

4.1 Methodology in Action

In order to perform content analysis, it was crucial to identify the themes which were relevant to this research study. To do so, we needed a well-defined taxonomy presenting a complete anatomy of security issues in cloud computing. The development of such taxonomy was very paramount to this study as it provided a common framework through which we could do the content analysis. Hence, we have used the open coding technique in the first round of literature review for the purpose of building such taxonomy.

Using the keywords generated through relevant industry and academic research studies, initially we ended up with more than 20 categories related to cloud security issues. However, through continuous revision of categories and literature review, we managed to merge and amalgamate relevant categories. As such, we ended up with 11 categories which could not be reduced any further. As per process outlined by [14], we had to continuously sanity check our categories to ensure they addressed this study’s security and privacy questions. The categories identified, presents a holistic taxonomy of the cloud security issues based on the reviewed literature. The list of this taxonomy is outlined in table below. The coding agenda table below which was generated using NVIVO tool outlines how coding was done based on each category defined (Table 3).

Table 3. Classification of cloud security domains

4.2 Comparing Traditional and Cloud Security

By taking a closer look at the cloud security taxonomy derived from literature, we can see that nine out of eleven cloud security issues identified are in fact issues which are also addressed by traditional security. The security issues that were uniquely associated to cloud were mainly associated with virtualization, web interface issues and data storage; particularly the issues related to storage locality. This observation alone indicates that cloud security and traditional security have a lot in common.

Although the literature points to the similarities of cloud and traditional security, there are still some major differences. Based on the literature review with argue that due to the complexity of cloud architecture and lack of visibility, traditional security solution cannot address today’s cloud security challenges. So although most of the security issues are the same, as mentioned by Chen and Zhao [18] the traditional security mechanisms are no longer suitable for applications and data in cloud. For example, performing some tasks such as forensic investigation in cloud will become much more difficult as investigators might not be able to access system hardware physically [17]. Such differences introduce new challenges and calls for new solutions specific to the cloud.

Another point to note is the differences that exist around the privacy and trust issues in traditional and cloud environments. In traditional computing, since the data resides on clients’ premise, there are controls built around securing the data. However, it is assumed that the client is to be trusted with their data as they are the custodian and guardian of that data. In cloud environment however, clients’ data is hosted at a third party Cloud Service Provider (CSP). This shift of data storage introduces new challenges around privacy and trust.

The lack of standards and legal issues are two other challenges which should be looked at from a different angle when operating in cloud environments. As discussed above, these issues have much wider impact and expose data to a higher level of risks in cloud environments as opposed to traditional environments.

5 Privacy Concerns in the Cloud

According to [24], privacy is the ability of the persons to decide when, how and to what extent information about themselves is communicated to other people. There are four states of being private: (1) Solitude – physical separation from the group; (2) Intimacy – participation in a small unit that achieves corporate solitude (3) Anonymity – freedom from surveillance (4) Reserve – creation of psychological barrier that protects the individual from unwanted intrusion [24].

As discussed above, the main topics discussed in literature were mainly associated with security threats compromising customers’ data. The risk of private data violation is much higher for data stored on the cloud. Cloud providers can deliberately or unintentionally misuse or disclosure sensitive user information that resides within a provider’s premises. There are different aspects of the violation of data privacy. For example, the storage location may be a serious data privacy issue. When users start using cloud services, their data is located in cloud. While some providers explicitly specify where the data are located, others do not provide such information. In this case the data can be moved from location to location or even from country to country without a user’s knowledge. Because legal regulations may be different in other countries, other privacy laws may apply that users unknowingly have to comply with. In most cases, users do not have full control over their sensitive data once placed in the cloud. According to [25, 26], there are many legal concerns that companies should be worried about. They relate to the privacy and security of the data as well control of the data ownership. Many details depend on the service agreements which still aren’t nearly robust enough compared to SLAs in traditional manufacturing industries. Additional issues arise from cloud datacenters being located in different geographical locations which can result in confusion over which law has to be applied. Then there are concerns related to cloud provider declaring bankruptcy – it is not clear what will happen to the data belonging to the companies.

Bowen [25] first looks at data privacy and security issues. There are multiple laws that protect personal data enacted in USA and EU that cloud providers have to comply with. Some laws force cloud providers to notify their users when data breach of personal unencrypted information has occurred. The notable laws are Patriot Act in USA and European Union Data Privacy Directive (EUDPD). The US Patriot Act basically allows government to intercept any electronic information as well as compel any company to disclose such information to the government. The only requirement is government’s certification that this information is relevant to the ongoing investigation. This fact is usually used to caution companies about storing their data in clouds located in USA and in promotion of European providers [27]. However, most European countries have analogous anti-terrorism laws as well. There are multiple Mutual Legal Assistance Treaties (MLATs) that require participants to share third-party information upon the formal request. This basically makes actual geographic location of servers storing the data in the cloud immaterial [26, 27]. EUDPD’s key feature is its extraterritorial effect – any data from EU can only be sent to countries with compatible data protections.

Next are the jurisdictional issues related to virtualization and data location in which users’ data can be stored in multiple countries while in the cloud. One problem is that once EUPDP law is applied to the data it becomes attached to it so from that point it can be sent only to compatible countries as discussed before. This may result in the conflict if initial contract with the cloud provider stipulated that it is done under, say, USA laws which can contradict European Union Directive. In addition, different countries will have different laws regarding government access to the data. As mentioned above the US Patriot Act allows government to access any data it wants. This may not be something that Amazon’s customer residing in Europe wants to be exposed to.

A special problem might be with data retention: which policy is in place? how is it implemented? and how long data is retained in the cloud? After the retention period, a user’s data have to be destroyed. The cloud provides high data availability by keeping a few copies of the data, sometimes at different locations. The issue here is how to make sure that all copies are destroyed correctly. Cloud users should know and act accordingly, and data privacy regulatory requirements effective data managing policies should be applied to the cloud. While auditing and monitoring cloud service providers it is essential to guarantee that business privacy requirements are not violated, and that sensitive user personal information is not leaked or misused. It is also important to be proactive rather than reactive when it comes to data privacy. To do so we offer a new approach in monitoring and assessing cloud privacy by implementing PbD as a control mechanism in protecting users’ private data.

5.1 Privacy by Design

The privacy by design (PbD) framework was originally developed by Cavoukian [28]. This framework contains seven fundamental principles such as: Proactive not Reactive; Privacy as the Default Setting; Full Functionality; End-to-End Security; Visibility; Transparency; and User Privacy and Privacy Embedded into Design. The latter in particular is an important part of this study. The PbD framework offers an approach that is characterized by a proactive privacy measures rather than a reactive ones, it assures that all stakeholders (cloud stakeholder in this case) whether the business practice or technology involved, operate according to the stated promises and objectives and subject to independent verification [28]. Privacy by Design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults. As such we offer a cloud control matrix integrated with PbD to ensure clients’ privacy. Figure 2 below was generated based on the eleven security domains discussed above. It integrates PbD as a control mechanism as integral part of cloud design and implementation.

Fig. 2.
figure 2

Cloud security control matrix integrated with PbD

In other words PbD offers a dynamic approach in which the legacy framework of security-privacy-usability triangle [29, 30] is modified so that the user-centric design principle of PbD is fulfilled.

As shown in Fig. 3, this integration highlights the vital links between privacy, security and usability in building organization’s credibility and trust [31]. The updated model takes into account the dynamic nature of privacy. In addition, it addresses the need for flexibility and adaptability in the process. This paves the way for a richer and smoother user experience.

Fig. 3.
figure 3

Privacy, security, usability, and adaptability

6 Conclusion

In this study we have focused on identifying differences of cloud and traditional security. Although cloud computing offers many advantages over conventional computing such as reduced cost, elasticity, rapid growth potential, among others, it has several challenges among which security and privacy concerns were the main focus of this study.

Our analysis revealed that cloud computing introduces new challenges on issues around privacy, trust, legal, virtualization and data interoperability. Organizations need to be aware of these new challenges as they move their services to the cloud. The cloud security and privacy taxonomy developed in this paper offers a framework in which the principles of privacy as outlined in PbD has been integrated into the deployment of cloud. Depending on the cloud model being used, organizations can use the matrix offered in this study to ensure whether or not the cloud solution they want to adapt addresses the main concerns associated with cloud privacy and security.

With the current speed of cloud adoption, organizations need to be more vigilant with their data when outsourced to cloud. Organizations should view cloud security and privacy through new lenses and use new frameworks and tools to assess CSPs security.