scholarly journals Third-party induced cyber incidents—much ado about nothing?

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Michel Benaroch

Abstract Growing reliance on third-party services, such as cloud computing, is believed to increase client firms’ exposure to third-party induced cyber incidents. However, we lack empirical research on the prevalence and scale of third-party induced cyber incidents. Moreover, we do not know who pays more of the price for experiencing these incidents—the client firm and/or the third-party provider firm. We study these questions using a sample of 1397 cyber incidents in public firms between 2000 and 2020 of which 246 are third-party induced incidents. Our findings offer several novel insights. Third-party induced cyber incidents are not growing in prevalence any faster than other incidents, but they do compromise greater volumes of confidential data per incident. As to the price paid for third-party induced incidents, the picture is more nuanced. Client (first-party) firms suffer drops in equity returns that are comparable to those for homegrown incidents, while small third-party provider firms suffer significantly larger drops in equity returns and large third-party provider firms do not suffer a discernible drop in equity returns. We discuss implications of these findings for client firms and service providers.

2018 ◽  
Vol 7 (3.28) ◽  
pp. 102
Author(s):  
Siti Dhalila Mohd Satar ◽  
Masnida Hussin ◽  
Zurina Mohd Hanapi ◽  
Mohamad Afendee Mohamed

In the cloud computing, security is one of the biggest obstacles that hamper the widespread adoption of cloud. Several business and research organization are reluctant in completely trusting the cloud computing to shift digital assets to the third-party service providers. Hence, the objective of this is to present the security issues related to data privacy and integrity in cloud computing. 20 selected papers have been reviewed to be analysing the technique used in providing data privacy and integrity. The issues or problems related to the technique are presented. 


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


The tradition of moving applications, data to be consumed by the applications and the data generated by the applications is increasing and the increase is due to the advantages of cloud computing. The advantages of cloud computing are catered to the application owners, application consumers and at the same time to the cloud datacentre owners or the cloud service providers also. Since IT tasks are vital for business progression, it for the most part incorporates repetitive or reinforcement segments and framework for power supply, data correspondences associations, natural controls and different security gadgets. An extensive data centre is a mechanical scale task utilizing as much power as a community. The primary advantage of pushing the applications on the cloud-based data centres are low infrastructure maintenance with significant cost reduction for the application owners and the high profitability for the data centre cloud service providers. During the application migration to the cloud data centres, the data and few components of the application become exposed to certain users. Also, the applications, which are hosted on the cloud data centres must comply with the certain standards for being accepted by various application consumers. In order to achieve the standard certifications, the applications and the data must be audited by various auditing companies. Few of the cases, the auditors are hired by the data centre owners and few of times, the auditors are engaged by application consumers. Nonetheless, in both situations, the auditors are third party and the risk of exposing business logics in the applications and the data always persists. Nevertheless, the auditor being a third-party user, the data exposure is a high risk. Also, in a data centre environment, it is highly difficult to ensure isolation of the data from different auditors, who may not be have the right to audit the data. Significant number of researches have attempted to provide a generic solution to this problem. However, the solutions are highly criticized by the research community for making generic assumptions during the permission verification process. Henceforth, this work produces a novel machine learning based algorithm to assign or grant audit access permissions to specific auditors in a random situation without other approvals based on the characteristics of the virtual machine, in which the application and the data is deployed, and the auditing user entity. The results of the proposed algorithm are highly satisfactory and demonstrates nearly 99% accuracy on data characteristics analysis, nearly 98% accuracy on user characteristics analysis and 100% accuracy on secure auditor selection process


2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Sinta Dewi

<p align="center"><strong><em>Abstract</em></strong></p><p><em>The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or  individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.</em></p><p><strong><em>Keywords</em></strong><em>: protection, privacy, personal data, cloud computing.</em></p><p align="center"><strong>Abstrak</strong></p><p>Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi <em>cloud computing</em>. <em>Cloud computing </em>adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. <em>Cloud computing </em>membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, <em>cloud computing </em>telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.</p><p><strong>Kata kunci</strong>: perlindungan, privasi, data pribadi, <em>cloud computing</em>.</p>


2018 ◽  
Vol 7 (2.7) ◽  
pp. 807
Author(s):  
M Trinath Basu ◽  
Dr JKR Sastry

Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is undertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system. In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities.  


Author(s):  
R.Santha Maria Rani ◽  
Dr.Lata Ragha

Cloud computing provides elastic computing and storage resource to users. Because of the characteristic the data is not under user’s control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources. To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. Therefore, to maintain the integrity of cloud data, many auditing schemes have been proposed. In this paper, analysis of various existing auditing schemes with their consequences is discussed.  Keywords: — Third Party Auditor (TPA), Cloud Service Provider (CSP), Merkle-Hash Tree (MHT), Provable data Possession (PDP), Dynamic Hash Table (DHT).


Author(s):  
Thierry Sauvage

Our work discusses the results of a survey among French logistics service providers. In a highly competitive context characterized by “time compression”, technological effort becomes a key variable and a means of differentiation between third‐party logistics providers. The success of logistics outsourcing relationships is entrenched in the third‐party's technological ability to improve the supply chain reactivity.


Sign in / Sign up

Export Citation Format

Share Document