SlideShare a Scribd company logo
1 of 16
1.   A cloud database is a database that typically runs on
     a cloud computing platform, such as Amazon EC2
     and Rackspace.
2.   The cloud database was conceived for the purpose
     of online data management by using a variety of
     distributed servers .
3.   There are two common deployment models: users
     can run databases on the cloud independently, using
     a virtual machine image, or they can purchase
     access to a database service, maintained by a cloud
     database provider.
1. The cloud database system makes information
   sharing simple and convenient.
2. Easy access to files and data is what a cloud database
   actually emphasizes. If freak accidents happen, there is no
   reason for you to worry since all pieces of information are
   safely kept.
3. A cloud database is far cheaper than that of maintaining an
   actual server, wherein a lot of other applications are
   necessary.
4. Being a virtual data storage location, you get every single
   opportunity of manipulating data wherever you may be.
 Identify Assets
  • Which assets are we trying to protect?
  • What properties of these assets must be maintained?
 Identify Threats
  • What attacks can be mounted?
  • What other threats are there (natural disasters, etc.)?
 Identify Countermeasures
  • How can we counter those attacks?
 Appropriate for Organization-Independent Analysis
  • We have no organizational context or policies
 Failures in Provider Security
Attacks by Other Customers
Availability and Reliability Issues
Legal and Regulatory Issue
 Explanation
 • Provider controls servers, network, etc.
 • Customer must trust provider’s security
 • Failures may violate CIA principles
 Countermeasures
 • Verify and monitor provider’s security
 Notes
 • Outside verification may suffice
 • For SMB, provider security may exceed customer
   security
Threats
• Provider resources shared with untrusted parties
• CPU, storage, network
• Customer data and applications must be separated
• Failures will violate CIA principles
 Countermeasures
• Hypervisors for compute separation
• MPLS, VPNs, VLANs, firewalls for network separation
• Cryptography (strong)
• Application-layer separation (less strong)
 Threats
• Clouds may be less available than in-house IT
• Complexity increases chance of failure
• Clouds are prominent attack targets
• Internet reliability is spotty
• Shared resources may provide attack vectors
• BUT cloud providers focus on availability
 Countermeasures
• Evaluate provider measures to ensure availability
• Monitor availability carefully
• Plan for downtime
• Use public clouds for less essential applications
1. Middleware muddles
2. Authentication
3. Regulatory compliance issues in the cloud
1. Middleware is the technology that facilitates integration of
   components in a distributed system..
2. It is software that allows elements of applications to
   interoperate across network links, despite differences in
   underlying communications protocols, system architectures,
   other application services.
3. Middleware makes it possible to develop architectural
   patterns that represent innovative design solutions
   for specific system design problems.
4. Managers report that unwanted middleware access to the database
   causes security breaches.
5. To avoid this hassle, security and database administrators must
   stop unauthorized database access from middleware components,
   including the application server, which can be treated as a
   middleware in this scenario..
6. Also, you can cement database security by using trusted/secured
   connections and communications between middleware and the
   database and proven/standardized authentication mechanisms.
1.   Authentication is the process of confirming a user or computer’s
     identity.
2.   The process normally consists of four steps:
     1. The user makes a claim of identity, usually by providing a
     username. For example, I might make this claim by telling a
     database that my username is “mchapple”.
     2. The system challenges the user to prove his or her identity. The
     most common challenge is a request for a password.
     3. The user responds to the challenge by providing the requested
     proof. In this example, I would provide the database with my
     password
     4. The system verifies that the user has provided acceptable proof
     by, for example, checking the password against a local password
     database or using a centralized authentication server
1. Despite these notable anticipated benefits, commercial
   acceptance of cloud databases their growth has been
   somewhat slower than many expected.
2. An important factor behind this apparent reluctance to
   embrace cloud computing is uncertainty regarding
   regulatory compliance issues associated with activities in
   the cloud.
3. There is uncertainty as to the specific regulatory
   requirements applicable to the cloud.
4. In the cloud environment, location matters, especially from a
legal standpoint.
5. Cloud computing contracts should include many data protection
provisions, but cloud computing service providers may not agree to
them.
6. The use of cloud services could sacrifice an entity’s ability to
comply with several laws and regulations and could put sensitive
data at risk.
Security  issues  in cloud   database

More Related Content

What's hot

System models 2 in distributed system
System models 2 in distributed systemSystem models 2 in distributed system
System models 2 in distributed systemishapadhy
 
Distributed computing environment
Distributed computing environmentDistributed computing environment
Distributed computing environmentRavi Bhushan
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to DockerLuong Vo
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage12201375
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)Shreyans Jain
 
Cloud computing
Cloud computingCloud computing
Cloud computingcompherals
 
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3Ji-Woong Choi
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorizationFrank Victory
 
Oracle Cloud Infrastructure.pptx
Oracle Cloud Infrastructure.pptxOracle Cloud Infrastructure.pptx
Oracle Cloud Infrastructure.pptxGarvitNTT
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
Cc unit 1 ppt
Cc unit 1 pptCc unit 1 ppt
Cc unit 1 pptDr VISU P
 
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...Hyperleger Tokyo Meetup
 

What's hot (20)

System models 2 in distributed system
System models 2 in distributed systemSystem models 2 in distributed system
System models 2 in distributed system
 
Introduction to container based virtualization with docker
Introduction to container based virtualization with dockerIntroduction to container based virtualization with docker
Introduction to container based virtualization with docker
 
Distributed computing environment
Distributed computing environmentDistributed computing environment
Distributed computing environment
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3
[오픈소스컨설팅]Docker기초 실습 교육 20181113_v3
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Oracle Cloud Infrastructure.pptx
Oracle Cloud Infrastructure.pptxOracle Cloud Infrastructure.pptx
Oracle Cloud Infrastructure.pptx
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Cc unit 1 ppt
Cc unit 1 pptCc unit 1 ppt
Cc unit 1 ppt
 
Ddbms1
Ddbms1Ddbms1
Ddbms1
 
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 

Similar to Security issues in cloud database

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 

Similar to Security issues in cloud database (20)

Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

More from أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

More from أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Security issues in cloud database

  • 1.
  • 2. 1. A cloud database is a database that typically runs on a cloud computing platform, such as Amazon EC2 and Rackspace. 2. The cloud database was conceived for the purpose of online data management by using a variety of distributed servers . 3. There are two common deployment models: users can run databases on the cloud independently, using a virtual machine image, or they can purchase access to a database service, maintained by a cloud database provider.
  • 3.
  • 4. 1. The cloud database system makes information sharing simple and convenient. 2. Easy access to files and data is what a cloud database actually emphasizes. If freak accidents happen, there is no reason for you to worry since all pieces of information are safely kept. 3. A cloud database is far cheaper than that of maintaining an actual server, wherein a lot of other applications are necessary. 4. Being a virtual data storage location, you get every single opportunity of manipulating data wherever you may be.
  • 5.  Identify Assets • Which assets are we trying to protect? • What properties of these assets must be maintained?  Identify Threats • What attacks can be mounted? • What other threats are there (natural disasters, etc.)?  Identify Countermeasures • How can we counter those attacks?  Appropriate for Organization-Independent Analysis • We have no organizational context or policies
  • 6.  Failures in Provider Security Attacks by Other Customers Availability and Reliability Issues Legal and Regulatory Issue
  • 7.  Explanation • Provider controls servers, network, etc. • Customer must trust provider’s security • Failures may violate CIA principles  Countermeasures • Verify and monitor provider’s security  Notes • Outside verification may suffice • For SMB, provider security may exceed customer security
  • 8. Threats • Provider resources shared with untrusted parties • CPU, storage, network • Customer data and applications must be separated • Failures will violate CIA principles  Countermeasures • Hypervisors for compute separation • MPLS, VPNs, VLANs, firewalls for network separation • Cryptography (strong) • Application-layer separation (less strong)
  • 9.  Threats • Clouds may be less available than in-house IT • Complexity increases chance of failure • Clouds are prominent attack targets • Internet reliability is spotty • Shared resources may provide attack vectors • BUT cloud providers focus on availability  Countermeasures • Evaluate provider measures to ensure availability • Monitor availability carefully • Plan for downtime • Use public clouds for less essential applications
  • 10. 1. Middleware muddles 2. Authentication 3. Regulatory compliance issues in the cloud
  • 11. 1. Middleware is the technology that facilitates integration of components in a distributed system.. 2. It is software that allows elements of applications to interoperate across network links, despite differences in underlying communications protocols, system architectures, other application services. 3. Middleware makes it possible to develop architectural patterns that represent innovative design solutions for specific system design problems.
  • 12. 4. Managers report that unwanted middleware access to the database causes security breaches. 5. To avoid this hassle, security and database administrators must stop unauthorized database access from middleware components, including the application server, which can be treated as a middleware in this scenario.. 6. Also, you can cement database security by using trusted/secured connections and communications between middleware and the database and proven/standardized authentication mechanisms.
  • 13. 1. Authentication is the process of confirming a user or computer’s identity. 2. The process normally consists of four steps: 1. The user makes a claim of identity, usually by providing a username. For example, I might make this claim by telling a database that my username is “mchapple”. 2. The system challenges the user to prove his or her identity. The most common challenge is a request for a password. 3. The user responds to the challenge by providing the requested proof. In this example, I would provide the database with my password 4. The system verifies that the user has provided acceptable proof by, for example, checking the password against a local password database or using a centralized authentication server
  • 14. 1. Despite these notable anticipated benefits, commercial acceptance of cloud databases their growth has been somewhat slower than many expected. 2. An important factor behind this apparent reluctance to embrace cloud computing is uncertainty regarding regulatory compliance issues associated with activities in the cloud. 3. There is uncertainty as to the specific regulatory requirements applicable to the cloud.
  • 15. 4. In the cloud environment, location matters, especially from a legal standpoint. 5. Cloud computing contracts should include many data protection provisions, but cloud computing service providers may not agree to them. 6. The use of cloud services could sacrifice an entity’s ability to comply with several laws and regulations and could put sensitive data at risk.