144

M. Bakro et al.

Relay [14]” due to several reasons (such as load balancing, maintenance, etc.), so

that, confidentiality must be preserved during data transmission, and this change in

location will lead to a change in the set of laws applied in the country of origin

as a result of data get outside of the original country for customer [15], and this is

definitely a threat to the confidentiality of the data within the CSP servers that more

than one client can access at the same time [16]. Thus the sensitive data inside it are

vulnerable to hackers or curious users, and this access happens via the Internet. So,

it should be considered using encrypted channels such as TLS, VPNs, etc. [17].

2.5.2

Integrity

Integrity is to keep the data stored in the CPS completely, to maintain its integrity

against any unauthorized modification or access, and to ensure that it can be displayed

accurately and consistently so that it does not differ from the original data stored from

the beginning. Violations of integrity can lead to unimaginable wrong results (such

as violating published information about the COVID-19 virus, tampering with the

integrity of the data of those infected with it, and the resulting global catastrophe

nowadays) [18]. As we know that the volume of data grows and increases while the

storage capacity of the disks is constant, and this leads to an increase in the number of

drives by the cloud provider, who will transfer the rest of the data to other disks, and,

therefore, there is a possibility of failure and damage of disks or even data loss, so

the increase of disks increases the proportion of disability and problems, but it does

not increase the speed of obtaining information [19]. Therefore, the user must obtain

guarantee from the cloud provider that it is monitoring the integrity and integrity of

the information inside the cloud. Integrity is achieved through the use of the Hashing

“signature”.

2.5.3

Availability

Availability is the user’s ability to successfully and easily access his information and

resources upon request and use it, so that the service provider’s servers are ready and

available when necessary and not closed, without regard to cases of hardware failure,

power outages, and denial of service attacks [20], because any interruption will mean

significant financial losses and many risks. The cloud provider determines availability

and its ability to respond to the request based on the service level agreement SLA

[11]. There are two strategies that the cloud provider uses to secure and improve

availability:

1.

Redundancy so that the cloud provider duplicates data on more than one server

and in different geographic locations.

2.

Hardening is used by Amazon to have the ability to block and filter traffic

according to port and IP address.

The CIA concept has been expanded to include the following: