144
M. Bakro et al.
Relay [14]” due to several reasons (such as load balancing, maintenance, etc.), so
that, confidentiality must be preserved during data transmission, and this change in
location will lead to a change in the set of laws applied in the country of origin
as a result of data get outside of the original country for customer [15], and this is
definitely a threat to the confidentiality of the data within the CSP servers that more
than one client can access at the same time [16]. Thus the sensitive data inside it are
vulnerable to hackers or curious users, and this access happens via the Internet. So,
it should be considered using encrypted channels such as TLS, VPNs, etc. [17].
2.5.2
Integrity
Integrity is to keep the data stored in the CPS completely, to maintain its integrity
against any unauthorized modification or access, and to ensure that it can be displayed
accurately and consistently so that it does not differ from the original data stored from
the beginning. Violations of integrity can lead to unimaginable wrong results (such
as violating published information about the COVID-19 virus, tampering with the
integrity of the data of those infected with it, and the resulting global catastrophe
nowadays) [18]. As we know that the volume of data grows and increases while the
storage capacity of the disks is constant, and this leads to an increase in the number of
drives by the cloud provider, who will transfer the rest of the data to other disks, and,
therefore, there is a possibility of failure and damage of disks or even data loss, so
the increase of disks increases the proportion of disability and problems, but it does
not increase the speed of obtaining information [19]. Therefore, the user must obtain
guarantee from the cloud provider that it is monitoring the integrity and integrity of
the information inside the cloud. Integrity is achieved through the use of the Hashing
“signature”.
2.5.3
Availability
Availability is the user’s ability to successfully and easily access his information and
resources upon request and use it, so that the service provider’s servers are ready and
available when necessary and not closed, without regard to cases of hardware failure,
power outages, and denial of service attacks [20], because any interruption will mean
significant financial losses and many risks. The cloud provider determines availability
and its ability to respond to the request based on the service level agreement SLA
[11]. There are two strategies that the cloud provider uses to secure and improve
availability:
1.
Redundancy so that the cloud provider duplicates data on more than one server
and in different geographic locations.
2.
Hardening is used by Amazon to have the ability to block and filter traffic
according to port and IP address.
The CIA concept has been expanded to include the following: