General cloud security

In [84] Brodkin outlines seven security risks users need to consider in Cloud computing;
1.
Privileged user access: offloading sensitive data to the cloud would mean the loss of direct physical, logical and personnel control over the data.
2.
Regulatory compliance: the cloud service providers should be willing to undergo external audits and security certifications.
3.
Data location: the exact physical location of user’s data is not transparent, which may lead to confusion on specific jurisdictions and commitments on local privacy requirements.
4.
Data segregation: since cloud data is usually stored in a shared space, it is important each user’s data is separated from others with efficient encryption schemes.
5.
Recovery: it is imperative that cloud providers provide proper recovery mechanisms for data and services in case of technological failure or other disaster.
6.
Investigative support: since logging and data for multiple customers may be co-located, inappropriate or illegal activity should they occur may be very hard to investigate.
7.
Long-term viability: assurance that users data would be safe and accessible even if the cloud company itself goes out of business.