ArticlePDF Available

Abstract

An object of the study is the potential risk of hosting the server outside of the country. The goal of this article is to define the risks and opportunities associated with the rapid development of cloud technologies and their penetration into almost all technological areas. The modern-day economy is evolving under the influence of information and communication technology. People are witnessing huge success in every sphere of management and economy with the use of Cloud Computing, Big Data, and Cyberphysical Systems. Modern life and work are shaped by cloud computing. It has become a part of the daily lives of people. Companies of all sizes have now turned to cloud computing for their business needs. Currently, everyone is talking about the cloud solution as a way to save money and increase the efficiency of resources. However, nothing is perfect, and this is no exception for cloud computing. The use of this technology is undoubtedly beneficial, however, there are some risks and concerns that should not be overlooked. The purpose of this article is to raise awareness about the ongoing war between Ukraine and Russia, and how it impacts cloud technology when hosted outside of the country. Furthermore, this article will also look at how this war affects the IT industry if organizations depend on their operations and get support from outside countries, including hardware, software, network infrastructure, data centres, mobile device management, cloud computing, cyber security etc. Although cloud computing is developing rapidly, both conceptually and practically, legal, contractual, economic, service quality, interoperability, security, and privacy issues continue to pose significant challenges. The discussion focuses on critical challenges in cloud computing: regulatory, security, and privacy issues. A brief presentation on the future trends of cloud computing deployment is also presented, together with some solutions to mitigate these challenges.
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 5
ISSN (O) 2278-1021, ISSN (P) 2319-5940
Potential Risk: Hosting Cloud Services Outside
the Country
A.S. Hovan George1, Dr. A. Shaji George2
Masters IT Solutions, Chennai, Tamil Nadu, India.1,2
Abstract: An object of the study is the potential risk of hosting the server outside of the country. The goal of this article
is to define the risks and opportunities associated with the rapid development of cloud technologies and their penetration
into almost all technological areas. The modern-day economy is evolving under the influence of information and
communication technology. People are witnessing huge success in every sphere of management and economy with the
use of Cloud Computing, Big Data, and Cyberphysical Systems. Modern life and work are shaped by cloud computing.
It has become a part of the daily lives of people. Companies of all sizes have now turned to cloud computing for their
business needs. Currently, everyone is talking about the cloud solution as a way to save money and increase the efficiency
of resources. However, nothing is perfect, and this is no exception for cloud computing. The use of this technology is
undoubtedly beneficial, however, there are some risks and concerns that should not be overlooked. The purpose of this
article is to raise awareness about the ongoing war between Ukraine and Russia, how it impacts cloud technology when
hosted outside of the country. Furthermore, this article will also look at how this war affects the IT industry if
organizations depend on their operations and get support from outside countries, including hardware, software, network
infrastructure, data centers, mobile device management, cloud computing, cyber security etc. Although cloud computing
is developing rapidly, both conceptually and practically, legal, contractual, economic, service quality, interoperability,
security, and privacy issues continue to pose significant challenges. The discussion focuses on critical challenges in cloud
computing: regulatory, security, and privacy issues. A brief presentation on the future trends of cloud computing
deployment is also presented, together with some solutions to mitigate these challenges.
Keywords: Cloud Computing, Bigdata, Blockchain, Cyber Security, Russia & Ukraine Cyber War, IT Army, DDos.
I. INTRODUCTION
Modern life and work are shaped by cloud computing. In fact, it has become an integral part of the daily lives of people
around the world. Companies of all sizes have now turned to cloud computing for their business needs [1]. The adoption
of cloud computing has been increasing rapidly in recent years due to a number of important advantages including cost
savings, scalability, security, ease of deployment. Currently, everyone is talking about the cloud solution as a way to save
money and increase the efficiency of resources. In the past few years, organizations have been actively migrating their
infrastructure and applications to the cloud. In the field of remote work, managing critical business processes, and having
access to key systems, cloud technologies play a crucial role in helping companies solve all of these challenges [2]. As
companies migrate to cloud infrastructure, cloud security has become a high priority for a growing number of
organisations as well as the government. While many businesses and governments are still cautious about cloud
technologies, most do see the benefits and understand the strengths of cloud solutions. However, many organizations are
still wary of taking the first step. To a certain extent, this may be correct, however, the cloud may not be the most suitable
solution for every business or government. It depends on a set of conditions and circumstances [3]. The growth of cloud
adoption also brings with it a number of challenges regarding privacy and security of data [4]. If Cloud technologies are
implemented properly, used intelligently, and adopted in accordance with the correct cloud security principles, will help
to drive and improve business performance. In the Government, Semi-Government and vital sectors, cloud services are
usually classified as regulated approaches for data privacy and security, ever since data privacy and security has become
a top concern among government bodies. A recent war illustrates the importance of choosing the location for hosting
cloud solutions for businesses and governments. The new study discusses the attitudes of Russian companies towards
cloud technologies and explores the main factors that prevent their adoption. In this article, the author mainly focuses on
an important phenomenon the fear of the cloud and its underlying factors [4]. Due to this reason, establishing enhanced
cybersecurity standards for cloud computing has become a top priority for businesses and nations around the globe, not
just a need, but an essential social requirement as well. However, nothing is perfect, and this is no exception for cloud
computing. The use of this technology is undoubtedly beneficial, however, there are some risks and concerns that should
not be overlooked.
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 6
ISSN (O) 2278-1021, ISSN (P) 2319-5940
II. OVERVIEW OF CLOUD DATA LOCALIZATION
Cloud Data localization is the method of maintaining data inside the region it came from. For instance, if the organization
collects data in a country, they store it in the country instead of transferring it to a different country for further processing
[6]. The Internet allows data to traverse the globe in milliseconds, so where that data goes and what is done with the data
is of growing interest to regulators, privacy advocates, as well as consumers [7].
Cloud Data localization vs. Cloud data residency
Cloud Data localization and cloud data residency are two concepts that are occasionally used interchangeably, even if
they have somewhat different meanings [6]. Independently, Cloud data residency means a place where Information
(data)is stored. Cloud Data residency requirements could compel organizations in order to change the location where
their data is stored [8]. Cloud Data localization is an action of observance of Cloud data residency requirements [6].
III. THE REQUIREMENTS OF CLOUD DATA LOCALIZATION
There are some legal norms that have cloud data residency requirements that require organizations to localize the cloud
data [10]. Though, the majority of cloud data privacy frameworks do not require data localization [7]. But although
jurisdictions might not require data localization by the law, heavily regulated industries such as banking as well as
healthcare will be able to adopt best practice guidelines establishing more data requirements in order to be processed
beyond their country of origin. In such cases, organizations might prefer to localize data instead of meeting these extra
requirements. Many companies operating in regions with strict data-processing regulations can want to prevent possible
violations entirely by maintaining data in those regions, even if this does not protect data any better.
IV. THE FUNCTION OF CLOUD DATA LOCALIZATION
Cloud Data localization is straightforward for organizations that rely upon one country or region and will use local
infrastructure to store data [7]. If their data stays secure inside their data centers (DC), it needs to be properly localized.
Cloud computing makes data localization more complex. Cloud servers are accessed through the internet and can be
placed worldwide [8]. Organizations that depend on cloud computing have far less visibility into where their data are
actually processed and stored, due to the fact that the cloud computing supplier is processing those decisions.
Nevertheless, cloud data localization was made possible by cloud computing in the event that the cloud vendor commits
to just managing and storing data inside data centers (DC) in the designated region. Not all cloud vendors have a sufficient
global footprint to set it up, however many do. If a cloud vendor has the data center within the established region, then
there are any number of ways in which they can secure a given customer's data stays in that data center (DC).
V. THE GOAL OF DATA LOCALIZATION
Most data localization laws apply for the creation and storage of personal data [5]. Since, People have a basic
understanding of what data localization is, let us move on to some of the reasons why governments would put them in
place. The primary objective of data localization is to:
Fig -1: The Goal of Data Localization
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 7
ISSN (O) 2278-1021, ISSN (P) 2319-5940
Whether warranted or not, localization requirements are increasing and creating an enormous challenge for companies
that want to remain compliant [5,6].
VI. TYPE OF CLOUD DATA LOCALIZATION
Cloud Data localisation refers to the practice of data storage on any device located within the boundaries of the country
where the data is produced [13]. Currently, the vast majority of this data is stored in a cloud outside of country’s [14].
Localisation decrees that companies gathering critical data regarding consumers need to store and process them within
the boundaries of the relevant country. Many countries worldwide have implemented or in the process of implementing
cloud data localisation laws to protect their own country's data and the privacy and data of their citizens.
Fig -2: Types of Cloud Data Localization
VII. BENEFITS OF CLOUD DATA LOCALIZATION
Cloud Data Localization will offer Law enforcement simple supervisory access. This helps law enforcement
authorities efficiently investigate crimes and national security threats.
Local governments and regulators are empowered to request data in case of disputes or fraud [16].
Cloud Data localization guarantees the safety of citizens’ data as well as provides data privacy protection and
freedom from foreign surveillance.
Cloud Data localization will guarantee more accountability from tech, particularly about the end-use of data
gathered [17].
Cloud Data warehousing is huge business, and it will help boost the data centre(DC) industry in the country and
provide jobs.
It will reduce conflict of authority due to cross-border data-sharing and guarantee the delivery of justice for
cases that arise as a result of data violation and privacy suits.
VIII. ISSUES FACED BY THE CLOUD MARKET
Localization of Cloud data will be a hot topic in the coming years. Recently, many countries have expanded their
enforcement of the cloud data localization law against the technology giants. Although this battle may be unique to the
megalithic tech companies, how aggressively and in what manner the country plays its data privacy card may have inverse
effects on future investments [20]. The fear of clouds, which is widespread throughout the world, is another factor. There
are three major challenges associated with cloud migration, according to a recent study: the adaptation of cybersecurity
controls, compliance with legal and regulatory requirements, and migration of IT systems to the cloud. Cloud services in
all countries face the same issues many industries and regions have had when it comes to adopting the cloud. Even though
the cloud offers vast advantages in cost optimization and scalability, basic cloud information remains elusive to the
majority of people. Those who work for companies that utilize cloud technology either did not know how their company
protected data in the cloud or were using it "as is" without additional cybersecurity protocols. Even worse are some of
the concerns that people have regarding cloud computing. When asked about the most important risks involved with
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 8
ISSN (O) 2278-1021, ISSN (P) 2319-5940
cloud technologies, they believe accessing critical data by cloud provider staff indicates a deep mistrust of technology
[20]. If so, many users do not trust the cloud, it could be a significant barrier to establishing country-wide cloud services.
Even though many companies have been using the cloud, they may be reluctant to fully commit to using it. Whether the
problem relates to global cloud services or country-specific cloud services is unclear, but service providers need to be
transparent, otherwise, the confluence of country-specific data privacy and the general public's mentality could pose a
barrier to growth and adoption.
IX. THE BEST PRACTICES FOR CLOUD SECURITY
There are six pillars to a security reference architecture that describe the minimum requirements required by organizations
to place workloads securely in the cloud [18].
The best course of action is:
It should be done as follows:
Design and implement the basic security
controls to create a secure landing zone in the
cloud solution provider platform.
It is important to define the roles that are
authorized to operate in the environment, what
they are expected to do and what their
responsibilities are.
Design re-usable cloud solutions provider
secure PaaS templates with the integrated
security controls.
Secure connectivity between on-premises data
centers and utilize the "hub and spoke" model
of network security
Platforms and services can be combined in
order to bring together existing enterprise
security tools for clients with operational
processes and procedures.
Set up secure landing zone configuration
policies and apply platform security controls to
cloud service providers.
Table -1: Best Practices for Cloud Security
X. RUSSIA-UKRAINE CYBER CONFLICT: HOW CLOUD SERVICES ARE WEAPONS
Russia continues its invasion of Ukraine, and the Researchers have examined how cloud technology contributes to
conflict at least in a virtual war [19]. When Russia invaded Ukraine, online action was triggered [19]. In the past, Ukraine
has experienced numerous attacks resulting in defacement of websites, (DDoS) outages, as well as the use of destructive
wiper malware. A group of anonymous hackers subsequently became engaged, and Ukraine's government sought
volunteers with cybersecurity skills to help secure key infrastructure.
Ukrainian government officials have formed an IT army to defend Ukrainian networks and counter Russian threats. In
the study, cloud technologies are now playing a part in the digital aspect of the conflict. There is a lot of code and tools
that have been tracked by the team in public repositories, including code libraries, Docker images, as well as other
software packages. In the search, they searched for guides, names, as well as tools that were promoted by either side to
use in the cyberattacks. There was an effort to interfere with the network traffic of online services by utilizing these public
repositories to carry out denial-of-service attacks. The team was particularly interested in the container images. Through
DDoS tools that provide how-to guides, the audiences with no technical expertise are able to disrupt websites through
cloud deployment. On the list of targets are financial institutions and providers of multiple services in Russia.
In addition, the container images also included attack tools that initiated DNS floods through the UDP protocol, sending
a large number of DNS requests through UDP in port 53 and targeting Russian banks. Honeypots have been deployed to
collect data regarding Russian and Ukrainian IP addresses. In general, network and media organizations were the most
frequently attacked. The advancement of technology allows experienced threat actors to develop and distribute simple
automated tools that allow individuals with limited technical expertise to participate in cyberwar. Additionally, it enables
individuals and organized hacking groups to influence the conflict using their skills and resources. There is no doubt that
emerging technologies are relevant to these efforts and can make a significant contribution.
XI. THE NEGATIVE IMPACT OF STOPPING SALES OF HARDWARE AND IT SUPPORT FROM THE
WESTERN WORLD
The majority of companies and government agencies have relied on technology developed in the West for their own and
operated IT systems for decades [22]. This includes servers, operating systems, applications, and tools. In general, these
tools enable organizations to send emails, analyze data, store records, and generally manage their operations. Many of
these technologies cannot be switched off remotely by vendors [22]. However, there are several ways to impede a client's
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 9
ISSN (O) 2278-1021, ISSN (P) 2319-5940
system. As an example, local cloud service providers, banking, transport, telecom, and other organizations in the country
may be hindered if vendors stop supplying replacement parts, security patches, software updates, and technical assistance.
A halt in the supply of goods will have an adverse effect on everything. Consequently, clients may be forced to find other
options, such as pen-and-paper bookkeeping, if the services go offline or degrade due to a lack of updates.
XII. CYBER WAR: THE RISK IN REMOTE MANAGED SERVICES AND CLOUD SERVICES
Managed services: Managed service operators manage services of an Organisation on their own behalf. This could
include a) authentication services, b) application services, c) cloud services, d)backup services, e)desktop services,
f)enterprise mobility services, g)gateway services, h)hosting services, i)network services, j)security services, k)support
services, l)procurement services, and other commercial-associated services. By doing so, managed service providers can
manage the services from their clients’ facilities or their own premises. In taking into account the security risks related
to the managed services, an organization should examine all managed service providers who have access to their systems,
facilities, or data. These services may be put at risk in the event of a cyberwar.
Outsourced cloud services: Outsourcing may be a cost-efficient option for delivering cloud services, and also possibly
providing a superior service. Though, outsourcing may affect an organization’s security risk profile. An Organisation
will still have to decide if a particular outsourced cloud-based service is equivalent to acceptable security risk and, if
suitable, authorize it for its own use [5]. In the event of a cyberwar, these services may be at risk.
XIII. DATA LOCALIZATION WITHIN A COUNTRY
The country data localization law requires that at least a copy of all information about country citizens be stored locally
within local data centers. With data localization and the center of country data privacy, the crucial consideration is that
even though a copy or the original of the data must be held on local soil, you can trust the storage and processing of that
restricted information to a third party within the country. As a result of the reality of those countries' data protection laws,
local cloud services do hold a significant advantage in helping businesses store data within compliance. This is the
primary reason why observers expect market growth to mainly come from national cloud providers rather than further
expansion by global cloud providers.
XIV. DO DATA RESIDENCY REDUCES CLOUD RISKS
In order to protect private and classified data generated by their citizens, countries are establishing their own data
residency regulations to mandate the storing of that information in that country the country of origin instead of outside
of it [21]. This theory is based on the idea that the laws of the country in which the data is stored will apply to the data.
Six aspects are involved in the life cycle of data. Following are the creation, use, storage, sharing, archiving as well as
the destruction of the data. Data residency only deals with the aspect of storing data. Data residency requests will be
based on concerns that data privacy laws may be less stringent in some jurisdictions [22]. In some jurisdictions, data
residency has been adopted as a policy, however, there is some question as to whether it is effective. Is it more beneficial
to store protected data in the country of origin or does the level of risk remain the same while the nature of the risk
changes? Although storing data meets data residency requirements, data residency is not effective in protecting data if
the owner of the cloud center, or the SaaS provider, has access and can send the data to be processed in a different
jurisdiction [23]. Remember that Cloud computing is based on the layered service model that makes use of Cloud
federation to achieve maximum functionality, reach, performance, and economy.
XV. THE RISE OF RISK FROM CLOUD COMPUTING
When cloud services are used, the control of data is automatically lost [12]. Even when the cloud service provider (CSP)
encrypts data during both the transit and when it will be stored in the cloud, it could easily decrypt it too [12]. A crucial
risk is a fact that government agencies or private organizations that use the courts could force the cloud service provider
(CSP) to deliver your data or appropriate encryption keys. Many times, it may not even be known whether such a legal
proceeding or court order was executed. This is termed Blind Subpoena. The problem becomes apparent when your data
is being processed in various countries while it is residing in a particular country. If data resides in the data centers located
in the country, it is possible to be able to count on legal protections which apply to the data.
XVI. CONCLUSIONS
Usage of the internet is becoming increasingly common as governments and business organizations move services on the
internet to make processes more effective and to provide a wider reach. With the development of global enterprises and
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 10
ISSN (O) 2278-1021, ISSN (P) 2319-5940
the growing digital economy, organizations must carefully review the application of cloud data localization as well as
data transfer laws to their operations and those of their clients. Cloud computing certainly offers many advantages, and
the future seems clearer too. Though, it also includes many risks and challenges for the enterprise. Therefore, it's
important to know the problems which can come up if the organization or government intends to move the workload to
the clouds. However, given its extensive reach of loose as well as light digital infrastructure, it represents a big threat to
nations, and public as well as private businesses and individuals. The government must take accountability for tackling
the nation's potential vulnerabilities. The biggest concern between the government and the organizations to shift their
workloads or processes to the cloud is data security. Although security measures laid down in cloud computing have been
evolving throughout the years, it is still a significant challenge. There are lessons to be learned from the Russian War for
the rest of the world. The war demonstrated the risks associated with using the cloud. Therefore, all government and
public sector organizations should be analysed before the Government and Organization transfer their data to the cloud.
In today's world, cloud solutions are used more and more, making any nation susceptible to such a digital crisis. To deal
with this, the government or organization must be prepared. In today's world, it is not surprising to see a digital crisis
because it may happen at any time and to anyone. This research paper offers an overview of multiple threats,
vulnerabilities, and the potential risk of cloud data, this is an article that can serve as a guide to policymakers in
organizations to assess the security potential risk hosting cloud services outside the country.
REFERENCES
[1]. Sharma, Hemant. “Top 10 Advantages and Disadvantages of Cloud Computing [2022].” Intellipaat Blog,
https://intellipaat.com/blog/tutorial/amazon-web-services-aws-tutorial/advantages-and-disadvantages-of-cloud-
computing/.
[2]. Sokolova, Olga. "Russia In the Cloud: What Drives the Market?". Linxdatacenter.Com, 2020,
https://www.linxdatacenter.com/press-room/news/novye-uslugi/russia-in-the-cloud-what-drives-the-market.
[3]. Dr. A. Shaji George, and A. S. Hovan George. DOI 10.17148/IJIREEICE.2021.9701 a Brief Overview of
Vxlan...https://www.researchgate.net/profile/AShaji-
george/publication/352999040_A_Brief_Overview_of_VXLAN_EVPN/links/60e369c2299bf1ea9ee516b1/A-
Brief-Overview-of-VXLAN-EVPN.pdf.
[4]. DR.A. SHAJI GEORGE, and A.S. HOVAN GEORGE. “The Evolution of Content Delivery Network: How It
Enhances Video Services, Streaming, Games, e-Commerce, and Advertising.” Http://Www.ijareeie.com/Volume-
10-Issue-7, July 2021, http://www.ijareeie.com/upload/2021/july/40_The_NC.pdf.
[5]. Benjamin Vitaris. “What Is Data Localization? Meaning and Laws Explained.” Permission.io, 27 Oct. 2020,
https://permission.io/blog/data-localization/.
[6]. Heather Devane. “Data Localization: A Complete Overview.” Immuta, 27 Jan. 2022,
https://www.immuta.com/articles/data-localization/.
[7]. What is data localization? | data residency | cloudflare. (n.d.). Retrieved from
https://www.cloudflare.com/learning/privacy/what-is-data-localization/
[8]. Review, B. S. (2021, August 18). Data localization: No panacea for cloud computing issues. Law School Policy
Review & Kautilya Society. Retrieved from https://lawschoolpolicyreview.com/2021/08/18/data-localization-
no-panacea-for-cloud-computing-issues/
[9]. Danielle Kaye, et al. “Explainer: Will Big Tech Cloud Companies Cut off Russia?” Reuters, Thomson Reuters, 8
Mar. 2022, https://www.reuters.com/technology/will-big-tech-cloud-companies-cut-off-russia-2022-03-08/.
[10]. Samuel Yang, AnJie Law Firm. “China: Data Localisation.” Lexology, Global Data Review, 28 Oct. 2021,
https://www.lexology.com/library/detail.aspx?g=77c65f77-6292-46fd-ac3a-44ffe34aef92.
[11]. Information Security Manual - Cyber.gov.au. 10 Mar. 2022, https://www.cyber.gov.au/.
[12]. Puneet. “Microsoft Azure: Services.” Encryption Consulting | Encryption Consulting, 3 Jun e 2021,
https://encryptionconsulting.com/education-center/microsoft-azure-services/.
[13]. Nigel Cory, Luke Dascoli. “How Barriers to Cross-Border Data Flows Are Spreading Globally, What They
Cost, and How to Address Them.” How Barriers to Cross-Border Data Flows Are Spreading Globally, What They
Cost, and How to Address Them, Information Technology and Innovation Foundation, 19 July 2021,
https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-
cost.
[14]. “Data Localization Advantages & Challenges.” Tides Academy |, 23 July 2019,
https://tidesacademy.com/data-localization-advantages-challenges/.
[15]. A. Shaji George, and Bashiru Aremu. “User Revocation Using Advanced Key Generation in Cloud
Architecture.” Science and Engineering Journal,
Https://Www.researchgate.net/Publication/350353398_USER_REVOCATION_USING_ADVANCED_KEY_GE
NERATION_IN_CLOUD_ARCHITECTURE, 10 Mar. 2021, https://saejournal.com/volume-25-issue-3/.
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
Impact Factor 7.39Vol. 11, Issue 4, April 2022
DOI: 10.17148/IJARCCE.2022.11402
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 11
ISSN (O) 2278-1021, ISSN (P) 2319-5940
[16]. Drishti IAS. “Data Localisation.” Drishti IAS, 24 Nov. 2018, https://www.drishtiias.com/to-the-
points/paper3/Data-Localisation.
[17]. “Data Privacy Rankings - Top 5 and Bottom 5 Countries - Privacy HQ.” PrivacyHQ,
https://privacyhq.com/news/world-data-privacy-rankings-countries/#_Toc66028355.
[18]. Daniel Mellen. “Secure Cloud.” Accenture-The Importance of Cloud Security, 19 Jan. 2021,
https://www.accenture.com/us-en/insights/security/secure-cloud.
[19]. Osborne, Charlie. “How Cloud Services Become Weapons in Russia-Ukraine Cyber Conflict.” ZDNet,
ZDNet, 15 Mar. 2022, https://www.zdnet.com/article/the-role-of-cloud-services-containers-in-the-russia-ukraine-
cyber-conflict/.
[20]. Grieco, James. “Global Clouds and Cloud Providers in Russia.” InCountry Global Clouds and Cloud Providers
in Russia, 15 July 2021, https://incountry.com/blog/global-clouds-and-cloud-providers-in-russia/.
[21]. Aggan, Wael. “Does Data Residency Reduce Cloud Risks?” Cloudmask,
https://www.cloudmask.com/blog/does-data-residency-reduce-cloud-risks.
[22]. Guseyva, Viktoriya. “Data Residency Laws by Country - Overview.” InCountry, 17 Mar. 2022,
https://incountry.com/blog/data-residency-laws-by-country-overview/.
[23]. Dr. A. Shaji George, and A. S. Hovan George. “Server Less Computing: The Next Stage in Cloud Computing’s
Evolution and an Empowerment of a New Generation of Developers.” IJARESM, Apr. 2021,
http://www.ijaresm.com/server-less-computing-the-next-stage-in-cloud-computing-s-evolution-and-an-
empowerment-of-a-new-generation-of-developers.
... 1. Total control and unlimited access to data and hardware in the cloud, 2. High performance architecture (dark fiber, cutting edge hardware, etc.), 3. Multicloud architecture (large scale cloud, subcontractor, etc.), GeoFINDR also relies on the following assumptions to verify the location of the VM/cloud instance: ...
... 1. There is another machine with similar performance (DDR) to the VM that is connected to the Internet, 2. Delay measured from two Internet machines has a low variance in time, 3. Two machines on the same network with similar configuration and hardware will get the same RTT when pinging a third machine, 4. The cloud instance is a IaaS or PaaS that is connected to the Internet and able to run GeoFINDR, 5. ...
Preprint
Full-text available
In multicloud environments, where legal obligations, technical constraints and economic interests are at stake, it is of interest to stakeholders to be able to locate cloud data or the cloud instance where data are decrypted for processing, making it particularly vulnerable. This paper proposes an original and practical delay-based approach, called GeoFINDR, to locate a cloud instance, e.g. a Virtual Machine (VM), over the Internet, based on RIPE Atlas landmarks. First, the assumed threat model and assumptions are more realistic than in existing solutions, e.g. VM-scale localization in multicloud environments, a Cloud Service Provider (CSP) lying about the VM's location. Second, the originality of the approach lies in four original ideas: (1) geolocalization is performed from the VM, (2) a Greedy algorithm selects a first set LM_A of distributed audit landmarks in the vicinity of the declared area, (3) a sectorization algorithm identifies a set LM_S of other landmarks with distance delay behavior similar to that of the VM to estimate the sector of the VM, and (4) the estimated location of the VM is calculated as the barycenter position of the LM_S landmarks. An open source tool is published on GitHub and experiments show that localization accuracy can be as high as 22.1km, under unfavorable conditions where the CSP lies about the location of the VM.
... When a company adopts the cloud model, for example, an important aspect to be considered before hiring the provider is where the data will be located [43]. This computing model enables data to be stored across the borders of the customer country, and new challenges emerge, especially related to security and regulation [44]. ...
Article
Full-text available
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the potential to incur several privacy concerns. As an example, the French newspaper Le Figaro breached approximately 7.4 billion records that included full names, passwords, and e-mail and physical addresses. To reduce the likelihood and impact of such breaches, it is fundamental to strengthen the security efforts against this type of incident and, for that, it is first necessary to identify patterns of its occurrence, primarily related to the number of data records leaked, the affected geographical region, and its regulatory aspects. To advance the discussion in this regard, we study a dataset comprising 428 worldwide data breaches between 2018 and 2019, providing a visualization of the related statistics, such as the most affected countries, the predominant economic sector targeted in different countries, and the median number of records leaked per incident in different countries, regions, and sectors. We then discuss the data protection regulation in effect in each country comprised in the dataset, correlating key elements of the legislation with the statistical findings. As a result, we have identified an extensive disclosure of medical records in India and government data in Brazil in the time range. Based on the analysis and visualization, we find some interesting insights that researchers seldom focus on before, and it is apparent that the real dangers of data leaks are beyond the ordinary imagination. Finally, this paper contributes to the discussion regarding data protection laws and compliance regarding data breaches, supporting, for example, the decision process of data storage location in the cloud.
Article
Full-text available
The explosive development of digital media has been creating opportunities for enterprises to change their business strategies and incorporate new-world applications. Businesses use networks for exchanging information from a centralized location as a strategic method of communication. As enterprises move forward with the next-generation network, they can share not only content, but also applications, rich media, and live events. The advancement will affect business functions including e-learning, e-communications, and e-commerce. The CDN is a revolutionary technology that enables enterprises to distribute a new generation of scalable, accelerated, rich Web-based content, including Television -quality streaming media, for e-business as well as knowledge-sharing solutions. Delivering content locally minimizes the distance between the point where a request is placed and the point where it is served because the content is replicated to the edge of the network. Web sites with higher performance are the result. In the delivery of content, inherent Internet congestion issues are simply overcome, bandwidth utilization is controlled and optimized, and applications and rich media content are delivered to the desktop. Benefits of content delivery involve central content control, efficient distribution to servers that are at the edge of a network, and automated routing of the content requests that are made to a local edge server. Furthermore, it provides web content developers with a simple way to manage data and accelerates the speed of web access for users. Therefore, content providers can place their content at the closest node from the end-user. As a result, a high-performance and adaptable solution have been developed. Researchers have widely considered content delivery networks to be a powerful solution to lowering these drawbacks. CDNs act as trusted overlay networks that offer high-performance delivery of common Web objects, static data, and rich multimedia content by distributing the load among servers that are close to clients. The benefits of CDNs include reduced origin server load, reduced latency for the end-users, as well as increased throughput. Furthermore, CDNs can improve Web scalability as well as disperse flash-crowd events. In this paper, we provide an overview of CDN development and how it enhances video services, streaming, games, e-commerce, and advertising. KEYWORDS: Content Delivery, Content Delivery Networks, CDN, e-learning, e-commerce, e-communication, Streaming Media, Advertising.
Article
Full-text available
Data will flow across borders unless governments enact restrictions. While some countries allow data to flow easily around the world—recognizing that legal protections can accompany the data—many more have enacted new barriers to data transfers that make it more expensive and time-consuming, if not illegal, to transfer data overseas. The spread of data localization to more countries and data types poses a growing threat to the potential for an open, rules-based, and innovative global digital economy. Data localization makes the Internet less accessible and secure, more costly and complicated, and less innovative. ITIF’s econometric modeling estimates that a one-unit increase in a country’s data restrictiveness index results (cumulatively, over a five-year period) in a 7 percent decrease in its volume of gross output traded, a 1.5 percent increase in its prices of goods and services among downstream industries, and a 2.9 percent decrease in its economy-wide productivity. As the world emerges from COVID-19, policymakers need to do more to ensure that the global digital economy remains an engine of economic growth and recovery. The first section of this report provides an updated analysis of data localization’s use and application and the five main motivations used to justify it. The second section provides a quantitative assessment as to its growing impact. The final section combines analysis and recommendations relating to mechanisms to support data flows and global digital trade and data governance.
Article
Full-text available
The purpose of this paper is to provide network professionals with a common need to comprehend how to use VXLAN networks within their own organizations to release the entire potential of modern networking. Whilst interested network administrators shall acquire the most advantages from such content, the information contained within this research paper might be of use to each IT professional involved in network technologies. Aspects in this paper examine how VXLAN EVPN provides a solution to network challenges that have overwhelmed the entire industry for many years, and how to implement constructs that are usually observed in traditional networks thanks to this new technology. This research paper explores VXLAN EVPN, starting with an introductory stage, achieving a good understanding of terms and concepts as well as progressing via implementations through a single data center to several data centers. The following paper also refers design and the integration of Layer4-Layer7 network services, coexistence along with brownfield environments, operation, as well as maintain a VXLAN EVPN. At the conclusion of this paper, the reader will have a strong foundation of VXLAN EVPN and an understanding of real-world use instances that can be instantly used to help in the development of a strategy to effectively shift to the next-generation data center with this new technology.
Article
Full-text available
Serverless computing has arisen as a brand-new captivating paradigm designed for the deployment of services and applications. It is an implementation model in which a cloud-based service provider dynamically operates the distribution of computing resources of the corresponding server. It signifies an evolution of cloud programming paradigms, platforms, and abstractions, and is proof of the maturity and broad adoption of cloud technologies. And the awareness of the compute reference model, as well as the building of facilities, has developed into different dimensions. Cloud computing has allowed companies to concentrate less on their IT infrastructure and further on their main products and services. Moreover, the cloud has ceased to be seen as a viable alternative to hosting infrastructure. In the modern world, all types of businesses are utilizing cloud computing services without needing to worry about any fundamental infrastructure problems. Such a new consumption paradigm has grown to a serverless architecture. Through adopting serverless architectures, consumers can re-think their next-generation products made from concept to production, without having to wait for, or having to worry about, infrastructure. In Cloud computing the customer is charged for the real volume of resources used by them, as an alternative to paying for the pre-purchased units of computing capacity. This particular model developed as a means to achieve optimal cost, minimal configuration operating cost, and enhances an application's capacity to scale through the cloud. The potential of the serverless compute model remains well envisioned by the key cloud service providers as well as reflected in the acceptance of the serverless computing model. This research paper offers a detailed study on serverless computing architecture as well as also expands experimentation of the operating principle of serverless computing. And also, this paper discusses the significant benefits, effectiveness, low costs, time, etc. Furthermore, the research paper evaluates some of the distinctive possibilities and potentials which serverless computing offers. This article seeks to give a good understanding of serverless computing such as the current condition of serverless technology, as well as what are the key barriers and opportunities. This research paper also provides a short introduction to serverless computing.
Article
Full-text available
The main objective of this research is to develop a web-based application in an IT organisation to create a centralized network with attribute-based modelling for file access control with user revocation functionalities. In many cases, the employees inside the organization itself are not trustful for their concern. So many threads are happening due to employees inside the organisation. In order to overcome this problem, we propose a new centralized access control scheme for secure data storage in clouds that supports and warn on anonymous authentication. The cloud verifies the authenticity of the series without knowing the user's identity before storing data. These file systems are used according to the employee rights, which can be decided by the admin. Employee groups will be created, each group will be provided with a group key and each employee will be provided with a personal key. All the uploaded data will be stores in the centralized server. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents data stored in the cloud from anonymous users. These methods can be implemented using KDC (Key Distribution and certification) methods. Through the introduction of the user revocation function group integrity will be maintained according to the file systems. The revocation process will modify the key if those users must not have the ability to access data, even if they possess a matching set of attributes. For this reason, the owners should change the stored data key and send updated information to other users. Also, the revocation process will change the unwanted data while the user is reliving from the group.
Top 10 Advantages and Disadvantages of Cloud Computing
  • Hemant Sharma
Sharma, Hemant. "Top 10 Advantages and Disadvantages of Cloud Computing [2022]." Intellipaat Blog, https://intellipaat.com/blog/tutorial/amazon-web-services-aws-tutorial/advantages-and-disadvantages-of-cloudcomputing/.
Russia In the Cloud: What Drives the Market?
  • Olga Sokolova
Sokolova, Olga. "Russia In the Cloud: What Drives the Market?". Linxdatacenter.Com, 2020, https://www.linxdatacenter.com/press-room/news/novye-uslugi/russia-in-the-cloud-what-drives-the-market.
What Is Data Localization? Meaning and Laws Explained
  • Benjamin Vitaris
Benjamin Vitaris. "What Is Data Localization? Meaning and Laws Explained." Permission.io, 27 Oct. 2020, https://permission.io/blog/data-localization/.
Data Localization: A Complete Overview
  • Heather Devane
Heather Devane. "Data Localization: A Complete Overview." Immuta, 27 Jan. 2022, https://www.immuta.com/articles/data-localization/.
Data localization: No panacea for cloud computing issues. Law School Policy Review &amp
  • B S Review
Review, B. S. (2021, August 18). Data localization: No panacea for cloud computing issues. Law School Policy Review & Kautilya Society. Retrieved from https://lawschoolpolicyreview.com/2021/08/18/data-localizationno-panacea-for-cloud-computing-issues/