Formulation of data privacy protection strategies in the national cloud infrastructure employing a risk-based approach

Document Type : Original Article

Authors

1 P.H.D. s.n.d.u

2 Dept. of Computer Science, Shahed University

3 Malek Ashtar University

4 Assistant Professor

Abstract

The emergence of cloud computing with features such as multi-tenancy, scalability, and cost reduction has led many IT providers to use this technology. However, this technology faces challenges in maintaining data privacy. Information leakage can lead to violations of individual privacy and even national security. Given the paucity of the country's strategic documents in this field, this study has examined and formulated strategies for maintaining privacy in the country's cloud infrastructure. To this end, in addition to examining the concepts of cloud computing and privacy, the effects of cloud computing exploitation on privacy were examined. By studying international documents and upstream documents of the country as well as using the theme network and based on the PESTLS approach, 250 challenges were identified and after classification, 54 major challenges were identified and prioritized with the opinions of experts, and 10 challenges with the highest risks were finalized. To address these challenges, based on the ITU framework, 6 main strategies were finalized, including promoting culture, knowledge, and public awareness, designing and implementing a comprehensive system, enhancing infrastructure security, establishing law enforcement mechanisms, promoting international cooperation, and activating the privacy economy. Finally, 49 solutions were developed to preserve privacy in cloud infrastructure.

Keywords

Main Subjects


Volume 15, spring
June 2025
Pages 151-184
  • Receive Date: 26 February 2023
  • Revise Date: 21 April 2025
  • Accept Date: 20 January 2024