Threats of Cloud Computing

What is cloud computing?

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing relies on sharing of resources to achieve coherence and economies of scale similar to a utility (like the electricity grid) over a network.

At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. The cloud also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users in general, such as in distributed computing , or specifically for everything as a service, including infrastructure as a service, platform as a service, software as a service, desktop as a service, management as a service, testing as a service and security as a service .

What are security problems in cloud computing?

Cloud services are available to users on demand and through the internet, so they can be accessed from anywhere. The cloud has many features such as high accessibility. However, it also has many risks and threats that can be caused by unauthorized access or attacks from hackers. Therefore, security is a main concern for cloud providers and customers who use the cloud service on a daily basis. According to scientific articles about cloud services threats, security issues in cloud computing include: data security, privacy, accountability, accessibility, integrity, authentication, tampering, non-repudiation, auditability, compliance, trustworthiness and availability

Why do these problems occur?

Cloud service providers may not always have the same security standards as their users. For example, a user may want to store important information in a separate database for safety reasons, but the cloud service provider does not want to work with databases that are difficult to manage. Users must be careful about how they store their data and how it is used.

As mentioned above, cloud service providers may not always follow all security standards. In fact, some services do not even meet basic security requirements such as having an automatic backup system in place or locking down sensitive features like administrative access control lists (ACLs). When choosing your provider, make sure you understand their policies around data storage and use before signing up for any plans or purchasing any products from them.

What has been done to solve these problems?

With the rise of cloud computing, data storage has become easier and more cheaper. Cloud computing doesn’t necessarily mean that you’re giving up control over your data; in fact, many vendors are working with you to ensure security of all the information you have stored on their servers. You’d be surprised at the amount of attention that companies pay to protecting their customers’ valuable information.

That being said, there is still a need for improved security features when using cloud services; unfortunately, these features aren’t always available because they are still under development.

Security professionals discuss creating new technologies that will bolster security features in the process of approving new applications and systems (e.g., HIPAA) or creating new tools and processes to assist in ensuring increased levels of security (e.g., ENISA).

How do companies and users protect themselves against these threats?

Encoding is one of the most effective methods used to protect against threats. Encoding makes it harder for hackers to access data by making the data unreadable to anyone except those with a key. To ensure that only valid users access your data, you need a password and login process. Validation of users should be accompanied by encryption of all data being transmitted between the cloud service provider and your company and customers. Remember that if you do not encrypt your data, then it is vulnerable during transmission.

When selecting a cloud service provider, consider the reputation of the company from which you are purchasing. An established company will have an established reputation for providing secure services, but new companies may not be as reliable since their security measures have not been tested yet. There are many organizations that perform audits on companies that offer cloud services. These organizations can provide you with information about how well these companies perform security audits and what vulnerabilities they find on a regular basis.

Cloud technology is developing rapidly, but security has lagged behind.

It’s no secret that cloud technology is developing rapidly. But security has lagged behind, creating many vulnerabilities. So, you can’t guarantee the safety of all information stored in the cloud.


(Visited 5 times, 1 visits today)