Monday, January 26, 2015

Security in Cloud Computing



              Security in Cloud Computing

One of the largest groundbreaking innovations in this decade of cloud computing.Turning off power are enterprises and large corporations from creating applications and data storage already in full swing, with consumers and small
and medium-sized enterprises, to develop applications and data in the cloud. However, the question is whether it is safe to do so. Computer security, cloud descends from people who are vastly larger study technology. If you do, it's good to be paranoid. Losses from cyber crime and the attack can be huge and cyber crime CSI Security Survey 2008
shows the average annual loss of just under $ 300,000.

A leap of faith that seem to put your precious data and applications in the cloud and cloud security trust third parties. According to belief, was not part of the equation, and should not be. Every business needs to know the 
data and secure applications, you must address the issues of cloud computing security.

In fact, the cloud has many security features. According to the NIST security capabilities of cloud computing include:

           Convert data in an external cloud reduce the exposure of confidential data        
           Hey simplifies cloud security audit/homogeneity test
           Clouds enable automated security management
           Play/disaster recovery

Accepts all the points. Arguably the strict security, cloud computing to include part of their activity, often make more than a single user cloud providers. In this context not only cloud-computing providers better security, at this point, instead, they publish the preventive measures, the individual companies, but not often.


Superior physical security through cloud computing providers


 A recent college graduate, with the possibility of many, has done a very good job in this latest report.
The lack of physical security is the reason for a huge losses and insider attacks,representing a large percentage of the loss of surprise. The ghost of the black hats, your network from the third world country that is very real and often "Black Hat", while in fact to infiltrate trusted employees. Is the guy from accounting, that with lunch.She's a lady, that brings you coffee in the morning, and always remember to love the two sugars.

Of course, insiders can access your network and your data regardless of where it is located sufficient incentives and information, but the physical presence of physical devices facilitate data tend to better physical security protocols, including locked rooms and manages access, manipulation and theft protection charge access and cloud data centers.

Increased security through the cloud

 
In addition to physical security are technical safety paramount. Hosting servers and applications require additional measures. You need a larger organization for employee development, only for security reasons. Cloud computing, cloud security onto the cloud platform is built on the other side. While the company homeland security must continue 
to and in any case the supplier shall ensure that applications and data are safe from attacks.We tend to think of
control of everything safe.

A unified security model

 
The essence of cloud platform is that it requires an instance of common software components that can be used by developers to write from scratch "lock on their applications" without them. This function is especially useful in the field of security.Cloud "platform as a service" brings an elegant solution to the problem of security standard security model for managing user authentication and authorization, access and secure storage and several leasing and privacy policy that apply. Therefore, each application is SaaS, which runs on a common platform immediately from a standard template and a strong security platform benefit.

Most client application service providers impose a degree of security with their applications, although if
 the cloud application providers have their own proprietary cloud-computing security approaches, there are fears about risks overseas subsidiary data and private international law, to approach the chimney for authentication 
and role based access and leaks in multi tenant buildings. These security problems have delayed the adoption of cloud computing technology, although it shouldn't be a problem.


No comments:

Post a Comment