Introduction
to cloud computing
Clouding is
meant for accessing and storing data in the internet rather than storing it in
the computer hard disk. Therefore cloud computing is mechanism of making use of
shared pool of physical or virtual resources. It is something like tapping into
computing resources rather than generating it on own. Something like tapping
for electricity from the national supply service instead of generating it. Cloud computing models include private cloud,
public cloud, and hybrid cloud.
Private cloud
model
A private
cloud is a model which provides a distinct and separate environment that can be
operated by a specific client. This private cloud can be installed internally
or externally. If the cloud project for a single organization is installed
properly, business can be improved with taking care of the security issues at
each and every step of the project, in order to avoid the serious security
issues. Now security is a concern as, if
there are no restrictions then anyone can access the data, which may accidently
or deliberately change the data in the cloud, sometimes even delete the data.
This causes serious problems in case of sensitive data.
Let us see
about secure private cloud. This
ensures privacy and security for the client as data can be accessed only by the
client. Thus nowadays many companies move to secure private cloud model. Each private cloud server is more
secured as it is with the physical server. If there is a problem seen, it is
identified quickly and rectified immediately and also extra equipment are added
on demand
Secure private cloud ensures that no external person can access the data. There
are three main threats regarding security are:
·
Insecure interfaces and APIs
·
Leakage and loss of data
·
Failure of hardware
Points to be
taken care to get a secure private cloud
There are five
basic steps that ensures for a secure
private cloud.
·
Risk assessment:
make sure there is an agreement to identify the risk management.
·
Data ownership:
decision must be made as who is the local data sheriffs, as the cloud
provides can still share the data information with another party without any
intimation, as the providers can grant data access.
·
Data classification: this is a must as not all data
require the same level of security. Segregate the data as public, confidential
and highly private data.
·
Auditing and monitoring: data needs to be watched
always.
·
Incidence response: in case of incidents, who must be
responsible should be decided.
Developing a
proper and appropriate security for the private cloud make the data very much
safe in the cloud.
No comments:
Post a Comment