Informatics

Information about various topics

Ads Here

20.1.16

Security of Private cloud



Introduction to cloud computing
Clouding is meant for accessing and storing data in the internet rather than storing it in the computer hard disk. Therefore cloud computing is mechanism of making use of shared pool of physical or virtual resources. It is something like tapping into computing resources rather than generating it on own. Something like tapping for electricity from the national supply service instead of generating it.  Cloud computing models include private cloud, public cloud, and hybrid cloud.

Private cloud model
A private cloud is a model which provides a distinct and separate environment that can be operated by a specific client. This private cloud can be installed internally or externally. If the cloud project for a single organization is installed properly, business can be improved with taking care of the security issues at each and every step of the project, in order to avoid the serious security issues.  Now security is a concern as, if there are no restrictions then anyone can access the data, which may accidently or deliberately change the data in the cloud, sometimes even delete the data. This causes serious problems in case of sensitive data.
Let us see about secure private cloud. This ensures privacy and security for the client as data can be accessed only by the client. Thus nowadays many companies move to secure private cloud model. Each private cloud server is more secured as it is with the physical server. If there is a problem seen, it is identified quickly and rectified immediately and also extra equipment are added on demand
Secure private cloud ensures that no external person can access the data. There are three main threats regarding security are:
·         Insecure interfaces and APIs
·         Leakage and loss of data
·         Failure of hardware

Points to be taken care to get a secure private cloud
There are five basic steps that ensures for a secure private cloud.
·         Risk assessment:  make sure there is an agreement to identify the risk management.
·         Data ownership:  decision must be made as who is the local data sheriffs, as the cloud provides can still share the data information with another party without any intimation, as the providers can grant data access.
·         Data classification: this is a must as not all data require the same level of security. Segregate the data as public, confidential and highly private data.
·         Auditing and monitoring: data needs to be watched always.
·         Incidence response: in case of incidents, who must be responsible should be decided.
Developing a proper and appropriate security for the private cloud make the data very much safe in the cloud.


No comments:

Post a Comment