Chuyển đến nội dung chính

What is Cloud computing security?

Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.



Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

SECURITY ISSUES ASSOCIATED WITH THE CLOUD
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid, and Community). There are a number of security concerns associated with cloud computing. These issues fall into two broad categories: security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud). The responsibility is shared, however. The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.

When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance Report, insider attacks are the sixth biggest threat in cloud computing. Therefore, Cloud Service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers must be frequently monitored for suspicious activity.

In order to conserve resources, cut costs, and maintain efficiency, Cloud Service Providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.

The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist. For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.

CLOUD SECURITY CONTROLS
Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:

Deterrent controls
These controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. (Some consider them a subset of preventive controls.)

Preventive controls
Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified.

Detective controls
Detective controls are intended to detect and react appropriately to any incidents that occur. In the event of an attack, a detective control will signal the preventative or corrective controls to address the issue. System and network security monitoring, including intrusion detection and prevention arrangements, are typically employed to detect attacks on cloud systems and the supporting communications infrastructure.

Corrective controls
Corrective controls reduce the consequences of an incident, normally by limiting the damage. They come into effect during or after an incident. Restoring system backups in order to rebuild a compromised system is an example of a corrective control.

DIMENSIONS OF CLOUD SECURITY
It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, typically by assessing the threats, vulnerabilities and impacts. Cloud security concerns can be grouped in various ways; Gartner named seven[9] while the Cloud Security Alliance identified fourteen areas of concern. Cloud Application Security Brokers (CASB) are used to add additional security to cloud services.

SECURITY AND PRIVACY
Identity management 
Every enterprise will have its own identity management system to control access to information and computing resources. Cloud providers either integrate the customer’s identity management system into their own infrastructure, using federation or SSO technology, or a biometric-based identification system,[1] or provide an identity management solution of their own. CloudID, for instance, provides a privacy-preserving cloud-based and cross-enterprise biometric identification solutions for this problem. It links the confidential information of the users to their biometrics and stores it in an encrypted fashion. Making use of a searchable encryption technique, biometric identification is performed in encrypted domain to make sure that the cloud provider or potential attackers do not gain access to any sensitive data or even the contents of the individual queries.

Physical security 
Cloud service providers physically secure the IT hardware (servers, routers, cables etc.) against unauthorized access, interference, theft, fires, floods etc. and ensure that essential supplies (such as electricity) are sufficiently robust to minimize the possibility of disruption. This is normally achieved by serving cloud applications from 'world-class' (i.e. professionally specified, designed, constructed, managed, monitored and maintained) data centers.

Personnel security 
Various information security concerns relating to the IT and other professionals associated with cloud services are typically handled through pre-, para- and post-employment activities such as security screening potential recruits, security awareness and training programs, proactive.

Privacy 
Providers ensure that all critical data (credit card numbers, for example) are masked or encrypted and that only authorized users have access to data in its entirety. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud.

DATA SECURITY
There are a number of security threats associated with cloud data services, not only covering traditional security threats, e.g., network eavesdropping, illegal invasion, and denial of service attacks, but also including specific cloud computing threats, e.g., side channel attacks, virtualization vulnerabilities, and abuse of cloud services. To throttle the threats the following security requirements are to be met in a cloud data service.

Data Confidentiality
Data confidentiality is the property that data contents are not made available or disclosed to illegal users. Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others, including CSPs, should not gain any information of the data. Meanwhile, data owners expect to fully utilize cloud data services, e.g., data search, data computation, and data sharing, without the leakage of the data contents to CSPs or other adversaries.

Data Access Controllability
Access controllability means that a data owner can perform the selective restriction of access to his data outsourced to cloud. Legal users can be authorized by the owner to access the data, while others can not access it without permissions. Further, it is desirable to enforce fine-grained access control to the outsourced data, i.e., different users should be granted different access privileges with regard to different data pieces. The access authorization must be controlled only by the owner in untrusted cloud environments.

Data Integrity
Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. Further, when a portion of the outsourced data is corrupted or lost, it can still be retrieved by the data users.

Tự Học tiếng Anh Giao Tiếp

Tự Học tiếng Anh Giao Tiếp
Những video tự học tiếng Anh giao tiếp đơn giản dễ thuộc

Bài đăng phổ biến từ blog này

Greatest muscle cars of all time

Because it is a genre that enthusiasts are passionate about, you are bound to generate some criticism when compiling a list of the 7 greatest muscle cars of all time. However, we stuck its neck out to do just that. Some enthusiasts trace the history of muscle cars to the 1949 Oldsmobile Rocket 88. But the heyday of this genre ran from 1965 to 1970 before collapsing under the weight of higher gas prices, more stringent exhaust emissions regulations and soaring insurance costs. What is a muscle car? There isn't a settled definition, but most experts agree it's a smaller, 2-door car powered by a high-displacement engine typically found in a larger, full-size sedan. Some argue that pony cars, such as the Ford Mustang and Chevrolet Camaro, aren't muscle cars at all, but for this list, we chose not to make that distinction. Manufacturers engineered muscle cars for straight-line speed, inspiring more than an occasional Saturday night drag race between traffic lights. Neither built...

Chevrolet Impala

The Chevrolet Impala is a full-size car built by Chevrolet for model years 1958 to 1985, 1994 to 1996, and 2000 to present. The Chevrolet Impala derived its name from the African antelope of the same name. 1965 Chevy Impala Super Sport The Impala was Chevrolet's most expensive passenger model through 1965, and had become the best-selling automobile in the United States.   Chevrolet Impala Pictures Collection (1960-1970) 1960 chevrolet Impala 1961 Chevrolet Impala 1962 Chevrolet Impala SS coupe 1962 Chevrolet Impala SS Convertible 1963 impala 1963 Chevy Impala. Lowrider Style 1964 Chevrolet Impala SS  1964 Chevy Impala SS Convertible 1964 Impala 1965 Chevy Impala Rag Top  1965 Chevrolet Impala 1965 Impala SS 1966 Chevrolet Impala 427 SS Chevy Impala SS 1966 1967 Chevy Impala SS 1967 Chevrolet Impala SS 427 Sport Coupe 1968 Chevrolet Impala 1968 Chevrolet Impala 1968 Chevrolet Impala 1969 Impala SS 427 1969 Impala SS 427 1970 Chevrolet Impala 454 Coupe Let us know which is ...

5 Classic Muscle Cars That Are Still Cheap Today If You Can Find Them

A classic muscle car is the dream of young car enthusiasts to this day. For anyone in the market to purchase a new, vintage muscle car, options might seem somewhat limited. The divide between high-end options and the realities of the typical car-buying budget quickly comes into focus. This can be immensely frustrating for someone scoping out the market for an old classic that hasn't been in production for decades. While there's a huge resale space for a contemporary Honda Civics, and buyers are therefore able to be a little picky with their choice, finding a vintage muscle car that matches your specifics is a little tricky. Fortunately, the range of excellent models that remain out there for a discerning buyer is fairly wide open. Cheap options abound in the marketplace for those that are willing to be patient and put in the work to research and identify great examples. These are some classics that any buyer should keep their eye out for when looking to buy a fantastic vintage ...

SUV Ford Explorer 2024 lộ diện trong quá trình chạy thử nghiệm

Mới đây, SUV Ford Explorer 2024 lộ diện trong quá trình chạy thử nghiệm. Những hình ảnh ghi nhận được cho thấy sự thay đổi lớn về thiết kế ngoại thất, cụ thể là ở cả phần đầu và đuôi của xe. Lưu ý, đây là bản nâng cấp giữa vòng đời (facelift) của Ford Explorer, không phải thế hệ mới. Ở phiên bản đời 2024, Ford Explorer sở hữu lưới tản nhiệt có kích cỡ lớn với hình dạng chữ nhật, thay thế cho loại hình lục giác của phiên bản hiện tại. Đồng thời, cặp đèn pha cũng được thiết kế nhỏ gọn và tinh tế hơn. Thông qua thiết kế này, giới chuyên gia nhận định chiếc SUV mới có nhiều điểm tương đồng với mẫu SUV 5 chỗ Ford Territory và Explorer đang phân phối tại thị trường Trung Quốc. Phía sau xe, đèn hậu đã được điều chỉnh về thiết kế. Phiên bản chạy thử nghiệm này cũng cho thấy Ford Explorer 2024 sẽ được trang bị ống xả kép. Theo một số nguồn tin, tương tự như phiên bản bán tại Trung Quốc, Ford Explorer 2024 sử dụng màn hình trung tâm siêu rộng, với kích thước lên đến 27 inch, trải dài gần hết bản...

Benefits Of Cloud Computing For Businesses

A new technology that is having a big highlight is the Cloud Computing. This type of technology simply allows the users to control applications and have access to their personal files using any computer that has internet access. Cloud computing allows the user to have more control with efficiency in computing technology, bringing together memory, storage, bandwidth and processing. Gmail and Yahoo are good examples of cloud computing, since there is no need for software or a server to use them: The only kind of software or hardware that you need is an internet connection. The management and the e-mail server are on the internet and can be managed by Google, Yahoo or a similar services like zimbra email hosting, the client can use this type of software and enjoy the benefits of this solution. There are three divisions within cloud computing. They are: Applications, Platforms and Infrastructure. Any of these services offers a different results for companies and individuals around the worl...

Bỏ 4 triệu mua nồi cơm điện Nhật cũ: Chồng 'cuồng' hàng bãi, vợ phát hãi

Những mặt hàng điện tử Nhật bãi có tuổi đời lên cả hàng chục năm như nồi cơm điện, máy giặt, tủ lạnh, điều hòa vẫn được nhiều khách hàng Việt Nam quan tâm. Nhân dịp chuyển về căn nhà mới mua, chị Ngân (Thanh Xuân, Hà Nội) giao nhiệm vụ cho chồng mua sắm đồ gia dụng trong bếp. Chẳng hiểu chồng chị lên mạng tìm hiểu thông tin thế nào mà tha về một chiếc bếp từ và nồi cơm điện Nhật bãi cũ mèm. Theo lời anh quảng cáo, bếp từ do Toshiba sản xuất, rất tiết kiệm điện, có thêm tính năng lò nướng. Còn nồi cơm hãng con voi Zojirushi là loại nồi cơm cao tần, có van áp suất bảo đảm cơm chín dẻo thơm. Nồi cơm Nhật bãi hình thức xấu và không có hiển thị tiếng Anh hay tiếng Việt. (Ảnh: Dân trí) Chị Ngân phải ngăn cản không thì chồng còn tiếp tục vác về một chiếc tủ lạnh cũ nữa. Chị than thở: “Chưa rõ chất lượng ra sao nhưng nhà mới mà lại dùng đồ cũ là tôi đã thấy chán rồi. Mà giá có rẻ đâu, cái bếp từ 10 triệu, nồi cơm điện 4 triệu. Với số tiền đó là tôi đủ mua bếp từ nhập khẩu rồi. Đồ Nhật...

Cách lập kế hoạch tài chính cá nhân

Kế hoạch tài chính có thể giúp bạn giải quyết món nợ tồn đọng, đảm bảo cho tương lai tài chính của bạn và thậm chí còn giúp bạn hạnh phúc và thư thái hơn.   Tùy vào hoàn cảnh, một kế hoạch tài chính phù hợp có thể không đòi hỏi bạn phải bớt tiêu tiền. Thay vào đó, bạn chỉ cần ra những quyết định tài chính hiệu quả hơn. 1- THEO DÕI THU NHẬP VÀ CHI TIÊU 1- Thu thập mọi dữ liệu cần thiết để bắt đầu theo dõi lịch sử chi tiêu của bạn. Gom các hóa đơn cũ, sao kê ngân hàng, biên lai để có thể tính toán chính xác số tiền chi tiêu mỗi tháng.