ASPECTS OF SECURITY IN THE CLOUD COMPUTING
Image may be NSFW.
Clik here to view.
security, students, university, data, traditional systems, cloud services, remote servers, web aplications, information, informations in the cloud,cloud environment, Software asservice, cloud computing
Security in the cloud computing can be as good or better than that existed in traditional systems, because providers are able to provide resources that solve security problems that many customers cannot afford. However, security is still an important issue, when data have a confidential nuance. This delayed the adoption of cloud computing to a certain extent.
Security as a service
In the cloud environment, security is provided by the suppliers. Two methods can be distinguished: the first method, is that anyone can change their delivery methods including cloud services. The second method is the cloud service providers to provide security only as a cloud service, with information from security companies.
Browser security
In the cloud environment, remote servers are used for computing. The client nodesare only used for input/ output operations, and for authorisation and authenticationof the information in the cloud. A standard web browser is a platform normally usedfor all users in the world. This can be classified into two different types: Software asservice (SaaS), Web applications, or Web 2.0. Transport Layer Security (TLS), is oftenused for data encryption and authentication of the host.
Authentication
In the environment of the cloud, the basis for access control is the authentication, access control is more important than ever since the cloud and all your data are accessible to everyone via the internet. Trusted Platform Module (TPM) is widely used and stronger than the user name and password authentication system.Trusted Computing Groups (TCG completo) is a standard on the authorization of users and other security tools of communication in real time between the supplier and the customer.
Loss of governance
In the cloud infrastructure, the customer necessarily cede control to the supplier (cloud provider) on various issues, which have a negative impact on security. At the same time, the service level agreement does not usually have the task of providing this type of service on the part of the cloud provider, which leaves a gap in security defenses.
Lock-In
This is a small selection of this type of tools, procedures or standards of data formats or interfaces of services that could ensure the data, applications, and service portability. This can make it difficult for the customer migrate from one supplier to another, or migrate the data and services to other computing environment. This introduces a particular dependence on the cloud for the provision of the service provider, especially to data portability, the most fundamental aspect.
Data protection
The cloud computing endangers data protection for the users of the cloud and its suppliers. In many cases, causes difficulties for the provider (in the role of the controller of the information) to ensure the practical effectiveness of the cloud provider data management and to ensure that data are on the right track. This problem is oftenaggravated in cases of multiple transfers of data, for example between Federated systems. On the other hand, some cloud providers, provide information of its curtailment of data practices. There are also some offers certifications in the processing of data, security activities, and data controls that take place; example, SAS70 certification. Internet data flows are linked to malware and packages lure to get user unknowninvolvement in criminal activities.
security, students, university, data, traditional systems, cloud services, remote servers, web aplications, information, informations in the cloud,cloud environment, Software asservice, cloud computing
The post ASPECTS OF SECURITY IN THE CLOUD COMPUTING appeared first on Server Dedicated.