Page 49 - Cloud Computing (Elective – III)
P. 49
Cloud Computing Security
Cloud computing security refers to the security enforced on cloud computing
technology. In simpler terms, cloud security provides support and security to the
applications, infrastructure, and procedures and protect data from vulnerable
attacks. Cloud security came into existence because of the vast infrastructure of
cloud computing systems that runs online and requires proper maintenance daily.
There is only one single server where all user data are stored, so in order to utilize
resources, in order to restrict user data to get leaked or viewed by other users,
cloud computing security handles such sensitive computing resources.
Cloud Computing Security Works?
Various organizations now these days have moved to cloud-based computing
systems for ease of work and to save time and money. The business has been
uplifted to new cloud service technologies replacing the traditional practices.
Thus, to provide controls and safeguard applications and cloud applications,
cloud security came into existence. There are a lot of risks and concerns as per as
online flow of data is concerned which includes data breach, data hijack,
unauthorized access, system malfunction, etc.
To handle such risk and take care of the user needs and to maintain the database,
cloud computing security ensures proper security by working in various ways:
Old traditional technologies lack the measurement of giving full protection
to the server. With the advent of cloud computing security, the data first
goes to the cloud instead of passing directly through the server that acts as
a medium. In that way, the data is transmitted to the authorized user who
has access to it before directly reaching the server. This maintains data
integrity and the cloud blocks unwanted data if any before reaching the
server.
The traditional approach consists of applications that filter the data are very
costly and difficult to maintain. The data filtration is done upon reaching
its desired network and in the midway due to large chunks of data, systems
get crashed and shut down completely while filtering good and bad data
without proper utilization. The web security services solved it by working
on a cloud model where data gets filtered in the secured cloud itself before
reaching other computing systems.
Cloud-based security platforms also work on a private model that consists
of a private cloud, isolating the unauthorized data access from the clients
ensuring protection from shared security platforms.