Page 49 - Cloud Computing (Elective – III)
P. 49

Cloud Computing Security





               Cloud computing security refers to the security enforced on cloud computing
               technology. In simpler terms, cloud security provides support and security to the
               applications,  infrastructure,  and  procedures  and  protect  data  from  vulnerable
               attacks. Cloud security came into existence because of the vast infrastructure of
               cloud computing systems that runs online and requires proper maintenance daily.
               There is only one single server where all user data are stored, so in order to utilize
               resources, in order to restrict user data to get leaked or viewed by other users,
               cloud computing security handles such sensitive computing resources.

               Cloud Computing Security Works?


               Various organizations now these days have moved to cloud-based computing
               systems for ease of work and to save time and money. The business has been
               uplifted  to  new  cloud  service  technologies  replacing  the  traditional  practices.
               Thus,  to  provide  controls  and  safeguard  applications  and  cloud  applications,
               cloud security came into existence. There are a lot of risks and concerns as per as
               online  flow  of  data  is  concerned  which  includes  data  breach, data  hijack,
               unauthorized access, system malfunction, etc.

               To handle such risk and take care of the user needs and to maintain the database,
               cloud computing security ensures proper security by working in various ways:

                     Old traditional technologies lack the measurement of giving full protection
                       to the server. With the advent of cloud computing security, the data first
                       goes to the cloud instead of passing directly through the server that acts as
                       a medium. In that way, the data is transmitted to the authorized user who
                       has access to it before directly reaching the server. This maintains data
                       integrity and the cloud blocks unwanted data if any before reaching the
                       server.

                     The traditional approach consists of applications that filter the data are very
                       costly and difficult to maintain. The data filtration is done upon reaching
                       its desired network and in the midway due to large chunks of data, systems
                       get crashed and shut down completely while filtering good and bad data
                       without proper utilization. The web security services solved it by working
                       on a cloud model where data gets filtered in the secured cloud itself before
                       reaching other computing systems.

                     Cloud-based security platforms also work on a private model that consists
                       of a private cloud, isolating the unauthorized data access from the clients
                       ensuring protection from shared security platforms.
   44   45   46   47   48   49   50   51   52   53   54