CLOUD COMPUTING SECURITY

Loading...
  1. Introduction

Cloud Computing Security (cloud computing security or abbreviated cloud security) is a field of study including policy issues, technology, and controls to protect data and the architecture of the cloud.

  1. Security issues related to cloud computing

Cloud computing security, consists of two arrays: the security issues of cloud computing providers (organizations providing software, platform or infrastructure) and encountered the problem of the security of the customer experience. The cloud computing provider to ensure that the infrastructure that they offer are safe with the sense that the data and the application of the client are protected. Meanwhile, the customer must ensure that the providers have adopted appropriate security measures to protect their information.

  1. The driver of cloud security

The security architecture of the cloud [1] effective only if the deployment was the appropriate defense method. Security architecture, cloud computing efficiency should recognize the problems relating to the security. The management of privacy issues related to the control and security control. The controls are in place to protect the weaknesses in the system and reduce the impact of an attack. While there are many ways to control the security of cloud computing, there are some popular ways: 

3.1. Block

This control is set to prevent the assault with the intent to cloud computing system. Relatively similar with a sign warning in fences or property, these controls do not reduce the capability of the system being hurt.

Loading...

3.2. Prevention

The controls enhance the power of the system by managing the vulnerabilities. Preventive control will protect the flaw of the system. If an attack happens, preventive controls are in place to ensure minimal damage and security violation of the system.

3.3 Repair

Adjustment controls, repairs are used to reduce the impact of attacks. Unlike preventive controls, repair controls are implemented when attacks occur.

3.4 Troubleshooting

Metering controls are used to detect any possible attack on the system. In the event of an attack, the detection control will signal the precautionary control or remedy to solve the problem.

  1. Aspects of cloud security

The aspects of cloud computing security are aggregated into the three most common aspects: security and confidentiality, compliance, and legal or contractual issues.

4.1. Security and privacy

  • Identity management
  • Personal security
  • The reasonableness
  • Application security
  • Computer privacy
  • Legal issues

4.2. Policy

Many regulations relating to the storage and use of data, including the payment card industry data security standard (PCI DSS), the health insurance and Accountability Act (HIPAA), Sarbanes-Oxley. Many of the rules on the regular reporting requirements and was audited. Cloud providers must allow their customers can respond in accordance with the regulations.

Loading...