Cloud Computing

Read Complete Research Material



Cloud Computing

Introduction

Cloud functions are used in a similar way both in public and in private. The applications that are accessed over the internet are hosted on a server. Whether a Software as a Service (SaaS) version of customer relationship management (CRM) software is used by the organization either in establishing offsite backups for the company's data and information, or designing a social media marketing page, in all the cases company is believing in a third-party by sharing information about its business, dealing and most probably is customers. Small businesses important cost-saving advantages are provided by the cloud computing. These benefits include pay-as-you-go access to powerful hardware and sophisticated software, but the benefits emerge with definite security risks.

Discussion

Security Recommendations

Following security concerns should be kept in mind when assessing probable providers of cloud-based:

1. Secure Data Transfer. It is based on the travelling of traffic between the service accessing in the cloud and network must pass through the Internet. It is very necessary to guarantee that the data is continuously travelling within a protective direction. It is important to get the browser connected only to the service provider through a URL beginning with”https.” It is important for the data to be authenticated and encrypted implementing protocols of industry standard like IPsec (Internet Protocol Security), which is designed especially for the purpose of providing security to the traffic of Internet (Ronald, 2010).

2. Secure Software Interfaces. It is highly recommended by the Cloud Security Alliance (CSA) that the user should be informed with the services provided by APIs and software interfaces which are designed for the purpose of interacting with cloud computing services. Dependence on a fragile set of APIs and interfaces must be avoided as it can lead the organization to a number of various security concerns relevant to the integrity, availability accountability and confidentiality (Ronald, 2010).

3.  Secure Stored Data. When the data is available by the servers of the provider and it can easily be used by the service of cloud computing network. It should be encrypted securely during its utilization by the cloud service. It is warned that there are only some cloud providers who guarantee the security for data being used for disposing of your data or within the application. It is needed to stay connect4ed with the cloud providers in order to acknowledge with the process of securing data not only when it's in transition state but also when it is accessed by cloud-based applications on their servers (Halpert, 2011).

4. User Access Control. An employee of a company can easily access the data and no one is able to personally control those people. So , it is recommended to carefully examine the importance and risk probability of the data that is allowed and secondly , pursue the suggestions to ask the supplier for details related to the people authorized to for data management as well as the point of access they possess.

5. Separation of Data. Resources are shared by every cloud-based service. These resources include different parts of the provider's ...
Related Ads