Cloud Computing : Applications And Data Storage And Processing Capacity

828 Words4 Pages
Cloud computing:
Cloud computing is where software applications, data storage and processing capacity are accessed over internet. Organizations use cloud computing in a variety of different service models like IAAS, PAAS and SAAS. These are the three building blocks of cloud computing.
• IAAS (Infrastructure as a service) - Allows the users to run any application of their choice on a cloud hardware.
• PAAS (Platform as a service) - Allows users to create their own cloud applications using supplier specific tools and languages.
• SAAS (Software as a service) - Allows users to run existing online applications. Off-the-shelf applications are accessed via internet.
All of these allow users to run applications and store data online. These
…show more content…
Resources can be accessed from anywhere at any time with an internet connection. With adoption there come security concerns. There are number of security issues/concerns and threats associated with cloud computing. Among them the data security and data residency are the key concerns when moving to the cloud. Some of the concerns related to data residency are:
1. Who manages the data?
2. Who has access to the data?
3. Where is the data stored?
4. What Laws apply to the data?
5. How secure is your data?
6. Will you know when the data is breached?
7. Will the data remain in the cloud even after the termination of the service?
Below are the top 9 cloud computing threats based on a survey of industry experts. Threats are arranged in the order of severity with the first one being the most severe and the last one is the least severe.
1. Data breaches.
There is no wonder why Data breach is No. 1 in the list. The fear of exposing data stopped many companies from adopting cloud computing despite of all the business benefits. Even with lot of technology advancements in the field of clod computing, data breach is a reality which needs to be addressed adequately. Some of the best practices to control data breaches are:
• Always use strong encryption for securing data.
• Use Authentication & Access control mechanism to control the access to data.
• Use Proper data governance to manage data lifecycle.

2. Data Loss

Most of the data loss happens by misplacing the data or accidently
Get Access