Security in the Cloud Essay

2440 Words Oct 5th, 2012 10 Pages
Problem Statement Discussion and Justification Cloud users face security threats both from outside and inside the cloud. Many of the security issues involved in protecting clouds from outside threats are similar to those already facing large data centers. In the cloud, however, this responsibility is divided among potentially many parties, including the cloud user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for physical security, and likely for enforcing external firewall policies. Security for intermediate layers of the software stack is shared between the user and the …show more content…
The one important exception is the risk of inadvertent data loss. It's difficult to imagine someone spying on the contents of virtual machine memory; it's easy to imagine a hard disk being disposed of without being wiped, or a permissions bug making data visible improperly.
Traditional attacks on software They are related to the vulnerability of network protocols, operating systems, modular components, and others. These are traditional threats, and to protect from them it will be sufficient to install an anti-virus, firewall, IPS, and other components discussed. It is important that these remedies should be adapted to a cloud infrastructure, and work effectively in virtualization (Winkler, 2011).
Functional attacks on elements of the cloud
This type of attacks is associated with multi-layer nature of clouds, the general principle of security that the general protection of the system is equal to the protection of the weakest link. Thus, a successful DoS-attack on the reverse proxy placed in front of the cloud will block the access to the entire cloud, despite the fact that all the connections inside the cloud will operate without interference (Winkler, 2011). Similarly, SQL-injection coming through an application server will provide access to system data regardless of the access rules in data storage layer. To protect against functional attacks each layer of the cloud should use a specific means of

More about Security in the Cloud Essay

Open Document