Data, for any company, is most important than anything. Companies will take a lot of security measures to ensure the data security and unwanted hacks. This is the major reason companies, which are into data sensitive fields; take a back seat when talking about the cloud computing services. Though, the service providers have been taking the important risk mitigation steps to ensure the data security, it is a long way to go to ensure the complete security for the data.
Experts from University of California and Massachusetts Institute of Technology have recently released a report on the dark spots of cloud computing and how the data, which is stored on cloud computing is vulnerable to numerous threats. They simply emphasized on the potential risks of using the third party cloud to deploy the sensitive data. As most of the people know the cloud computing space is a shared space. With this thing, any malicious user can place a virtual private cloud on a close proximity to the target server. As cloud environment is a share environment, there is a threat of data which is stored on shared environment unless clear-cut precautions towards the security measures are not taken.
[...] So, there is security vulnerability problem in each and every platform of could computing. It is very important to understand the platform architectures of all these models to know what kind of security vulnerabilities are influenced by what model. The cloud reference architecture can be divided into 3 major parts. The first one is cloud-specific infrastructure; the second one is non-cloud or supporting infrastructure; and the third one is cloud service consumer. Obviously, a could-specific infrastructure is a part of cloud environment. [...]
[...] Security vulnerabilities of cloud computing Data, for any company, is most important than anything. Companies will take a lot of security measures to ensure the data security and unwanted hacks. This is the major reason companies, which are into data sensitive fields; take a back seat when talking about the cloud computing services. Though, the service providers have been taking the important risk mitigation steps to ensure the data security, it is a long way to go to ensure the complete security for the data. [...]
[...] Yes, resource sharing is one of the prime characteristic of the cloud computing. The resources that are allocated to one system may be reallocated to another system in future. This may lead to data recovery vulnerability. There is threat for the data, which was written by other user previously. Unauthorized access to management interface is another cloud computing vulnerability for that matter. Yes, in any cloud computing environment, access to data is only happens only with the authorized access to management interface. [...]
[...] Private Clouds Take Shape. InformationWeek. Retrieved 2010-08-22. Foster, I (1998). The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publisher Gentry, C. (2009). Fully Homomorphic Encryption Using Ideal Lattices. STOC. George Reese (2009). Cloud Application Architectures. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee