Cloud Computing is increasingly becoming popular due to large sets of the data output of various programs run by multiple enterprise applications. Cloud Computing refers to the network solutions for providing on-demand access to the shared pool of configurable and dependable computing resources, e.g., network, servers, storage, applications, services etc. As most enterprises are moving their data towards Cloud, the confidentiality, integrity and availability of the data have emerged to be the prime concern lately.
Cloud Deployment Models
Problems faced by the Organisations in the Cloud
Several security concerns and risks are associated with data in Cloud which are-
Data Security in Cloud Computing – As most enterprises have moved to store their sensitive data in Cloud, the security of Cloud has emerged out to be of immense importance. The data that threatens its security in Cloud is of two types – Data at rest and data in transit. Data security in Cloud also follows the CIA triad, which is Confidentiality, Integrity and Availability. The techniques used to protect Cloud data are similar to the techniques used to preserve the traditional data centre data. These techniques include- Authentication and Identity, Access Control, Encryption, Secure deletion, Integrity checking etc.
Authentication and Identity – Authentication of users can take several forms, but all are based on traditional authentication mechanism, Cryptography and the combination of authentication factors such as something an individual knows, something they possess, and something unique to them. The problems faced during authentication in Cloud are due to multiple CSPs because synchronising the entire enterprise information is not scalable.
Access Control Techniques – Access Control mechanisms support separation and integrity of different levels or categories of information belonging to various parties. The most common access control models are:
- Discretionary Access Control (DAC)
- Role-Based Access Control (RBAC)
- Mandatory Access Control (MAC)
Hidden Partition – Data in motion will be secured by maintaining the integrity and confidentiality of data. Encryption combined with authentication when applied to the data in motion can safely pass the data. Transferring data by programmatic means, manual file transfer, or using a browser such as HTTPS, SSL, or TLS are the mostly used security protocols. A PKI is used to authenticate the transaction and encryption algorithms to protect the payload.