New Cloud Computing Technology and Cloud Computing Information

Jun 26, 2017

Cloud Computing Security: Maintaining the Integrity of Data and Information Against Attack

Information About Cloud Computing Security

Cloud Computing Security
Cloud Computing Security

Cloud Computing Security is the process of controlling policies and technology in order to adhere to regulatory compliance rules, to protect data and information, and to protect the applications and infrastructure that is used in cloud computing.

Cloud Computing and the Role of Security

To explain Cloud Computing Security and its importance further, one must first explain what Cloud Computing is. Cloud Computing is the act of using remote servers hosted on the internet (thus, called the “Cloud,”) in order to store, process, and manage information without requiring tangible hard drives, thumb drives, personal computers, or a local server. This type of computing has become more popular with increasing use of new Cloud-based applications that save documents and photos as well as manage information in a convenient and centralized location.

With sensitive information and data stored out there in the “Cloud,” there is always the need for security in order to protect that information, which can range from sensitive/private documents, photographs, business information, confidential information, and much more. Everyone from the everyday person to Fortune 500 companies use Cloud Computing to centralize information and allow the management and processing of information to become easily available to employees.

This is the modern version of the filing cabinet, brought into the 21st century and out of brick and mortar buildings and into cyberspace. Security must, therefore, be cyber-based and ready to defend the Cloud in ways that traditional storage does not have to. On the internet, all information is at risk of being compromised, stolen, broken into, or even resulting in permanent data loss.

Data breaches, hacking, hijacking of accounts, and other malicious activities occur every day. This is what makes Cloud Computing Security an integral part of the success of Cloud Computing technology and applications.

Types of Cloud Computing Security

The types of cloud computing security methods depends on the type of service models used by organizations (such as SaaS, IaaS, and PaaS) and deployment models (such as Hybrid Cloud Computing, Private, Public, and Community).

As the nature of the Cloud requires a stable provider and user, so must Cloud security. The Cloud service provider must secure their infrastructure and their clients’ applications/data; while the user(s) must meet their end and ensure that they are taking the proper security measures to fortify their application (such as using strong passwords and changing them frequently) with authentication measures.

Security Architecture and Controls

Many types of Cloud Computing Security begin with the most important part of the Cloud: the security architecture. Effective cloud security architecture needs to be able to detect issues that arise with the management of security. Once detected, security management fixes these issues with a series of security controls. These controls safeguard weaknesses in the system and are effective in reducing the damage of an attack.

There are many types of controls used in cloud security architecture, most of which can be found in the following categories:

-Deterrent controls: A simple deterrent much like a warning sign that can reduce threat potential by informing potential attackers that there will be consequences.

-Detective controls: As it sounds, this is intended to detect and react to incidents. When there is an attack or intrusion, this control will signal the use of preventative or corrective controls to address the problem.

-Preventive controls: As one of the most popular controls, this strengthens the Cloud by reducing or eliminating vulnerabilities. Examples are the use of strong authentication of cloud users, making it unlikely that unauthorized users can successfully access the Cloud system.

-Corrective controls: This reduces the consequences of an attack by mitigating the damage. During or after an attack, corrective controls can do things such as restoring backups in order to rebuild a compromised system.

These are all simple, but very effective controls in Cloud security, and a staple among Cloud Computing providers and security management.


Other types of security can include advanced encryption algorithms, which are effective in increasing protection of information and Cloud users’ privacy. CP-ABE, KP-ABE, FHE, and SE are all attribute-based and fully homomorphic encryption types (the first two and the latter two, respectively) that are applied into the Cloud Computing itself as its own security.


With the use of stable security architecture, security controls, and encryption, one can create a strong plan of security on any Cloud platform.

You Might Be Interested in: Cloud Computing Platforms


Post a Comment

Popular Posts