As a beginner at using cloud computing through internet company, it is only natural to have security concerns. Thatís especially because the main use of cloud computing is at an industrial level. Business firms project sensitive data over their network. Therefore, it is mandatory to ensure there is sufficient security. Some security issues to be concerned about include:Deployment Models
Networking, software, storage and platform are the basic infrastructure that encompasses the cloud deployment model. These can either scale up or scale down cloud services, depending on three main components of the cloud. These components are:
Service Delivery Model
- Private cloud: This is a new term used by few vendors for assistance over the private network in the cloud. The private cloud is a setup within an organization for internal use only. It comprises of virtual applications and sizable resources offered by vendors. These are pooled together and made available for sharing between users. Private cloud differs from public cloud because all resources and software applications are managed and supervised by the organization itself. Therefore, only designated members and stakeholders have access to private cloud operation.
- Public cloud: This describes cloud computing in the traditional manner. This means that resources are provided on the basis of self service. This form of cloud computing is structured for pay-per-use and involves a third party provider. People using this service are less liable to security breaches. This is because there are extra security applications deployed to ensure that data is not exposed to malicious threats.
- Hybrid cloud: This is a setup in which a private cloud is linked to external cloud services. This could be one or more cloud services that are centrally managed. Therefore, it uses a secure network and operates as a single unit. Hybrid cloud provides its users with more security against threats as compared to private and public clouds. It also allows interface between other users of the cloud.
There are three main service delivery models that raise concerns:
- Infrastructure-as-a-Service (IaaS): Here cloud services are under a single umbrella. All users are at the same level, and vendors ensure availability of resources only for contracted users. These users subscribe for services on a pay-per-use basis. IaaS serves reduce the need to take huge financial investment risks. One doesnít need to purchase and install computing hardware like networking devices, servers and other processing devices. This offers functional flexibility as well, like that offered by internet company services.
Moreover, IaaS provides basic internet security options like firewalls and load balancing. Applications in the cloud require higher security that has to be installed at the userís end.
- Platform-as-a-Service (PaaS): This is a set of software applications and development tools that is hosted on a single server. PaaS is a layer on top of IaaS and offers better options for its users. There are integrated service platforms that help developers. They can tap into these applications to build their own applications. PaaS offers software developers a complete life cycle management platform. Users often experience some constraints with regards to few additional functions in this cloud service layer. There will be need to install protection and cloud malware against unauthorized access.
- Software-as-a-Service (SaaS): This model is best described as a distribution model. Here applications are hosted by vendors and made available to customers on the cloud network. The Service-Oriented-Architecture (SOA) and other approaches have become famous because of the SaaS model. SaaS allows users access to the network from all over the world. This is why it is mostly used by international businesses operating at a global level. Security is quite high and users are also required to setup firewalls.
In each of these services, intrusion by unauthorized personnel is detected. Once a breach occurs, security alerts get activated. This informs the service provider about the breach and action can be taken immediately. Sometimes users can get locked-in.
The combination of these three types of cloud services virtualizes infrastructure and physical resources that are provided for users. It caters to the needs of clients using the cloud with regards to security and interface. People on any of these clouds cannot access data of other users on the same cloud without proper authorization.Author Bio:
Emily Steves is associated with various internet security related companies as their freelance and staff writer. She has been linked with some of the best web media companies and offers various ways for internet solutions. She excels in writing articles related to, internet security, Charter internet
, best broadband, comcast deals etc.
*** Please do not forget to leave your comments about this article ***