Quantcast
Channel: Healthcare – Eureka
Viewing all articles
Browse latest Browse all 7

Cloud Computing – a Great Invention

$
0
0

You’re in the office and you need an important document that’s stored on your home computer. It’s annoying to have to go home to get it, right?

Individuals, companies and organizations, have infinite processing and storage resources at their disposal, thanks to cloud computing. But, it’s a service that relies on the internet and consequently needs to have a high level of security that allows for use without the risk of a breach.

Risks of cloud storage

When you upload data to the cloud, you’re giving up control to the provider so security can be compromised. Unfortunately, sometimes the standard service level agreements don’t provide enough security.

One thing to consider when choosing a cloud computing company is they may frequently change the external company that stores the data. When this happens, it’s necessary to migrate all the data.

Another problem that exists is that this type of system functions with a multi-tenacy to allow for the sharing of resources. Many failures occur when you try to isolate and separate storage devices, memory, or users of cloud services. However, the number of attacks by isolated devices are much lower than those suffered by traditional operating systems.

If we consider the requirements, we see that there are risks when it comes to external security certifications or the quality of services offered by companies when using cloud computing. The emergence of these issues comes from the lack of authorization that the provider has to communicate to the user regarding the process of compliance and their internal security policies. Therefore, the company doesn’t know if the requirements about the treatment of data are being fulfilled since it doesn’t know what is being done with the information it has stored in the cloud.

We must mention that the deletion of data cannot yet be guaranteed effectively and safely. In addition, sometimes attacks can be targeted to the cloud service provider. When information is moved between different sources provided by the cloud and the data is not deleted properly, people who shouldn’t have access to it may be able to see it.

Security measures in cloud computing

The most significant security measures in cloud computing are data encryption and network resiliency.

Data encryption allows for the protection of critical infrastructures that are used in the cloud. This can be done using Layer 2 and Layer 3 protocols of the OSI model which can ensure the necessary connection of security levels.

Network resiliency ensures that the infrastructure and its communications use a reliable connection. This is done through a connection level that’s consistent and permanent so the service does not suffer from any drops.

Storing large volumes of data carries a major security risk. It’s important to note that data theft can have legal repercussions and/or a negative impact on reputation and, therefore, a high level of protection must be implemented.

The post Cloud Computing – a Great Invention appeared first on Eureka.


Viewing all articles
Browse latest Browse all 7

Trending Articles