Cloud Computing Tutorial

Cloud Information Security

Cloud Information Security: In this tutorial, we will learn about cloud information security, its properties, key goals of information security, and the difference between cloud information security and traditional security. By Prerana Jain Last updated : June 02, 2023

What is Cloud Information Security?

Cloud computing security refers to the set of procedures, processes, and standards designed to provide information security assurance in a cloud computing environment. Cloud computing security addresses both physical and logical security issues across all the different service models of software, platform, and infrastructure. It also addresses how these services are delivered.

The core technology for protecting data in transmits to and from the cloud as well as data stored in the cloud in encryption. The goals of encrypted cloud storage are to create virtual private storage systems that maintain confidentiality and data integrity while maintaining the benefits of cloud storage.

Cloud Information Security Properties

A software must have the following three properties to be considered secure -

  • Dependability - Software that runs predictably and works properly under different conditions, including when under attack or executing on a malicious host.
  • Survivability - software that is tolerant of or resistant to attack and can recover rapidly with as minimum harm as possible.
  • Trustworthiness - Software that has a smaller number of vulnerabilities or weaknesses that can harm the software's dependability.

Difference Between Cloud Information Security and Traditional Security

The difference between cloud security and traditional security is that confidentiality based on encryption is hardly possible and the inexistent user control on the physical level. This affects directly approaches based on the electronic identity card, which now must be cloud compatible.

The other difference between cloud security and traditional security systems from the sharing of infrastructure on a massive scale. Users spamming different corporations and trust levels often interact with the same set of computing resources.

Goals of Cloud Information Security

There are three primary goals of information security are confidentiality, integrity and availability.

  • Confidentiality - confidentiality assures you that data cannot be viewed by unauthorized people. Confidentiality is concerned with preventing unauthorized people. Confidentiality is concerned with preventing the unauthorized disclosure of sensitive information. The disclosure could be intentional or it could be unintentional.
  • Integrity - Integrity assures you that data has not been changed without your knowledge. The data is internally and externally consistent.
  • Availability - Availability assures you the reliable and timely access to cloud computing resources by the appropriate personnel. Availability guarantee that the systems are functioning properly when needed.

Comments and Discussions!

Load comments ↻

Copyright © 2024 www.includehelp.com. All rights reserved.