Cloud Information Security

Here, we are going to learn about the cloud information security, its properties along with the key goals of information security.
Submitted by Prerana Jain, on January 07, 2021

Cloud Security

Cloud computing security refers to the set of procedures, processes, and standards designed to provide information security assurance in a cloud computing environment. Cloud computing security addresses both physical and logical security issues across all the different service models of software, platform, and infrastructure. It also addresses how these services are delivered.

The core technology for protecting data in transmits to and from the cloud as well as data stored in the cloud in encryption. The goals of encrypted cloud storage are to create virtual private storage systems that maintain confidentiality and data integrity while maintaining the benefits of cloud storage.


A software must have the following three properties to be considered secure -

  • Dependability - Software that runs predictably and works properly under different conditions, including when under attack or executing on a malicious host.
  • Survivability - software that is tolerant of or resistant to attack and can recover rapidly with as minimum harm as possible.
  • Trustworthiness - Software that has a smaller number of vulnerabilities or weaknesses that can harm the software's dependability.

Different between Cloud Information Security and Traditional Security

  1. The difference between cloud security and traditional security is the confidentiality based on encryption is hardly possible and the inexistent user control on the physical level. This affects directly to approaches based on the electronic identity card, which now must be cloud compatible.
  2. The other difference between cloud security and traditional security systems from the sharing of infrastructure on a massive scale. Users spamming different corporations and trust levels often interact with the same set of computing resources.

Goals of Information Security

There are three primary goals of information security are confidentiality, integrity and availability.

  • Confidentiality - confidentiality assures you that data cannot be viewed by unauthorized people. Confidentiality is concerned with preventing unauthorized people. Confidentiality is concerned with preventing the unauthorized disclosure of sensitive information. The disclosure could be intentional or it could be unintentional.
  • Integrity - Integrity assures you that data has not been changed without your knowledge. The data is internally and externally consistent.
  • Availability - Availability assures you the reliable and timely access to cloud computing resources by the appropriate personnel. Availability guarantee that the systems are functioning properly when needed.


Comments and Discussions



Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© some rights reserved.