• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Protection of Sensitive Data in the Cloud

By Abhishek Ghosh June 8, 2013 8:12 am Updated on June 8, 2013

Protection of Sensitive Data in the Cloud

Advertisement

Protection of Sensitive Data in the Cloud is the key factor which determines the adoption of cloud services. Additional procedures are required for the process. But to protect a cloud environment effectively, it requires additional procedures such as identity and access management. Data Loss Prevention and Encryption must also be taken into account in the cloud. However, most study do not differentiate between private, public and hybrid cloud environments in context of protection of sensitive Data in the Cloud.

 

Protection of Sensitive Data in the Cloud : Criminals has discovered Cloud as a worthwhile resource

 

It is not surprising that the cybercriminals have been identified cloud infrastructures as worthy goal both to use and attack. A study of IT security firm questioned the providers of public cloud services and users of private clouds on cloud security in 2012 on the role of Cybercriminals on Protection of Sensitive Data in the Cloud. As an unfortunate result – attacks on cloud computing services have increased dramatically over the past twelve months. However, the targeted attacks on individual companies and public institutions, according to the analysis are rarely observed. It is dominated by widespread attacks, as well as the sending of spam emails. About 40 percent of the companies surveyed are in the opinion that the currently existing cloud offerings do not meet the security requirements desired by the customer. The suspicion is not unfounded, as another study shows.

 

Protection of Sensitive Data in the Cloud : Private Cloud Scenario

 

Companies introducing their own services operate safer than the companies relying on third party cloud service providers. Thus, private clouds are more frequently attacked than to the infrastructure by third party providers. Especially popular vulnerabilities are scans, attacks on web applications using SQL Injection and brute force attacks to get the passwords of the users and system administrators. One third of the attacks on cloud infrastructures is launched from computers in the United States, 16 percent in China. Why cloud environments of business are under attack, it is not clear from the studies. One reason could be that the cyber criminals are considered cloud computing data centers operated by service providers are better protected than the corporate networks.

Advertisement

---

 
Protection of Sensitive Data in the Cloud

 

A comprehensive cloud security strategy plays an important role for protection of sensitive data

 

The key points of a cloud security approach are the

 

  1. Protection of infrastructure
  2. Protection of data
  3. Secure authentication and user authentication (Identity Management)
  4. Protection of the terminals.

 

A cloud computing environment is characterized by decoupling of IT resources of the physical infrastructure, virtualization keyword. Virtual machines with operating systems, applications and data can be almost at will in a cloud infrastructure back and forth – in the cloud or between private and public clouds. In terms of security, this means that IT security functions have to provide as flexible best solution also. In the form of VMs In this case, for example, anti-virus and access control programs are implemented as virtual security appliances on the respective hosts.

To protect the infrastructure, i.e. hypervisor management server and application programming interfaces (API), for example, solutions like Symantec Protection Suite and VMware Shield is good to use, also software appliances such as Intel’s ESG are important. With Intel Expressway Service Gateway, an administrator can monitor and manage cloud APIs. It is important that they can centralize security and management tasks, such as patching, making backups, implementing security rules and automate the configuration management. This also applies to the exchange of a workload from a private to a public or hybrid cloud.

The protection of business-critical data is a key element in a cloud environment. This applies to information stored on a server or storage system, also for the transport of data, such as from the corporate network to a cloud service provider. When exchanging data between a company and the cloud service provider is also important to ensure that a secure connection be used, such as IPsec or SSL VPNs.

We have a separate article on Security in the Cloud, which is definitely a sort of supplementary guide of this article on Protection of Sensitive Data in the Cloud.

 
Abhishek-Ghosh

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Protection of Sensitive Data in the Cloud

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • OpenShift OctoPress Auto install Script

    OpenShift OctoPress Auto install Script is an Advanced Script to Run OctoPress on Free OpenShift PaaS Practically Without Any Knowing Ruby or Git.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. Avatarrsgold says

    June 13, 2013 at 7:35 am

    Companies introducing their own services operate safer than the companies relying on third party cloud service providers.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy