Cloud Computing and Security
5th Oct 2016
Every great leap in technological development is usually accompanied by a host of mild to possibly severe risks. As time rolls on and additional developments are integrated, the risks and security concerns eventually fade off into obscurity. Cloud computing is certainly no exception; it carries with it a few security concerns that are being dealt with even as you're reading this. That's not to say that cloud computing is inherently dangerous, because it isn't. Given its current scale and usage level by most of the world's population you might even say that it is statistically safer than a visit to your local cyber café. However, once people catch on to this new technology and begin implementing it into their daily lives the security risks could potentially run rampant. Luckily, it may never actually reach this critical stage as there are various organizations working towards reinforcing cloud computing security.
What are some of the specific security risks associated with cloud computing?
- Long-term hosting capabilities
- Data recovery in the event of a catastrophe
- Who has access to data within the hosting company?
- Location of consumer data
Long-term hosting capabilities
Here's a scenario; you've been happily using a cloud computing service for a number of years and store most of your personal and business files there as well. Then one day, your provider, without warning, announces a series of 'big changes' that are to take place immediately. Will these changes affect access to your data? What if your provider is acquired by a larger conglomerate and they decide to completely restructure everything? The obvious solution for emerging cloud computing companies is to offer their customers assurances and an established plan of action, should the unthinkable occur.
Data recovery in the event of a catastrophe
Mistakes are going to happen; it doesn't matter whether your data is on a local or remote drive. A total cataclysmic failure of multiple servers could lead to the loss of consumer data. A cloud computing service provider needs to have measures in place that are capable of equalizing the fallout from a major crash.
Who has access to data within the hosting company?
The individuals that directly manage customer data might have complete access to unencrypted files. This includes outsourced IT professionals and others as well as those working directly for the provider. Assurances must be put into place by cloud computing providers that will limit access to personal data for emergency or user-defined purposes only.
Location of consumer data
Different locations have different regulations in place concerning the privacy of user data. Cloud computing providers must provide their customers with an idea on where their data is to be physically stored. For example; if a hacker decides to manipulate or steal data from a customer, but they acquired said data from a host based in a country that does not honor the current laws that are in place, then recovery and prosecution will not be possible. In order to establish a higher level of security it will be necessary for cloud computing providers to disclose the primary locations of their clients' data.
None of these problems are insurmountable however, and if history has taught us anything it's that bigger problems always lead to better solutions. Cloud computing security concerns are paving the way toward even greater computer security developments and measures. The real challenge or burgeoning cloud computing companies is going to be effectively marketing their services amid all of these serious security concerns.
Check out the Cloud Computing Certification Page for more learning opportunities around Cloud Computing