Cloud Computing Vulnerabilities

Chris Alexander
Authentic Discourse

--

Security is a key component with cloud computing. Although cloud computing is a revolutionary way of storing and passing data between users, there are many concerns about its security and effect on privacy for the individual user. Cloud computing is not a new technology but rather a new delivery model for information and services using existing technologies. Nelson Gonzalez, a graduate of Sao Paulo University stated, “Due to the ever growing interest in cloud computing, there is an explicit and constant effort to evaluate the current trends in security for such technology, considering both problems already identified and possible solutions.” A great method of computing such as cloud computing is only as good as the security and peace of mind it allows the user to have; therefore, constantly searching and brainstorming of ways to keep it safe is critical.

One main issue regarding cloud computing security is data security. Data security is protection of data in terms of confidentiality, availability and integrity. According to Nelson, the three main components in data security are Cryptography, Redundancy, and Disposal. Cryptography is very important to secure sensitive data. Redundancy is essential to avoid data loss. Finally, you have disposal. In the cloud, the complete destruction of data, including log references and hidden backup registries, is an important requirement. These three components are crucial to the overall security of cloud computing and must be taken seriously.

Cloud computing, as of now, is the thing of the future; furthermore, most of, if not all information will be handled through a cloud eventually. Data security plays a small role in the overall concept of cloud computing security. Nelson also goes into detail about Network Security, Interfacing, Virtualization, Hypervisor vulnerabilities, Governance, compliance, and legal issues. Ultimately, remember to always be cautious when cloud computing as it is much easier to become a victim of a cyber-criminal.

Works Cited:

Gonzalez, N. (2012, July 12). A quantitative analysis of current security concerns and solutions for cloud computing. Retrieved January 1, 2015, from http://www.journalofcloudcomputing.com/content/1/1/11#

--

--