Multimedia University, Bukit Beruang**We aren't endorsed by this school
Course
IT 1221
Subject
Computer Science
Date
Dec 16, 2024
Pages
18
Uploaded by ProfessorFlowerDog53
Securing the CloudCloud Computing – TCC6313Lecture 04
Cloud Computing – TCC63132
TopicsIssues and ConcernsMethodologies and PracticesCloud Computing – TCC63133
Issues and ConcernsCloud Computing – TCC6313
IntroductionThe significant benefits of scalability and elasticity in cloud comes at the price of loss of control by the data owners, and the consequent security threats.The security and privacy issues and challenges involved can vary in different deployment and service models.Highlight security issues that need to be considered when using the cloud to offer or enjoy services in the three fundamental cloud service models: IaaS, PaaS and SaaS.Discuss security aspects affected by cloud paradigm in relations to the data security lifecycle (refer textbook Figure 17.1)5Cloud Computing – TCC6313
Confidentiality, Integrity, and Availability in the CloudThe classical CIA (confidentiality, integrity, and availability) paradigm to classify security problems:Confidentiality: Guaranteeing proper protection of confidential or sensitive information stored or processed in the cloud.Integrity: Guaranteeing the authenticity of the parties (users and providers) interacting in the cloud, the data stored at external providers, and the responses returned from queries and computations.Availability: Providing the ability to define and verify that providers satisfy requirements expressed in service-level agreements (SLAs) established between data owners/users and providers.6Cloud Computing – TCC6313
Confidentiality, Integrity, and Availability in the CloudCloud Computing – TCC6313
Confidentiality, Integrity, and Availability in the CloudCloud Computing – TCC6313
Cloud Computing – TCC6313
Methodologies and PracticesCloud Computing – TCC6313
Cloud Business Continuity and Disaster Recovery Planning [Refer textbook 18.5]5Cloud Computing – TCC6313Cloud BC/DR planning ensures that businesses can continue operations and recover quickly after disruptions or disasters. Leverages the scalability, flexibility, and cost-efficiency of cloud infrastructure to provide robust backup and recovery solutions.
ConclusionThe chapter emphasizes the need for trustworthy cloud forensics, highlighting that most solutions, such as evidence acquisition and logging APIs, depend on cloud service providers (CSPs) and collaborative efforts from policymakers, organizations, and academia.Cloud computing introduces unique security challenges due to external provider interactions, growing threats, and differences in cloud, requiring custom-made solutions beyond traditional IT security measures.By adopting multilayered defense mechanisms, best practices, and mature processes, organizations can address these challenges and transition securely to the cloud while minimizing risks.Cloud Computing – TCC6313