0% found this document useful (0 votes)
57 views1 page

Cloud Security

Security in cloud computing involves encrypting data stored in the cloud, using proxy and brokerage services to restrict client access to shared data, and analyzing aspects of resources like their sensitivity to risk before deploying them to the cloud. Planning for security requires considering the cloud service model, type, how data is stored and transferred, and understanding that risk depends on the service model and type used. Boundaries of responsibility for security are defined between customers and providers depending on the service model.

Uploaded by

Ibrahim Mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views1 page

Cloud Security

Security in cloud computing involves encrypting data stored in the cloud, using proxy and brokerage services to restrict client access to shared data, and analyzing aspects of resources like their sensitivity to risk before deploying them to the cloud. Planning for security requires considering the cloud service model, type, how data is stored and transferred, and understanding that risk depends on the service model and type used. Boundaries of responsibility for security are defined between customers and providers depending on the service model.

Uploaded by

Ibrahim Mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Security in cloud computing is a major concern.

Data in cloud should be stored in


encrypted form. To restrict client from accessing the shared data directly, proxy and
brokerage services should be employed.

Security Planning
Before deploying a particular resource to cloud, one should need to analyze several
aspects of the resource such as:
• Select resource that needs to move to the cloud and analyze its sensitivity to risk.
• Consider cloud service models such as IaaS, PaaS, and SaaS. These models
require customer to be responsible for security at different levels of service.
• Consider the cloud type to be used such as public, private,
community or hybrid.
• Understand the cloud service provider's system about data storage and its transfer
into and out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud types.

Understanding Security of Cloud


Security Boundaries
A particular service model defines the boundary between the responsibilities of service
provider and customer. Cloud Security Alliance (CSA) stack model defines the
boundaries between each service model and shows how different functional units relate
to each other. The following diagram shows the CSA stack model:

You might also like