Amazon Ec2, Aws, simpleDB, amazonRDS
Amazon Ec2, Aws, simpleDB, amazonRDS
com 25-Sept-2025 Pg 1 of 7
How to deal with storage location and tenancy for securing data in Cloud
Computing?
(This document is prepared partially from LLM models)
https://www.tutorialspoint.com/cloud_computing/cloud_computing_security.htm
How to deal with storage… This document is prepared partially from LLM models Pg 1 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 2 of 7
https://www.javatpoint.com/multitenancy-in-cloud-computing
Here's a concise overview of dealing with storage location and tenancy for securing
data in cloud computing, along with an example case:
Storage location and multi-tenancy are crucial aspects of data security in cloud
computing. Cloud providers often store data across multiple geographic locations for
redundancy and performance. However, this can raise compliance and privacy
concerns. To address this:
1. Data residency: Ensure data is stored in locations that comply with relevant
regulations.
2. Data sovereignty: Be aware of laws governing data access in different
jurisdictions.
3. Encryption: Use strong encryption for data at rest and in transit.
4. Access controls: Implement robust identity and access management.
5. Tenant isolation: Ensure proper logical separation between different tenants'
data.
Example case: A multinational financial services company needs to store customer data
in the cloud while complying with various regional regulations. They work with a cloud
provider that offers:
How to deal with storage… This document is prepared partially from LLM models Pg 2 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 3 of 7
The company implements a hybrid cloud solution, keeping sensitive data on-premises
and using the cloud for less sensitive workloads. They use data classification and
tagging to ensure data is stored in appropriate locations and apply encryption and
access controls consistently across their infrastructure.
https://www.tutorialspoint.com/cloud_computing/cloud_computing_security.htm
When migrating data to the cloud, ensuring its security is paramount. Two crucial factors
to consider are storage location and tenancy.
Storage location refers to the geographical region where your data is stored. This can
influence factors like data latency, regulatory compliance, and potential risks. For
instance, if your business operates primarily in Europe, storing data in a European data
center ensures compliance with GDPR regulations. However, storing data in a region
with a different legal framework might expose it to potential risks.
Tenancy refers to the level of isolation between your data and other tenants on the
same cloud platform. In a multi-tenant environment, multiple organizations share the
same infrastructure. 1 While this can be cost-effective, it raises concerns about data
isolation. 2 Cloud providers typically employ various techniques like logical isolation,
encryption, and access controls to mitigate these risks. 3 In contrast, a single-tenant
environment provides dedicated resources for your data, offering a higher level of
security but at a potentially higher cost.
How to deal with storage… This document is prepared partially from LLM models Pg 3 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 4 of 7
Example: A healthcare organization might choose to store patient data in a data center located within the country to
comply with local healthcare regulations. To mitigate risks associated with multi-tenancy, they could opt for a private
cloud or a dedicated server within a public cloud.
Security Planning
Before deploying a particular resource to cloud, one should need to analyze
several aspects of the resource such as:
Select resource that needs to move to the cloud and analyze its sensitivity
to risk.
Consider cloud service models such as IaaS, PaaS, and SaaS. These
models require customer to be responsible for security at different levels
of service.
Consider the cloud type to be used such as public, private, community
or hybrid.
Understand the cloud service provider's system about data storage and its
transfer into and out of the cloud.
The risk in cloud deployment mainly depends upon the service models and cloud
types.
How to deal with storage… This document is prepared partially from LLM models Pg 4 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 5 of 7
Security Boundaries
https://www.tutorialspoint.com/cloud_computing/cloud_computing_security.htm
How to deal with storage… This document is prepared partially from LLM models Pg 5 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 6 of 7
Although each service model has security mechanism, the security needs also
depend upon where these services are located, in private, public, hybrid or
community cloud.
Access Control
Auditing
Authentication
Authorization
All of the service models should incorporate security mechanism operating in all
above-mentioned areas.
How to deal with storage… This document is prepared partially from LLM models Pg 6 of 7
How to deal with storage location and tenancy compiled [email protected] 25-Sept-2025 Pg 7 of 7
The client data request goes to the external service interface of proxy.
The proxy forwards the request to the broker.
The broker requests the data from cloud storage system.
The cloud storage system returns the data to the broker.
The broker returns the data to proxy.
Finally the proxy sends the data to the client.
https://www.tutorialspoint.com/cloud_computing/cloud_computing_security.htm
Encryption
Encryption helps to protect data from being compromised. It protects data that
is being transferred as well as data stored in the cloud. Although encryption
helps to protect data from any unauthorized access, it does not prevent data
loss.
How to deal with storage… This document is prepared partially from LLM models Pg 7 of 7