0% found this document useful (0 votes)
8 views6 pages

Unit 4 Cloud Securing Operations and Applications

The document discusses cloud security, emphasizing the importance of encryption and proper access controls for data stored in the cloud. It outlines the planning necessary for cloud security, including understanding the sensitivity of resources, cloud models, and the responsibilities of both service providers and customers as defined by the Cloud Security Alliance (CSA). Additionally, it highlights various cloud applications across different sectors such as art, business, education, and entertainment, showcasing their functionalities and benefits.

Uploaded by

pablolathiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views6 pages

Unit 4 Cloud Securing Operations and Applications

The document discusses cloud security, emphasizing the importance of encryption and proper access controls for data stored in the cloud. It outlines the planning necessary for cloud security, including understanding the sensitivity of resources, cloud models, and the responsibilities of both service providers and customers as defined by the Cloud Security Alliance (CSA). Additionally, it highlights various cloud applications across different sectors such as art, business, education, and entertainment, showcasing their functionalities and benefits.

Uploaded by

pablolathiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit 4 Cloud Securing, Operations and Applications

Security Boundaries
Security is one of the major concerns of cloud computing. While storing the data on the cloud
proper encryption must be applied for the security aspects. For restricting clients from accessing
shared data on the cloud server, proper brokerage and proxy should be applied on the server.

Planning of the Security


• Before deploying data or resources on cloud, organization should analyze the following
aspects of the cloud resources.

• On first step recognize and analyze sensitivity to risk of the resource which is going to
deploy on the cloud.

• Consider the model of the cloud i.e. IaaS, PaaS, and SaaS. These models are requiring
customers to be responsible for the security aspects at the various levels.

• Have to taken in consideration is cloud type like, public, private or hybrid kind of cloud.

• Understand the cloud service provider’s system about data storage and transfer.

• In cloud, the risk is always depends on the cloud service type and the models.

Cloud Security Alliance- CSA


• There is a particular model in the cloud which defines boundary between the
responsibility of cloud service provider and the customer. The CSA- Cloud Security
Alliance is a stack model which defines the boundaries between each service model of
the cloud and shows the difference between function units related to each other.

Prep By Akansha Srivastav Page 1


Unit 4 Cloud Securing, Operations and Applications

Key Points to CSA model

• Iaas is the most basic level of the Service. There are other two levels of the services
above the Iaas is PaaS and SaaS.

• As and when moving the upwards, each of the service inherits all the security and
capabilities concerns of the model which is beneath.

• As shown in the figure IaaS provides only the infrastructure where as PaaS facilitates with
platform development environment and above all SaaS serves operating environment.

• SaaS provides the most level of the integrated security and integrated functionality while
IaaS has the least level of integrated security and functionality.

• The CSA stack model illustrates the security boundaries at which level cloud service
provider is responsible and from where the customer’s responsibilities begins.

• Any security aspects below the security boundary must be built into the system and have
to maintain by the customer.

Prep By Akansha Srivastav Page 2


Unit 4 Cloud Securing, Operations and Applications

Cloud operations and its management concept

• To manage the cloud operations, take the following points into consideration.

• Organization should always use the right tools and resources to do any operations in
cloud.

• All the operations must be performed on the right time and at the right cost only.

• Selection of the most appropriate resources is mandatory for the operation


management.

• For the repetitive task/operation, the process should be standardized and automated on
the cloud.

• With the use of the efficient process, one should eliminate the extra efforts and
redundancy of the operation.

• Quality of the work should be maintain for the avoidance of the re-work afterward.

Prep By Akansha Srivastav Page 3


Unit 4 Cloud Securing, Operations and Applications

Cloud Applications

Cloud service providers provide various applications in the field of art, business, data storage
and backup services, education, entertainment, management, social networking, etc.

The most widely used cloud computing applications are given below –

1. Art Applications
Cloud computing offers various art applications for quickly and easily design attractive cards,
booklets, and images. Some most commonly used cloud art applications are given below:

Moo, Vistaprint, Adobe Creative Cloud

2. Business Applications

Business applications are based on cloud service providers. Today, every organization requires
the cloud business application to grow their business. It also ensures that business applications
are 24*7 available to users.

There are the following business applications of cloud computing -

MailChimp, Salesforce, Chatter, Bitrix24, Paypal, Slack, Quickbooks.

Prep By Akansha Srivastav Page 4


Unit 4 Cloud Securing, Operations and Applications

3. Data Storage and Backup Applications


Cloud computing allows us to store information (data, files, images, audios, and videos) on the
cloud and access this information using an internet connection. As the cloud provider is
responsible for providing security, so they offer various backup recovery application for
retrieving the lost data.

A list of data storage and backup applications in the cloud are given below -

Box.com, Mozy, Joukuu, Google G Suite

4. Education Applications
Cloud computing in the education sector becomes very popular. It offers various online
distance learning platforms and student information portals to the students. The advantage
of using cloud in the field of education is that it offers strong virtual classroom environments,
Ease of accessibility, secure data storage, scalability, greater reach for the students, and minimal
hardware requirements for the applications.

There are the following education applications offered by the cloud -

Google Apps for Education, Chromebooks for Education, Tablets with Google Play for
Education, AWS in Education

5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact with the target audience. Cloud
computing offers various entertainment applications such as online games and video
conferencing.

Online games, Video Conferencing Apps

6. Management Applications
Cloud computing offers various cloud management tools which help admins to manage all
types of cloud activities, such as resource deployment, data integration, and disaster recovery.
These management tools also provide administrative control over the platforms, applications,
and infrastructure.

Prep By Akansha Srivastav Page 5


Unit 4 Cloud Securing, Operations and Applications

Some important management applications are -

Toggl, Evernote, Outright, GoToMeeting, Social Applications

7. Social Applications
Social cloud applications allow a large number of users to connect with each other using social
networking applications such as Facebook, Twitter, Linkedln, etc.

Prep By Akansha Srivastav Page 6

You might also like