Unit 4 Cloud Securing Operations and Applications
Unit 4 Cloud Securing Operations and Applications
Security Boundaries
Security is one of the major concerns of cloud computing. While storing the data on the cloud
proper encryption must be applied for the security aspects. For restricting clients from accessing
shared data on the cloud server, proper brokerage and proxy should be applied on the server.
• On first step recognize and analyze sensitivity to risk of the resource which is going to
deploy on the cloud.
• Consider the model of the cloud i.e. IaaS, PaaS, and SaaS. These models are requiring
customers to be responsible for the security aspects at the various levels.
• Have to taken in consideration is cloud type like, public, private or hybrid kind of cloud.
• Understand the cloud service provider’s system about data storage and transfer.
• In cloud, the risk is always depends on the cloud service type and the models.
• Iaas is the most basic level of the Service. There are other two levels of the services
above the Iaas is PaaS and SaaS.
• As and when moving the upwards, each of the service inherits all the security and
capabilities concerns of the model which is beneath.
• As shown in the figure IaaS provides only the infrastructure where as PaaS facilitates with
platform development environment and above all SaaS serves operating environment.
• SaaS provides the most level of the integrated security and integrated functionality while
IaaS has the least level of integrated security and functionality.
• The CSA stack model illustrates the security boundaries at which level cloud service
provider is responsible and from where the customer’s responsibilities begins.
• Any security aspects below the security boundary must be built into the system and have
to maintain by the customer.
• To manage the cloud operations, take the following points into consideration.
• Organization should always use the right tools and resources to do any operations in
cloud.
• All the operations must be performed on the right time and at the right cost only.
• For the repetitive task/operation, the process should be standardized and automated on
the cloud.
• With the use of the efficient process, one should eliminate the extra efforts and
redundancy of the operation.
• Quality of the work should be maintain for the avoidance of the re-work afterward.
Cloud Applications
Cloud service providers provide various applications in the field of art, business, data storage
and backup services, education, entertainment, management, social networking, etc.
The most widely used cloud computing applications are given below –
1. Art Applications
Cloud computing offers various art applications for quickly and easily design attractive cards,
booklets, and images. Some most commonly used cloud art applications are given below:
2. Business Applications
Business applications are based on cloud service providers. Today, every organization requires
the cloud business application to grow their business. It also ensures that business applications
are 24*7 available to users.
A list of data storage and backup applications in the cloud are given below -
4. Education Applications
Cloud computing in the education sector becomes very popular. It offers various online
distance learning platforms and student information portals to the students. The advantage
of using cloud in the field of education is that it offers strong virtual classroom environments,
Ease of accessibility, secure data storage, scalability, greater reach for the students, and minimal
hardware requirements for the applications.
Google Apps for Education, Chromebooks for Education, Tablets with Google Play for
Education, AWS in Education
5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact with the target audience. Cloud
computing offers various entertainment applications such as online games and video
conferencing.
6. Management Applications
Cloud computing offers various cloud management tools which help admins to manage all
types of cloud activities, such as resource deployment, data integration, and disaster recovery.
These management tools also provide administrative control over the platforms, applications,
and infrastructure.
7. Social Applications
Social cloud applications allow a large number of users to connect with each other using social
networking applications such as Facebook, Twitter, Linkedln, etc.