Mimp Gtu - CC
Mimp Gtu - CC
Multi-cloud. Using multiple different cloud services from separate cloud providers
can help subscribers find the best cloud service fit for diverse workloads with specific
requirements.
Storage. Large amounts of data can be stored remotely and accessed easily. Clients
only have to pay for storage that they actually use.
Disaster recovery. Cloud offers faster recovery than traditional on-premises DR.
Furthermore, it's offered at lower costs.
Data backup. Cloud backup options are generally easier to use. Users don't have to
worry about availability and computing capacity, and the cloud provider manages
data security.
Artificial intelligence as a service. Cloud computing lets individuals without formal
knowledge or expertise in data sciences reap the benefits of AIaaS. For example, a
web developer might create a facial recognition app with their web development
skills. AI is available as a service in the cloud and accessible via the API. This lets
users automate routine tasks, saving time and personnel costs. Businesses can also
enhance decision-making by using AI to predict outcomes based on historical
datasets.
Internet of things. Cloud computing simplifies the processing and management of
data from IoT devices. Cloud platforms offer the scalability and processing capacity
required to handle the enormous amounts of data produced by IoT devices,
facilitating real-time analytics and decision-making. For example, an IoT device
system such as Google Nest or Amazon Alexa can collect data on how much energy
is used inside a smart home. The device can then use cloud computing to analyze the
gathered data and make recommendations to the homeowner on how to reduce energy
consumption.
This means that the Cloud provider used a multi-leaner model to deliver the computing
resources to various customers. There are various allocated and reassigned physical and
virtual resources, which rely on customer demand. In general, the customer has no
control or information about the location of the resources provided, but can choose
location on a higher level of abstraction.
2. On-Demand Self-Service
This is one of the main and useful advantages of Cloud Computing as the user can track
server uptimes, capability and network storage on an ongoing basis. The user can also
monitor computing functionalities with this feature.
3. Easy Maintenance
The servers are managed easily and the downtime is small and there are no downtime
except in some cases. Cloud Computing offers an update every time that increasingly
enhances it. The updates are more system friendly and operate with patched bugs faster
than the older ones.
4. Large Network Access
The user may use a device and an Internet connection to access the cloud data or upload
it to the cloud from anywhere. Such capabilities can be accessed across the network and
through the internet.
5. Availability
The cloud capabilities can be changed and expanded according to the usage. This review
helps the consumer to buy additional cloud storage for a very small price, if necessary.
6. Automatic System
Cloud computing analyzes the data required automatically and supports a certain service
level of measuring capabilities. It is possible to track, manage and report the usage. It
provides both the host and the customer with accountability.
7. Economical
It is a one-off investment since the company (host) is required to buy the storage, which
can be made available to many companies, which save the host from monthly or annual
costs. Only the amount spent on the basic maintenance and some additional costs are
much smaller.
8. Security
Cloud Security is one of cloud computing's best features. It provides a snapshot of the
data stored so that even if one of the servers is damaged, the data cannot get lost. The
information is stored on the storage devices, which no other person can hack or use. The
service of storage is fast and reliable.
9. Pay as you go
Users only have to pay for the service or the space in cloud computing. No hidden or
additional charge to be paid is liable to pay. The service is economical and space is often
allocated free of charge.
10. Measured Service
Cloud Computing resources that the company uses to monitor and record. This use of
resources is analyzed by charge-per-use capabilities. This means that resource use can be
measured and reported by the service provider, either on the virtual server instances
running through the cloud. You will receive a models pay depending on the
manufacturing company's actual consumption.
Strategic Edge
Cloud computing provides a company with a competitive edge over its competitors when
it comes to accessing the latest and most mission-critical applications that it needs
without having to invest its time and money in its installations.
Easy implementation
With cloud hosting, businesses can retain the same applications and processes without
having to deal with the backend technicalities. Cloud infrastructure can be accessed
easily.
No hardware required
Since the cloud hosts everything, there is no requirement for a physical storage center.
However, a backup is recommended for disaster management and business continuity.
Automatic Software Integration
In the cloud, software integration occurs automatically. No additional efforts are
necessary for the customization and integration of applications to meet preferences.
Reliability
Cloud hosting comes with the biggest advantage of reliability. One doesn’t have to worry
about changes due to instant updates.
Mobility
Employees working on-premises or from remote locations can easily access all the cloud
services as long as they have an internet connection.
Unlimited storage capacity
The cloud comes with an almost limitless storage capacity, which can be expanded at any
time for a very nominal monthly fee.
1. Data Loss:
Data loss is the most common cloud security risks of cloud computing. It is also
known as data leakage. Data loss is the process in which data is being deleted,
corrupted, and unreadable by a user, software, or application. In a cloud
computing environment, data loss occurs when our sensitive data is somebody
else's hands, one or more data elements can not be utilized by the data owner,
hard disk is not working properly, and software is not updated.
3. Data Breach:
Data Breach is the process in which the confidential data is viewed, accessed, or
stolen by the third party without any authorization, so organization's data is
hacked by the hackers.
4. Vendor lock-in:
Migrating, integrating, and operating the cloud services is complex for the IT
staff. IT staff must require the extra capability and skills to manage, integrate, and
maintain the data to the cloud.
Spectre & Meltdown allows programs to view and steal data which is currently
processed on computer. It can run on personal computers, mobile devices, and in
the cloud. It can store the password, your personal information such as images,
emails, and business documents in the memory of other running programs.
Denial of service (DoS) attacks occur when the system receives too much traffic
to buffer the server. Mostly, DoS attackers target web servers of large
organizations such as banking sectors, media companies, and government
organizations. To recover the lost data, DoS attackers charge a great deal of time
and money to handle the data.
8. Account hijacking:
2. Backend :
The back end refers to the cloud itself, it provides the resources required for cloud
computing services.
It consists of virtual machines, servers, data storage, security mechanisms, traffic
control mechanisms, etc.
It is under the provider’s control.
1. Client Infrastructure
Cloud access devices enables users to access their files and data from the cloud,
providing convenience and flexibility.
Smartphone, Tablet, Mobile… devices can connect to cloud storage services through
dedicated applications.
3. Application
4. Services
The service component manages which type of service you can access according to the
client’s requirements.
Three Cloud computing services are:
5. Runtime cloud
6. Storage
7. Infrastructure
It offers services on the host level, network level, and application level.
Cloud infrastructure includes hardware and software components like servers, storage,
network devices, virtualization software, and various other storage resources that are
needed to support the cloud computing model.
8. Security
Security is an in-built back end component of cloud computing.
It implements a security mechanism in the back end.
It secures cloud resources, systems, files, and infrastructure to end-users in the backend.
9. Management.
It is use to manage all the components in back-end.
6. List types of cloud deployment models and explain any one in detail. (CO-2)
Types of Cloud Deployment Model
1) Public cloud
2) Private cloud
3) Hybrid cloud
4) Community cloud
Public cloud:
Public cloud As the name suggests, this type of cloud deployment model supports all
users who want to make use of a computing resource, such as hardware (OS, CPU,
memory, storage) or software (application server, database) on a subscription basis.
The public cloud makes it possible for anybody to access systems and services.
The public cloud is one in which cloud infrastructure services are provided over the
internet to the general people or major industry groups.
The infrastructure in this cloud model is owned by the entity that delivers the cloud
services, not by the consumer.
It is a type of cloud hosting that allows customers and users to easily access systems and
services.
This form of cloud computing is an excellent example of cloud hosting, in which service
providers supply services to a variety of customers.
In this arrangement, storage backup and retrieval services are given for free, as a
subscription, or on a per-user basis. For example, Google App Engine etc.
Less secure: Public cloud is less secure as resources are public so there is no
guarantee of high-level security.
Low customization: It is accessed by many public so it can’t be customized according
to personal requirements.
On-premise solutions are often quite expensive, with various costs adding up.
These include necessary hardware and implementation costs along with costs related to
continuous management and updating required from in-house personnel.
Moving to the cloud, on the contrary, gives organizations the benefit of eliminating the
high cost of hardware and installation as it allows them to opt for a subscription-based
model that suits their budget.
Most cloud solutions provide enterprises with the ability to pay for exactly what they
need instead of paying for unwanted or unused services.
2.Security
3. Flexibility
The nature of cloud computing is such that it allows organizations to allow services
more quickly and as per company needs.
This is because cloud computing helps in distributing workloads across the company
and can be remotely accessed by end-users, irrespective of their location.
Companies could even hire a global and, perhaps, cheaper workforce when they use
cloud computing.
4. Mobility
5. Insight
Many cloud-based storage solutions offer integrated cloud analytics for a bird's-eye
view of your data.
With your information stored in the cloud, you can easily implement tracking
mechanisms and build customised reports to analyse information organisation wide.
From those insights, you can increase efficiencies and build action plans to meet
organisational goals.
6. Increased Collaboration
If your business has less employees, then you should be making collaboration with
other organization.
After all, there isn't much point to having a team if it is unable to work like a team.
Team members can view and share information easily and securely across a cloud-
based platform.
Some cloud-based services even provide collaborative social spaces to connect
employees across your organization, therefore increasing interest and engagement
7.Quality Control
In a cloud-based system, all documents are stored in one place and in a single format.
With everyone accessing the same information, you can maintain consistency in data,
avoid human error, and have a clear record of any revisions or updates.
There are few things as detrimental to the success of a business as poor quality and
inconsistent reporting.
8. Disaster Recovery
When data is stored offline, if fire or flood damage physical device than there is no
recovery or backup for that data.
Damage to infrastructure also leads to data loss.
Downtime in your services leads to lost productivity, revenue, and brand reputation.
When we use cloud base storage , data recovery is easy.
Most of cloud users claim disaster recovery in few hours.
9. Loss Prevention
If your local hardware generate a problem or stolen, you might end up permanently
losing your data.
This is a more common problem than you might realize computers can malfunction for
many reasons
If you aren't on the cloud, you're at risk of losing all the information you had saved
locally.
With a cloud-based server, however, all the information you've uploaded to the cloud
remains safe and easily accessible from any computer with an internet connection, even
if the computer you regularly use isn't working.
That's their choice, but doing so places them at a distinct disadvantage when competing
with those who have the benefits of the cloud at their fingertips.
If you implement a cloud-based solution before your competitors, you'll be further
along with higher outcome.
12. Sustainability
On-premise data centre consume more energy and increase the emission of harmful
gases like carbon dioxide.
Moving to cloud computing help companies cut down their energy requirements and
achieve sustainable growth.
Another important objective of green computing is facilitating remote and hybrid work
culture.
Remote work allows companies to use smaller office spaces and reduces the
infrastructure needs of employees. Similarly, employees do not need to commute to the
office, which reduces the use of vehicles and hence cuts down on the emission of
greenhouse gases.
Cloud service provider provides all the Specific services and hardware as per
possible services and hardware as the the need of the enterprise are
user-base is the world. Different people available in a private cloud.
and organizations may need different
services and hardware. Services provided
must be versatile.
Cloud service provider manages the cloud Managed and used by a single
and customers use them. enterprise.
It is cheaper than the private cloud. It is costlier than the public cloud.
Example: Amazon web service (AWS) Example: Microsoft KVM, HP, Red
and Google AppEngine etc. Hat & VMWare etc.
9. List cloud service models and explain any one in detail. (CO-3)
There are the following three types of cloud service models -
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
1. SaaS:
Brief Introduction
Software as a Service (SaaS) is a category of cloud computing services that delivers
software applications over the internet. In a SaaS model, users can access and use software
applications without the need for installing, maintaining, or managing the underlying
infrastructure. Instead of purchasing and installing software on individual computers or
servers, users subscribe to the software on a pay-as-you-go basis.
Here are some key characteristics and features of SaaS in cloud computing:
1. Accessibility: SaaS applications are accessible through a web browser, allowing users to
access the software from anywhere with an internet connection. This flexibility is
particularly advantageous for remote work and distributed teams.
2. Subscription Model: SaaS typically operates on a subscription-based pricing model,
where users pay a recurring fee to access the software. This often includes maintenance,
updates, and support services, eliminating the need for upfront software licensing costs.
3. Automatic Updates: The responsibility for software updates, maintenance, and security
patches rests with the SaaS provider. This ensures that users always have access to the
latest features and security enhancements without having to manually update their
software.
4. Scalability: SaaS solutions are designed to scale easily to accommodate varying
workloads and user demands. Users can often adjust their subscription plans to match the
evolving needs of their organization.
5. Multi-Tenancy: SaaS applications are usually multi-tenant, meaning that multiple
organizations or users share the same infrastructure and code base while maintaining
separate instances of the application. This allows for efficient resource utilization and
cost-sharing among users.
6. Managed Security: SaaS providers are responsible for securing the infrastructure, data,
and application, relieving users of many security concerns. However, users must still
manage access controls and ensure the security of their data within the application.
7. Collaboration and Integration: SaaS applications often support collaboration features,
enabling users to work together in real-time. Additionally, many SaaS solutions offer
integrations with other cloud services and on-premises systems, facilitating a seamless
workflow.
Popular examples of SaaS applications include customer relationship management (CRM)
systems like Salesforce, productivity tools like Google Workspace and Microsoft 365, and
enterprise resource planning (ERP) solutions like SAP S/4HANA Cloud.
In summary, SaaS in cloud computing offers a convenient and cost-effective way for
organizations to access and use software applications, with the added benefits of scalability,
automatic updates, and reduced IT management overhead.
Advantages of SaaS
1. Cost-Effective: Pay only for what you use.
2. Reduced time: Users can run most SaaS apps directly from their web browser without
needing to download and install any software. This reduces the time spent in installation
and configuration and can reduce the issues that can get in the way of the software
deployment.
3. Accessibility: We can Access app data from anywhere.
4. Automatic updates: Rather than purchasing new software, customers rely on a SaaS
provider to automatically perform the updates.
5. Scalability: It allows the users to access the services and features on-demand.
Disadvantages of Saas :
The AWS global infrastructure is massive and is divided into geographical regions. The
geographical regions are then divided into separate availability zones. While selecting the
geographical regions for AWS, three factors come into play
Optimizing Latency
Reducing cost
Government regulations (Some services are not available for some regions)
Each region is divided into at least two availability zones that are physically isolated from
each other, which provides business continuity for the infrastructure as in a distributed
system. If one zone fails to function, the infrastructure in other availability zones remains
operational. The largest region North Virginia (US-East), has six availability zones. These
availability zones are connected by high-speed fiber-optic networking.
1. Infrastructure as a Service (IaaS): It is the basic building block of cloud IT. It generally
provides access to data storage space, networking features, and computer
hardware(virtual or dedicated hardware). It is highly flexible and gives management
controls over the IT resources to the developer. For example, VPC, EC2, EBS.
2. Platform as a Service (PaaS): This is a type of service where AWS manages the
underlying infrastructure (usually operating system and hardware). This helps the
developer to be more efficient as they do not have to worry about undifferentiated heavy
lifting required for running the applications such as capacity planning, software
maintenance, resource procurement, patching, etc., and focus more on deployment and
management of the applications. For example, RDS, EMR, ElasticSearch.
3. Software as a Service(SaaS): It is a complete product that usually runs on a browser. It
primarily refers to end-user applications. It is run and managed by the service provider.
The end-user only has to worry about the application of the software suitable to its needs.
For example, Saleforce.com, Web-based email, Office 365 .
1. Services:
Compute Services: GCP provides virtual machines (Google Compute Engine), managed
Kubernetes clusters (Google Kubernetes Engine), and serverless computing options like
Google Cloud Functions.
Storage Services: GCP offers various storage options, including Cloud Storage for object
storage, Cloud SQL for managed relational databases, and Cloud Firestore and Cloud
Bigtable for NoSQL databases.
Big Data and Analytics: GCP provides services like BigQuery for analytics, Dataflow for
stream and batch processing, and Dataprep for data preparation.
Machine Learning and AI: GCP offers a robust set of machine learning services,
including AI Platform, AutoML for custom models, and pre-trained models through
Cloud AI.
Networking Services: GCP provides networking services such as Virtual Private Cloud
(VPC), Cloud Load Balancing, and Cloud CDN for content delivery.
Identity and Security: Identity and Access Management (IAM) is used for managing
access control, and GCP offers various security features like Cloud Identity-Aware
Proxy, Key Management Service (KMS), and Cloud Security Scanner.
2. Global Network:
GCP has an extensive global network with data centers strategically located around the
world. This allows users to deploy applications and services in proximity to their end-
users for improved performance and reliability.
3. Containerization and Orchestration:
GCP is known for its strong support for containerization and orchestration. Google
Kubernetes Engine (GKE) provides a managed Kubernetes service, making it easier for
users to deploy, manage, and scale containerized applications.
4. Serverless Computing:
GCP offers serverless computing options, such as Cloud Functions and Cloud Run,
allowing developers to focus on writing code without managing the underlying
infrastructure.
5. BigQuery and Data Analytics:
13. Define Virtualization & Explain working of virtualization in cloud computing. (CO-4)
Virtualization is the "creation of a virtual (rather than actual) version of something, such
as a server, a desktop, a storage device, an operating system or network resources".
Working of Virtualization
Virtualization plays a very important role in the cloud computing technology, normally in
the cloud computing, users share the data present in the clouds like application etc, but
actually with the help of virtualization users shares the Infrastructure.
The main usage of Virtualization Technology is to provide the applications with the
standard versions to their cloud users, suppose if the next version of that application is
released, then cloud provider has to provide the latest version to their cloud users and
practically it is possible because it is more expensive.
15. List out type of virtualization & Explain any one in detail(CO-4)
Types Of Virtualization In Cloud Computing
Network Virtualization
Storage Virtualization
Memory Virtualization
Software Virtualization
Desktop Virtualization
Application Virtualization
Server Virtualization
1. Network Virtualization
These networks co-exist on the same physical network and yet have their individual
functioning and system. This type of virtualization of network does not compromise
on the security factor at all.
It restricts the movement of files across multiple networks to make sure of the same.
It also helps you keep a better track of things on the network and allow for good
supervision as well as identification of the data usage.
It is also a reliable and safe system as issues on one network do not have a domino
effect on the other networks. The main aimed result of Network Virtualization is to
improve the efficiency and productivity of the network.
Disadvantages Of Virtualization
It can get a shade expensive when effectively implemented.
Like every system it has its own limitations like not every application would have the ability to
work effectively within a virtual environment and thus has a level of uncertainty attached to it.
In spite of all precautions taken, it does have the element of risking the security of your data and
your server at large which cannot be eliminated easily.
It creates the issue of scalability which can get limited in a virtual environment.
It needs a number of links that are efficiently roped in together and are working cohesively for
the overall efficient working of the entire virtual environment.
Although convenient, it can be a time-consuming process.
17. Define Hypervisor. List out type of Hypervisor & Explain any one type of Hypervisor
in detail.(CO-4)
A hypervisor, also known as a virtual machine monitor (VMM) or virtualizer, is a
type of computer software, firmware or hardware that creates and runs virtual machines.
A computer on which a hypervisor runs one or more virtual machines is called a host
machine, and each virtual machine is called a guest machine.
Types of Hypervisor:
1. Type 1 Hypervisors (Bare Metal)
2. Type 2 Hypervisors (Hosted)
A Type 1 hypervisor is installed directly on top of the physical machine. Type 1 hypervisors
are also known as bare-metal hypervisors due to the nature of their installation type.
These categories of hypervisors are more popular and secure than the Type 2 hypervisors.
Type 1 hypervisors have a lower amount of latency and are the most used in the market.
Some examples of these hypervisors are VMware ESXi, Microsoft Hyper-V, or open-source
Kernel-based VMs (KVMs).
Hypervisors of type I run directly on top of the hardware. As a result, they stand in for
operating systems and communicate directly with the ISA interface offered by the underlying
hardware, which they replicate to allow guest operating systems to be managed. Because it
runs natively on hardware, this sort of hypervisor is also known as a native virtual machine.
Cloud computing requires many dedicated While single dedicated hardware can
8.
hardware. do a great job in it.
There are no new attacks, vulnerabilities, or changes that need to be considered in this
specific topology by the information security personnel, beside that our organization’s IT
infrastructure might be affected by the implementation of a private cloud but our current
network topology probably will not get affected. whereas if we used the services of
public clouds any changes in the security requirements will require a change in the
network topology. Therefore, we must define some ways through which our existing
network topology will interact with the topology of the cloud provider.
User can reduce their cloud security challenges in many ways, which is why it is
essential.
2. Reduces Costs
The cloud infrastructure is not expensive for customers because they don’t have to buy
them. You only use cloud services offered by a provider and pay through a subscription
model. Implementing cloud computing or network security will safeguard you from
cyber-attacks and reduce the cost of data recovery.
3. Data Protection
Cloud computing network security helps protect user data from cyber-attacks and shields
against misconfigurations and human errors.
Cloud services need to be available to customers around the clock. To ensure this
availability, you must first employ network security measures to prevent downtime due to
a breach. In addition, network security helps build customer trust because it shows
commitment to protecting their data.
How you implement your private cloud environment is the critical element in meeting
cloud security compliance. A compliance management platform can help you leverage
solutions while connecting them to your business risk and regulatory requirements. For
example, in the healthcare industry.
You can use some tools in your line of service for data protection. Some of the common
ones include:
A common form of cyber attack is malware, which infiltrates and corrupts user files.
When a user experiences a malware attack, the best way to counter it is by installing an
antivirus like Kerperskey. It scans your file system and removes all threats.
2. Application Security
Updating your system security can be the first step in protecting your data from attack.
Combining antiviruses and best practices can help patch security gaps in a platform.
3. Behavioral Analytics
Creating a system that monitors user behavior is crucial to an organization, and here is
why. When staff or devices access a cloud system, monitoring use and behavior is easy.
If they’re irregular behavior like unauthorized access, it can indicate a system breach.
Having such systems can help to prevent any threat early.
It’s when a company limits access to sensitive information to only authorized people.
Companies accomplish it by applying security policies restricting access to specific
networks or system sections.
Any business needs to understand the top cloud data security network challenges they can
face. Common ones include:
Most cloud failures are because of some human error. It is a constant risk, especially
when building business apps. It gets amplified when these business apps get hosted in a
public cloud. The reason is the ease of use by multiple users without proper controls.
Ways you can manage this challenge is by building strong controls.
2. DDoS Attack
When your environment gets exposed, it’s called a DDoS attack. It happens when you
continuously add microservices to your caseload. Small data leaks can build up to a full-
blown attack. A user can manage the attack surface by managing their cloud resources.
3. Shadow IT
When an organization’s employee illegally gets access to the cloud servers without
approval, it’s called shadow IT. The risks associated with it are compliance violations,
breaches, and more. In addition, they can implement cloud usage policies. Not only that
but also monitor cloud usage and provide staff with approved cloud services and
applications.
4. Scaled Vulnerabilities
The cloud needs more advanced security protocols than on-premise servers. That’s why
an admin needs to learn a new cloud security strategy that adheres to modern standards.
So, businesses need the proper knowledge and expertise to know cloud security
challenges.
Data security and storage in cloud computing are critical aspects that involve
safeguarding sensitive information, ensuring data integrity, availability, and
confidentiality.
Cloud computing offers various services and deployment models, each with its own data
security considerations.
Here are key aspects of data security and storage in cloud computing:
1. Data Encryption: Encrypt data both at rest (stored data) and in transit (data being transmitted
over networks). Use strong encryption algorithms (e.g., AES-256 for data at rest, TLS for data in
transit) to protect data from unauthorized access and interception.
2. Access Control: Implement robust access control mechanisms to regulate who can access data
and resources in the cloud environment. Use identity and access management (IAM) tools to
enforce least privilege principles, role-based access control (RBAC), and multi-factor
authentication (MFA) to authenticate and authorize users.
3. Data Masking and Tokenization: Use data masking techniques to obfuscate sensitive
information in non-production environments, reducing the risk of exposure during development
and testing. Tokenization can also be used to replace sensitive data with non-sensitive
equivalents (tokens) to protect sensitive data in storage and transit.
4. Backup and Disaster Recovery: Implement regular data backups and disaster recovery
strategies to ensure data resilience and continuity of operations. Use cloud-based backup
solutions and replication mechanisms to create redundant copies of data in geographically
diverse locations.
5. Data Loss Prevention (DLP): Deploy DLP solutions to monitor, detect, and prevent
unauthorized access, leakage, or misuse of sensitive data. DLP tools can identify and enforce
policies to protect data based on content, context, and user behavior.
6. Secure Data Sharing: Use secure methods for sharing data within and outside the
organization, such as encrypted file sharing platforms, secure APIs, and data access controls.
Implement data governance policies to manage data sharing permissions and track data access
and usage.
7. Compliance and Regulatory Requirements: Ensure that data storage and handling practices
comply with relevant regulatory requirements, industry standards, and data protection laws (e.g.,
GDPR, HIPAA, PCI DSS). Cloud providers may offer compliance certifications and tools to
help meet these requirements.
9. Monitoring and Auditing: Enable logging, monitoring, and auditing capabilities to track data
access, modifications, and security events in the cloud environment. Use security information
and event management (SIEM) tools to centralize logs, analyze threats, and generate real-time
alerts.
10. Vendor Security Assurance: Evaluate the security practices and certifications of cloud
service providers (CSPs) regarding data security, storage, and privacy. Understand the shared
responsibility model to clarify which security responsibilities are managed by the CSP and which
remain the customer's responsibility.
By addressing these data security and storage considerations in cloud computing, organizations
can enhance data protection, reduce security risks, and maintain compliance with regulatory
requirements, ultimately fostering trust and confidence in their cloud-based operations. Regular
security assessments, training, and collaboration between stakeholders are essential for effective
data security management in the cloud.
1. Data Creation:
Data is gathered from various sources, including sensors, devices, applications, human
interactions, social media posts, and IoT temperature readings.
The raw material for the data lifecycle passes through the ingestion, processing, storage,
and analysis phases to produce insightful information.
Creating data is the first step in turning unactionable information into knowledge that can
be used.
2. Data Storage:
Data finds a secure place in cloud storage infrastructure, encompassing object, block, and
database storage options.
These choices have diverse features to suit various data types and use cases.
Cloud storage ensures accessibility, scalability, and resilience while allowing
organizations to pick the ideal storage method.
This stage is pivotal in the data lifecycle, where data is protected and prepared for future
use and retrieval.
3. Data Processing:
Processing transforms data into a usable format, making tasks like data analysis, machine
learning, and artificial intelligence applications feasible.
This process converts unstructured data into structured data that can power automation
and insights.
Data processing is essential for deriving value and understanding from data, whether
combining numbers for analytics or developing AI algorithms.
It bridges the gap between unactionable insight and raw data.
4. Data Sharing:
Data is accessible to approved users and programs for collaboration and utilization.
This phase entails securely distributing it inside a restricted framework to ensure only
authorized parties can interact with the data.
Sharing data is crucial to data management as it promotes collaboration, decision-
making, and the ability to derive insights from the data.
Strong access controls and permissions are needed to maintain data security and
compliance.
5. Data Archival:
Data is archived to meet compliance requirements and to ensure long-term storage.
Data is transferred at this phase to cost-effective, secure storage options built for long-
term retention.
Archiving ensures that previous data is still available when needed and reduces storage
expenses for data utilized less often.
It is essential for ensuring data integrity and compliance with legal requirements.
6. Data Destruction:
When data no longer serves a purpose or when required by laws and regulations, it is
destroyed.
Information must be securely deleted or removed at this step to ensure that data cannot be
accessed or retrieved.
Data deletion is crucial for preserving data privacy and compliance, especially when
keeping data is useless or illegal.
It adheres to data governance standards and protects sensitive information.
23. Which are the Key Privacy concerns in the cloud? (CO-5)
Key Privacy concern in the cloud
Addressing privacy issues in cloud computing requires a comprehensive approach that combines
technical controls, legal compliance, transparency, user education, and ongoing risk
management. Organizations should conduct privacy impact assessments, adopt privacy-
enhancing technologies, implement strong data protection measures, and engage in transparent
communication with stakeholders to mitigate privacy risks and protect individuals' privacy rights
in the cloud.
1. Data Ownership and Control: One of the primary concerns is determining who owns the
data stored in the cloud and how much control individuals or organizations have over their data.
Cloud service providers (CSPs) may assert certain rights over data stored on their platforms,
leading to questions about data ownership and sovereignty.
2. Data Location and Jurisdiction: Data stored in the cloud may be replicated across multiple
geographical locations for redundancy and performance reasons. This raises concerns about data
residency, compliance with local data protection laws, and the jurisdictional issues that arise
when data crosses international borders.
3. Data Security and Breaches: The security of data in the cloud is a major privacy concern.
Breaches, unauthorized access, data leaks, or vulnerabilities in cloud services can lead to the
4. Data Access and Sharing: Cloud environments often involve sharing data with third parties,
such as cloud service providers, partners, or subcontractors. Privacy risks arise when data is
accessed, processed, or shared without proper authorization, encryption, or contractual
safeguards in place.
5. Compliance and Regulatory Challenges: Compliance with data protection regulations and
privacy laws (e.g., GDPR, CCPA, HIPAA) presents challenges in cloud computing.
Organizations must ensure that cloud providers adhere to relevant privacy requirements, provide
transparency about data handling practices, and offer data protection assurances.
6. Data Minimization and Purpose Limitation: The principle of data minimization, which
advocates for collecting only necessary data, and purpose limitation, which restricts data use to
specified purposes, can be challenging to enforce in cloud environments where data may be
stored or processed for various purposes without clear consent or control.
7. Vendor Lock-in and Portability: Organizations may face vendor lock-in issues when
migrating data between cloud providers or transitioning from cloud to on-premises
environments. Lack of data portability standards, interoperability challenges, and contractual
limitations can hinder data mobility and control.
8. Cloud Service Agreements and Terms: Privacy concerns also arise from the terms and
conditions outlined in cloud service agreements. Organizations must carefully review and
negotiate contractual terms related to data privacy, security, compliance, data retention, and data
access rights to protect their interests and privacy obligations.
9. Data Analytics and Profiling: Cloud-based data analytics, machine learning, and profiling
techniques raise privacy concerns related to the aggregation, analysis, and use of personal data to
derive insights, make decisions, or create targeted advertising, posing risks to individual privacy
and autonomy.
10. Transparency and Accountability: Transparency about data practices, security measures,
data breaches, and incident response capabilities is crucial for building trust and accountability in
cloud computing. Organizations should demand transparency from cloud providers and maintain
transparency with users regarding data handling practices and privacy policies.
It is always good to create hard copies of your business data and keep it with yourself so
that you can have access them even if you lost the original one.
You can use any cloud storage solutions to store your data.
You can set up a cloud account & can keep the backup copies.
You have another option of keeping the backup data in an external storage device also
like a hard disk or a thumb drive. This will allow you to access the information even if
without the internet.
3. Data encryption:
One of the best ways to protect your data while using cloud storage is to do data
encryption.
This is the best form of security because you need decryption before accessing the data.
This will protect data against service providers and users also.
To make it more protected, you can also ensure cloud encryption during uploading and
downloading phases.
But, this will make data sharing and sync in the cloud platform little slow.
5. Using password:
The first thing which can be done is to put strong password which can stand a hacking.
You can take the help of internet to learn how to create a strong password.
It is very important to change your password frequently and never use the same password
for all the accounts or folders.
You can opt for 2-step verification for login if your cloud service offers that option.
Google drive use 2 phase log in option, consist of password & code sent to the registered
number.
7. Anti-virus is a must:
Sometimes the weakest link happens to be the computer or device you use for cloud data
access.
You need to put proper protection in your system/device.
It will help in securing your business data. If you expose yourself to bugs and viruses,
hackers can access your system easily.
You need to choose a very effective and robust anti-virus system for your system, which
will protect all the files and information inside that.
If your system isn’t well protected, and if the system is not encrypted and secured from
bugs, hackers can get hold of your information.
9. Access limitation:
Give access to those users who really need.
Internal users and third party vendors should only get access to those files which will
help them to do their jobs.
Use encryption keys if required. Make sure to evaluate the users and vendors regularly
and add/remove users as per the requirement.