Todays
Todays
In centralized computing, all processing is handled by a single central system, and all users or nodes rely on that system.
Banking Systems
Social Media Platforms
In distributed computing, processing is spread across multiple systems or nodes, working together to complete tasks.
Multiplayer Online Games (PUBG, Fortnite, Call of Duty: Warzone)
Internet of Things (IoT) Systems (Smart Cities, Self-Driving Cars, Smart Grids)
Real-Life Examples
Internet:
Browsing Google, YouTube, or online
shopping on Amazon.
Sending emails through Gmail or Yahoo.
Intranet:
A university’s internal portal for
students and faculty.
A company’s HR portal for salary slips
and leave requests.
A hybrid cloud is a combination of public and private cloud environments that allows data and applications to move
between them. It provides flexibility, security, and scalability by leveraging the benefits of both cloud models.
Data centers are built to take advantage of economies of scale, which means:
The bigger the data center, the cheaper it is to run each part of it.
So, when a data center is large, it can save money overall and reduce the cost for each unit of work it does
(like storing data or running applications).
Memory (DRAM) and storage (disks) in a server rack are connected using rack switches.
To connect everything across multiple racks, a bigger switch called a cluster-level switch is used.
So in short:
Rack switch = connects parts inside one rack
Cluster switch = connects all racks together in the data center
4.2.1.2 Cooling System of a Data-Center Room
Server-Centric Design:
The servers are involved in managing the network.
The operating system on servers is modified.
Special drivers are used to help relay traffic through the servers.
Switches are still used, but servers take part in the network’s routing.
4.2.3 Modular Data Center in Shipping Containers
Container-based data-center modules are meant for construction of even larger data centers using a
farm of container modules (cluster or group).
The example of BCube1 is illustrated in Figure 4.12, where the connection rule is that the i-th
server in the j-th BCube0 connects to the j-th port of the i-th Level 1 switch. The servers in the BCube
have multiple ports attached. This allows extra devices to be used in the server.
The proposed network was named MDCube (for Modularized Datacenter Cube). This net work connects multiple BCube
containers by using high-speed switches in the BCube. Similarly, the MDCube is constructed by shuffling networks with
multiple containers.
4.2.5 Data-Center Management Issues
Here are basic requirements for managing the resources of a data center.
These suggestions have resulted from the design and operational experiences of many data centers in the IT and
service industries.
Google, Microsoft, and Amazon have used modular container-based systems for fast edge deployments.
Military and remote operations rely heavily on these for quick deployment
"Custom-crafted" means:
• The design and construction are unique to each deployment.
• Servers, racks, cooling systems, and power are individually selected and installed on-site.
• The layout, equipment, and configuration are often tailored for specific needs or client preferences.
• Construction and setup might involve manual processes, engineering teams, and longer timelines.
All of this is usually hosted in data centers that are run by big cloud providers (like Amazon, Google, or Microsoft).
As a user, you don’t have to worry about how it all works behind the scenes.
In cloud computing:
• Software is delivered as a service (called SaaS – Software as a Service),
• And users must trust the cloud to safely store and manage huge amounts of data.
To handle all this data, we need a way to process large files across many servers, which is why cloud systems use something
called a distributed file system.
Other important pieces of the cloud setup include:
• Storage networks (SANs),
• Databases,
• Firewalls, and
• Security tools to keep everything safe.
Infrastructure Layer (IaaS – Infrastructure as a Service)
• What it is: Virtualized resources delivered over the internet.
• Who uses it: DevOps teams, IT administrators, system architects.
• Examples:
• Virtual machines (VMs)
• Storage services (e.g., Amazon S3, Google Cloud Storage)
• Networking (e.g., VPCs, load balancers)
• Popular services: AWS EC2, Google Compute Engine, Azure Virtual Machines
1. Data Breaches
Cloud environments store large amounts of user data (personal, financial, medical, etc.). A breach can expose this
data to hackers.
2. Unauthorized Access
Weak passwords, poor access control, or insider threats can allow unauthorized people to access sensitive data.
3. Data Loss
Data stored in the cloud may be lost due to accidental deletion, ransomware attacks, or service failure.
Example:
If an employee at a healthcare provider accidentally shares login credentials, hackers could access patients’ medical records
stored in the cloud, violating privacy laws like HIPAA.
Example:
In 2021, OVHcloud, a French cloud provider, experienced a major fire in its data centers. Several clients lost their data
permanently because they had no backups.
Example:
A company using a third-party cloud service may not know if their data is being stored in a country with weak data protection
laws.
Example:
A European company using a U.S.-based cloud provider may violate GDPR rules if the provider transfers data to non-compliant
countries.
11.2 CLOUD SECURITY RISKS
traditional security
threats,
threats related to system availability,
and threats related to third-party data control.
Before the rise of cloud computing, IT systems mostly ran on local servers or
on-premises data centers. These systems faced a range of traditional security
threats, which are still relevant today.
threats related to system availability
System availability means that a computer system, network, or application is accessible and usable when needed.
Threats to availability can disrupt business operations, cause financial losses, and affect user trust.
Threats Related to Third-Party Data Control
When organizations use cloud services or outsource IT functions to third parties (like cloud providers, SaaS platforms,
or data centers), they often lose direct control over their data. This introduces a new category of security threats.
Threats Related to Third-Party Data Control
When an organization uses third-party services (like cloud storage, SaaS platforms, or outsourced IT providers), it gives partial
control of its data to an external entity. While this can improve efficiency, it introduces several security and privacy risks.
The 2010 Cloud Security Alliance (CSA) report, titled "Top Threats to Cloud Computing", identified key security
concerns in cloud environments. It outlined seven major threats:
Abuse of Cloud Services – Use for spamming, malware, etc.
Insecure APIs – Vulnerable interfaces allowing unauthorized access.
Malicious Insiders – Internal users misusing access.
Shared Technology Issues – Risks from multi-tenant infrastructure.
Data Loss/Leakage – Accidental or intentional data exposure.
Account Hijacking – Unauthorized access via phishing or theft.
Unknown Risk Profile – Lack of transparency from providers.
The report raised awareness about cloud-specific security challenges and laid the foundation for future CSA
guidelines.
The 2011 Cloud Security Alliance (CSA) report built upon the foundation laid by the 2010 report, continuing to
address the evolving security challenges in cloud computing. While the specific "Top Threats" list from 2011 isn't
detailed in the available sources, the CSA's ongoing efforts during that year included the release of Version 3 of the
"Security Guidance for Critical Areas of Focus in Cloud Computing," which emphasized security, stability, and privacy
in multi-tenant environments .
Additionally, the CSA's initiatives in 2011 focused on providing practical, actionable roadmaps for organizations to
adopt cloud computing securely, reflecting the rapidly changing landscape of cloud technologies and associated risks
The three actors involved in the model considered are: the user, the service, and the cloud infrastructure,
and there are six types of attacks possible,
The user can be attacked from two directions, the service and the cloud
Secure Sockets Layer (SSL) certificate spoofing, attacks on browser caches, or phishing attacks are example
of attacks that originate at the service.
The user can also be a victim of attacks that either truly originate or that spoof originating from the cloud
infrastructure.
The Cloud Controls Matrix (CCM) is a cybersecurity control framework developed by the Cloud Security Alliance
(CSA) specifically for cloud computing. It provides a detailed and structured set of security controls that help
organizations assess the security posture of cloud providers and ensure compliance with various regulations and
standards.
https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v3-0-1/
11.3 PRIVACY AND PRIVACY IMPACT ASSESSMENT
The term privacy refers to the right of an individual, a group of individuals, or an organization to keep information of
personal nature or proprietary information from being disclosed
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks
upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.”
The statement you provided is from Article 12 of the Universal Declaration of Human Rights (UDHR), adopted by the
United Nations General Assembly in 1948.
Article 12 – Summary:
Protection of Privacy: No one should face unjust or arbitrary intrusions into their private life, family, home, or
communications.
Protection of Reputation : Individuals must also be shielded from attacks on their honor and reputation.
Right to Legal Protection : Everyone has the right to legal protection if such interference or attacks occur.
Purpose:
This article is a fundamental expression of the right to privacy and dignity, aiming to uphold human freedom and
security in both personal and public life. It is especially relevant in the digital age where privacy risks are more complex.
At the same time, the right to privacy is limited by laws. For example, the taxation laws require individuals to share
information about personal income or earnings. Individual privacy may conflict with other basic human rights e.g., with
freedom of speech.
In the digital age, people often share personal information online — like on social media, shopping websites, or apps.
But this has created new privacy problems for governments and lawmakers.
For example, if you give your name, email, or credit card info to a website, and that site is hacked or careless with your
data, someone might steal it. This stolen information can be used to pretend to be you — a crime called identity theft.
This kind of misuse of personal data is a big challenge today, and laws are struggling to keep up with how fast
technology is changing.
Some countries are taking stronger steps than others to protect people's privacy online. The European Union (EU) is
one of the strictest when it comes to how personal information is handled.
They introduced a new rule called the “right to be forgotten.” This means that people can ask websites to delete their
personal information, like old photos, posts, or other things that they don’t want online anymore.
The reason for this rule is that in the digital world, your past never really goes away — everything you post can stay on
the internet forever. The “right to be forgotten” helps people move on from their past and have more control over what
stays online about them.
Gmail privacy policy reads (see http: //www.google.com/policies/privacy/ accessed on October 6, 2012)
Cloud Service Providers (CSPs) — the companies that store and manage data online — may use your
information without permission to make money. For example, they might use your data for targeted ads.
Right now, there’s no strong technology to completely stop this kind of misuse.
Also, when a CSP outsources work to others (called dynamic provisioning), things can get unclear or risky.
For example:
Who are the subcontractors handling your data?
What access or control do they have?
What happens to your data if the company goes bankrupt or merges with another?
Because of all these issues, we need better laws to protect people's privacy in the digital world.
The U.S. Federal Trade Commission (FTC) gave advice to Congress saying that websites that collect personal
information from users should follow four fair rules, known as Fair Information Practices:
Notice – Tell people what data is collected and how it will be used.
Choice – Give users options to agree or refuse data collection.
Access – Let users see and correct their own data.
Security – Protect the data from theft or misuse.
These rules help ensure that people have control and safety over their personal information online.
11.5 CLOUD DATA ENCRYPTION
Encryption = Locking your data with a secret key so no one else can read it.
What is Homomorphic Encryption?
Homomorphic encryption is a special type of encryption that allows computations to be done on encrypted
data — without needing to decrypt it first.
Imagine a hospital stores patient data encrypted in the cloud for privacy. A researcher wants to calculate the
average age of patients, but:
They are not allowed to see the actual ages because of privacy laws.
With homomorphic encryption, the cloud can calculate the average on encrypted ages and return an encrypted
result.
The researcher decrypts the final result — and sees the correct average, without ever seeing individual ages.