How Secure is Cloud Hosting?

INTRODUCTION –

Security Cloud ComputingNowadays, with the continuous development and improvement of cloud computing technology, people are increasingly using cloud-based strategies; more and more organizations are turning to cloud computing, providing low-cost services for critical business and fast to market solutions. The security issues have been the biggest challenge of cloud computing, restricting the promotion and application of cloud computing.

 

SECURITY REQUIREMENTS OF CLOUD COMPUTING –

For the protection objects of cloud computing, the three kinds of cloud services model correspond three levels of security protection model. Terminal security protects the applications for the users.In order to protect the safe operation of cloud computing, security management and regulations and supervision are the foundation of achieving security objectives, carrying through the wholly secure control.

SECURE REQUIREMENTS OF INFRASTRUCTURE –

Security Requirements of Infrastructure include physical security, computing, environmental security, storage security and virtual security. The requirements of physical security include safety of equipment, safety of physical environments, backup and disaster recovery, protection for the border, management of devices and resource utilization. Secure requirements of computing environment include that hardware devices need a security measure for their own safety; basic software must be secure, reliable, trustworthy and stable.

SECURE REQUIREMENTS OF APPLICATION SOFTWARE –

Security Requirements of application software include data security, content security and application security.Data security mainly refers to assuring the security of dynamic data. The process of data transmission and data storage must be secure when the users use software of cloud computing.

SECURE REQUIREMENTS OF TERMINALS –

Security Requirements of Terminals include browser security, user authentication security and terminal data security.In order to assure browser security, terminals need to be defended, such as anti-malware, vulnerability scanning, unauthorized access and anti-attacks.

SECURE REQUIREMENTS OF MANAGEMENT –

Complex environment, massive data and highly virtual characteristic of cloud computing make security management more complex, it also brings new challenges for security management. Firstly, it is necessary to redundantly configure different components of the cloud system to ensure the high availability and load balancing in large loadings.

SECURE REQUIREMENTS OF REGULATIONS AND SUPERVISION –

Cloud SecurityNowadays, the legal system for cloud computing security in our country is not perfect. Secure requirements of regulations and supervision include identification and personal data protection bill, Electronic Signature Bill, Electronic contract law, regulations of forensics and intellectual property protection laws. Therefore, it is necessary to monitor, distinguish and respond to network traffic in a cloud computing environment. And it is necessary to prevent the spread of illegal information.

SOLUTIONS FOR THE SECURITY OF CLOUD COMPUTING –

We can discover from the above analysis of security requirements that the security measures of cloud computing cover the user access layer, virtual security domain layer, virtual machine layer and physical layer. High availability and scalability should be taken into account when the full depth type of security architecture is built.Accordingly, the security of cloud computing can be assured…….