Cloud Computing Assignment
Cloud Computing Assignment
Hybrid cloud computing refers to the type of cloud computing deployment model which
includes the usage of both private and public clouds. The hybrid cloud provides maximum
flexibility and customizability. Due to this reason, many business organizations are migrating
to the hybrid cloud. Along with the popularity of using hybrid cloud, it is necessary to
protect the system and the information stored in that system from different types of attacks.
Not only the attacks, but there are some other serious challenges such as system crashes,
power outage, data corruption, data breaching, etc. faced in the hybrid cloud. Therefore, it is
necessary to maintain security in the cloud infrastructure using various mechanisms.
Following are some of the general information security steps and controls to minimize the
risk factors in the cloud.
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
Selection of appropriate cloud service provider and
security solution provider
For using public, private or hybrid cloud services, it is important for every organization to
perform research activities prior selecting a cloud service provider. The research should most
importantly focus on which cloud service provider can give best services in terms of security.
The cloud service provider plays the biggest role to enforce security in the system hosted in
cloud. The hybrid cloud needs security options developed for hybrid cloud environment. The
hybrid cloud has instances both on public and private cloud. So, it needs special mechanism
to control systems hosted on both the public and private cloud environment. Some of the
best hybrid cloud solution providers are VMWare, Amazon Web Services, Microsoft Azure,
Rackspace, IBM, Cisco Systems, etc.
Along with cloud service provider, it is important for any organization hosting their system in
cloud to adopt an optimal cloud security solution provider. Those providers are always
focused on providing the best security options for the cloud infrastructure. We need to
choose the best one according to our requirements. Some of the companies providing
security solutions for hybrid cloud are Fortinet, Symantec, Trend Micro Hybrid Cloud
Security, etc.
The cloud service providers play a vital role in terms of quality of security enforced in
applications hosted in cloud.
It is in the hand of a cloud service provider to provide us with various options
regarding the features to control the security level of the cloud environment.
The cloud solution providers are engaged only in providing the best security solution
for the applications hosted in cloud. Because of this reason, the organization can
focus of further enhancing and upgrading the system rather than being just focused
on enforcing security mechanisms.
The organization should focus on providing least privilege to the users regarding the use of
the system. The system should contain features to control what part of system can be
viewed by a particular user. The system should have features to control roles and
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
permission. It is best to assign a role to each individual user and categorize the permissions
according to the roles. For example, a user with super admin role can perform all the
activities along with creating other users and assigning roles and permissions to them. All
other users can only view the system parts according to the roles assigned and permissions
given. This type of feature not only benefits the hybrid cloud but also the private cloud. In
fact, it is necessary for every organization to adopt this principle as a healthy habit to ensure
maximum security in their system.
The part of the system with most crucial data should be kept separately. It is a better
practice to isolate that part of the system in order to achieve maximum security. That part of
the system should only be exposed to few authorised people. The users operating the critical
infrastructures should be professional enough to handle all kinds of exceptions and bugs.
Once the system is live, it is very important to solve the issues in real time or in minimal
time. Sometimes, even a small piece of code can entirely damage the system and be the
reason for system crashes. A small wrong move can sometimes erase all the important data
and information. Therefore, hosting the critical infrastructures separately provide maximum
benefit to the system and the organization.
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
Data Encryption
The data stored in the hybrid cloud should be encrypted. It is an important factor regarding
the security of the data stored in the cloud. Encrypted data is more secure than storing the
plain data. The level of security is measured by the level of encryption provided. There are
various types of encryption algorithm available for security purpose. But many of them can
be decrypted easily by the hackers. Therefore, it is necessary for us to choose a security
provider not only providing encryption facility but also with the usage of strongest
encryption algorithm. It might be a policy to not enclose the encryption algorithm used for
security purpose but the least we can do is to make sure the encryption used in our system
is safe and provides the best security to the system. Not only the stored data should be
encrypted but also the data during the operations should be encrypted, then it will be
possible to achieve maximum security. It is important to ensure that all the incoming,
outgoing and stored data should be encrypted with best encryption algorithm.
Some of the encryption algorithm are Triple DES, AES, DES, RSA, BLOWFISH, TWO FISH, etc.
Disasters like service disruptions, attacks, system crashes, and power outage in data center
can occur anytime. Organizations should be prepared from the beginning in order to protect
the system from any loss that might occur due to any kind of disasters. The disaster recovery
mechanisms ensure the smooth run of the system in case of any kind of disasters. The
techniques help to recover the system in emergency cases. The backups made for this
purpose serves as an alternate solution. It is very important to have a backup plan from the
starting as disasters can occur at any time. We can have image based backups that are used
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
for making copies of computers or virtual machines that can be used for restoring the
system.
Since the system is hosted in cloud and disaster can occur any time, we need to keep
multiple backups of important data. It is a good practice to backup data in real time. As soon
as the data is entered, it should be stored in multiple places. Each of the servers should
follow strict security mechanism in order to protect the system from possible threats and
data breaching. It also helps to minimize the risk that can occur due to corrupted data.
Sometimes, data can be lost due to internal or external factors during its transmission. We
can use the reliable source where we kept the data or information securely. As in hybrid
cloud, there is involvement of both the public and private cloud. Sometimes, hackers or
intruders might attack on our system and erase all the data or misuse it. They lock our
system and sometimes even ask for ransom for releasing the data. In such cases, if we have
backup of our system and data stored in it, then there is not much thing to worry about. But
in absence of any security recovery mechanisms, the cloud is always prone to attack.
Bibliography
Trendmicro.com. (2019). Key Strategies for Securing the Hybrid Cloud - Security News - Trend
Micro USA. [online] Available at:
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/key-
strategies-for-securing-the-hybrid-cloud [Accessed 17 May 2019].
Bradford, C. (2019). 5 Common Encryption Algorithms and the Unbreakables of the Future.
[online] StorageCraft Technology Corporation. Available at: https://blog.storagecraft.com/5-
common-encryption-algorithms/ [Accessed 17 May 2019].
This study source was downloaded by 100000855529264 from CourseHero.com on 10-24-2022 09:59:43 GMT -05:00
https://www.coursehero.com/file/119392584/Cloud-computing-assignmentdocx/
Powered by TCPDF (www.tcpdf.org)