Cloud Computing Basic
Cloud Computing Basic
(213INT3314)
UNIT 2
HARDWARE AND ARCHITECTURE
( Unit – 2 )
Dr. V.Sivakumar
AP / IT
UNIT 2: HARDWARE AND ARCHITECTURE
• The clients on your end users’ desks are how you will interact with the cloud.
• The different types of clients and how they can be configured to communicate with the cloud.
• There are different types of clients that can link to the cloud, and each one offers a different way for
you to interact with your data and applications.
Mobile
• Mobile clients run the range from laptops to PDAs and
smartphones, like an iPhone or BlackBerry. You’re not likely to
utilize a particularly robust application on a PDA or smartphone,
but laptop users can connect to the cloud and access applications.
• Mobile clients, of course, have security and speed concerns.
Thin Clients
• Thin clients, are client computers that have no hard drives, no
DVD-ROM drives, and simply display what’s on the server.
• It is useful, only if you have an in-house cloud.
• If a client only needs to access cloud-based services or is accessing a
virtualized server, then thin clients are a great option.
• They’re less expensive than thick clients, are much less expensive to
maintain, and use less energy.
Thick clients
•Thick clients are good choices if users need to maintain files
on their own machines or run programs that don’t exist on the
cloud.
•Security-wise, thick clients are more vulnerable to attack than
thins.
•Since data is stored on the machine’s hard drive, if the
machine is stolen then the data could be compromised.
Security
• Security is issue when it comes to cloud computing, and that only makes
sense. Since a third party, stores your data, you don’t know what’s going on
with it.
• Data leakage in the context of cloud computing refers to the unauthorized or
unintentional exposure of sensitive information stored in the cloud to
unauthorized parties.
Causes of Data Leakage in the Cloud:
❖ Inadequate Access Controls:
❖ Cause: Improperly configured access controls may allow unauthorized users
to access sensitive data.
❖ Prevention: Implement strong access controls, regularly review and update
permissions, and follow the principle of least privilege.
❖ Insufficient Encryption:
❖ Cause: Data that is not adequately encrypted is vulnerable to interception
and unauthorized access.
❖ Prevention: Use strong encryption protocols for data both in transit and at
rest. Implement encryption key management practices.
❖ Weak Authentication:
❖ Cause: Weak or compromised passwords can lead to unauthorized access
to cloud accounts.
❖ Prevention: Enforce strong password policies, implement multi-factor
authentication (MFA), and regularly audit and update credentials.
Causes of Data Leakage in the Cloud:
❖ Insecure APIs:
❖ Cause: Vulnerabilities in application programming interfaces (APIs) can be
exploited to gain unauthorized access to data.
❖ Prevention: Regularly update and patch APIs, conduct security
assessments, and adhere to industry best practices for API security.
❖ Data Transfer Issues:
❖ Cause: Unprotected data during transit can be intercepted by attackers.
❖ Prevention: Use secure communication protocols (e.g., HTTPS), encrypt
data during transit, and implement secure file transfer practices.
❖ Lack of Data Loss Prevention (DLP) Measures:
❖ Cause: Absence of DLP mechanisms can result in the unintentional sharing
of sensitive information.
❖ Prevention: Implement DLP solutions to monitor, detect, and prevent the
unauthorized transfer of sensitive data.
Offloading Work
• Another security benefit isn’t so much a technology, but the fact that you don’t have to do it
yourself. It’s up to the cloud provider to provide adequate security.
• After all, can your organization afford 24/7 IT security staffing?
• The fact of the matter is that your cloud provider might offer more security features than you had
before.
• The fact that so many clients are paying allows cloud providers to have beefier security, simply
because of the economy of scale involved.
• That is, there are many paying clients so the provider is able to do more, because there is more
money in the pot. Plus it’s to the provider’s benefit to offer more, because they want to get a good
reputation.
Logging
• If there is a breach, the cloud provider can respond to the incident with less
downtime than if you had to investigate the breach locally.
• It is easy to build a forensic server online, and it costs almost nothing until it
comes into use.
• If there is a problem, the virtual machine can be cloned for easy offline
analysis.
• Further, many companies don’t have a dedicated in-house incident response
team.
• If there is a problem, IT staff have to quickly figure out their new job of taking
the server down, quickly investigating, and getting it back online for minimal
production downtime.
Development
• Even more good news is that security vendors aren’t in the dark about this
whole cloud thing.
• They are actively developing products that can apply to virtual machines and
the cloud.
• Security vendors also have a unique opportunity in the cloud.
• Since it’s new ground, there are new opportunities for the vendors who are
open-minded enough to imagine them.
Compliance
• The same security issues that your organization deals with are the sorts
of issues that SaaS providers face—securing the network, hardware
issues, applications, and data.
• But compliance adds another level of headache.
• Regulations like Sarbanes-Oxley (SOX), Gramm-Leach-Bliley (GLBA),
and HIPAA, and industry standards like the Payment Card
• Industry Data Security Standard (PCI DSS) make things particularly
challenging.
Prior to SaaS, compliance could be managed by a few tasks:
• service providers must “provide for timely forensic investigation” if there is a breach.
• The SaaS provider’s logs are internal and most likely not accessible by clients, so monitoring is
nearly impossible.
• Access to logs is required for PCI compliance, and auditors or regulators may request access to
them.
• As such, you should be sure to negotiate access to the provider’s logs as part of your service
agreement.
Thank You