Unit 4 - cloud computing
Unit 4 - cloud computing
Cloud Computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s hard
drive or local server. Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided as a service through
the Internet to the user. The data that is stored can be files, images, documents,
or any other storable document.
The following are some of the Operations that can be performed with Cloud
Computing
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audio
Understanding How Cloud Computing Works?
Cloud computing helps users in easily accessing computing resources like
storage, and processing over internet rather than local hardwares. Here we
discussing how it works in nutshell:
Infrastructure: Cloud computing depends on remote network servers hosted
on internet for store, manage, and process the data.
On-Demand Acess: Users can access cloud services and resources based on-
demand they can scale up or down the without having to invest for physical
hardware.
Types of Services: Cloud computing offers various benefits such as cost
saving, scalability, reliability and acessibility it reduces capital expenditures,
improves efficiency.
Characteristics of Cloud Computing
There are many characteristics of Cloud Computing here are few of them :
1. On-demand self-services: The Cloud computing services does not require any
human administrators, user themselves are able to provision, monitor and
manage computing resources as needed.
2. Broad network access: The Computing services are generally provided over
standard networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that are
able to scale out and in quickly and on a need basis. Whenever the user require
services it is provided to him and it is scale out as soon as its requirement gets
over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage,
applications, and services) present are shared across multiple applications and
occupant in an uncommitted manner. Multiple clients are provided service from
a same physical resource.
5. Measured service: The resource utilization is tracked for each application and
occupant, it will provide both the user and the resource provider with an
account of what has been used. This is done for various reasons like monitoring
billing and effective use of resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants (users
or organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to
abstract underlying hardware resources and present them as logical resources to
users.
8. Resilient computing: Cloud computing services are typically designed with
redundancy and fault tolerance in mind, which ensures high availability and
reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing models,
including pay-per-use, subscription-based, and spot pricing, allowing users to
choose the option that best suits their needs.
10. Security: Cloud providers invest heavily in security measures to protect
their users’ data and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated, allowing
users to deploy and manage resources with minimal manual intervention.
12. Sustainability: Cloud providers are increasingly focused on sustainable
practices, such as energy-efficient data centers and the use of renewable energy
sources, to reduce their environmental impact.
It shares the
It is dedicated to It is combination
resources among
Infrastructure a single of both public and
multiple
organization private clouds
organizations
Its Initial
It costs as per It varies depending
investment for
Pay-as-you-go on usage of public
Cost infrastructure,
model being and private
potentially higher
cost-effective resources
operational costs
Security is
managed by Security concerns
Higher level of
cloud provider, must be addressed
Security control over
varying levels of for both public and
security measures
security private components
measures
Organizations
Private clouds using a
Amazon Web hosted on- combination of
Examples Services (AWS), premises or by public and private
Microsoft Azure third-party clouds, such as
providers AWS Outposts or
Azure Stack
Characteristics of IaaS
There are the following characteristics of IaaS -
PaaS cloud computing platform is created for the programmer to develop, test, run,
and manage the applications.
Characteristics of PaaS
There are the following characteristics of PaaS -
Characteristics of SaaS
There are the following characteristics of SaaS -
The below table shows the difference between IaaS, PaaS, and SaaS –
Cost Efficiency: Cloud providers provide a pricing model that permits customers
to pay only for the sources they consume. This gets rid of the need for advanced
infrastructure investments and allows price efficiency as businesses scale resources
based totally on need.
Managed Services: Cloud providers offer more than a few managed offerings,
managing duties together with safety, tracking, and safety. This helps agencies
dump operational obligations, pay attention to relevant skills, and experience the
records of cloud carriers.
Security Concerns: Security remains a top concern for companies moving to the
cloud. Storing information and programs on out-of-door servers will increase
questions on statistics' privateness, regulatory compliance, and the functionality of
unauthorized access.
Data Transfer Costs: Moving huge volumes of records from the cloud can require
extra charges. Organizations need to cautiously recollect and manipulate facts and
switch fees, in particular at the same time as dealing with enormous amounts of
records.
Vendor Lock-In: Adopting certain cloud providers can also result in provider
lock-in, wherein it becomes hard to migrate packages and statistics to a different
employer or again to on-premises surroundings. This can limit flexibility and cause
lengthy periods of dependence on a specific cloud organization.
Potential for Downtime: Cloud company companies may also experience outages
or downtime, impacting the supply of services. While respectable businesses try
for immoderate availability, occasional disruptions can occur, affecting users who
get proper entry to agency continuity.
Cloud compliance
Cloud compliance refers to the process of ensuring that cloud computing services
and infrastructures adhere to regulatory, legal, and industry-specific requirements.
Organizations using cloud services must comply with various standards to protect
data, maintain security, and meet legal obligations.
HIPAA has established several rules for protecting patient information’s privacy,
security, and confidentiality—Privacy rules, Security rules, Breach notification
rules, Omnibus rule, etc. It has also granted specific rights to patients to ensure
control over their sensitive information.
The PCI data security standard protects cardholder data from theft, loss, or
unauthorized access. It ensures that entities that accept, process, or transmit
cardholder data follow a set of requirements and best practices to prevent breaches
and maintain a secure CDE (cardholder environment). It covers 12 detailed
requirements to ensure safe credit card transactions with various security controls
like network security, access controls, encryption, etc.
Enforcement authority
HIPAA is enforced by the Office for Civil Rights (OCR) under the U.S.
Department of Health and Human Services (HHS), making it a regulatory
law (since 1996).
PCI DSS is not a government regulation and is rather enforced by the PCI
Security Council (PSC) formed by major credit card brands. These include
Visa, Mastercard, American Express, Discover Financial Services, and JCB
International.
Control interpretation
Certification process
HIPAA does not have a formal certification process. However, the OCR or
HHS can conduct audits and investigations to verify if the organization
adheres to HIPAA rules. Organizations should, therefore, conduct frequent
self-assessments to ensure HIPAA compliance.
In the case of PCI DSS, smaller organizations are required to fill out a Self-
assessment Questionnaire (SAQ). Larger organizations must undergo a
Qualified Security Assessors (QSA) assessment and obtain a Report on
Compliance (ROC).
Non-compliance consequences
Non-compliance with these frameworks attracts serious repercussions—
fines, penalties, lawsuits, increased scrutiny, and reputational damage. However,
the degree of these consequences can differ based on the severity of violations.
Control overlap
There are several overlapping controls for both these frameworks. Check out the
key requirements on common controls:
Challenge:
A major online retailer handling millions of transactions struggled with PCI DSS
compliance due to:
Solution:
Outcome:
Achieved full PCI DSS compliance and reduced cardholder data risks.
Prevented potential fines and legal issues.
Improved customer trust and payment security.
Case Study 2: HIPAA Compliance – Healthcare Provider
Challenge:
Solution:
Objective: Protect electronic protected health information (ePHI) and ensure data
privacy.
Key Implementation Strategies:
Outcome:
1. Cost Savings
Pay-as-you-go pricing – Only pay for the resources you use, reducing
capital expenses (CapEx).
No hardware maintenance – Cloud providers manage infrastructure,
eliminating hardware costs.
Lower operational costs – Automated scaling and managed services reduce
IT management expenses.
2. Scalability & Flexibility
7. Environmentally Friendly
Cloud computing offers many benefits, but it also presents several security
challenges that organizations must address. Here are the most critical security
concerns:
Cloud services rely on APIs for communication, but weakly secured APIs
can be exploited by attackers.
Publicly exposed APIs may have vulnerabilities that lead to unauthorized
access.
Solution: Use secure authentication (OAuth, JWT), API gateways, and
perform regular security testing.
5. Insider Threats
Organizations using the cloud must comply with GDPR, HIPAA, PCI DSS,
SOC 2, ISO 27001, and other regulatory requirements.
Data residency laws require certain data to remain within specific
geographic regions.
Solution: Choose compliant cloud providers, use data classification, and
maintain audit logs.
Cloud providers secure the infrastructure, but customers are responsible for
securing data, applications, and access controls.
Many organizations fail to properly configure security settings.
Solution: Understand the shared responsibility model and follow best
practices for cloud security.
Security Threats
Cloud computing introduces unique security risks that organizations must address
to protect data and infrastructure. Here are the most critical security threats in
cloud environments:
2. Account Hijacking
Cause: Poorly secured APIs expose cloud services to attacks like SQL
injection or DDoS.
Impact: Attackers can exploit API vulnerabilities to steal data or disrupt
services.
Mitigation:
o Use secure authentication (OAuth, JWT, API Gateway).
o Implement rate limiting and IP whitelisting.
o Perform regular API security testing.
4. Misconfigurations
5. Insider Threats
8. Compliance Violations
Cause: Unverified software, plugins, and cloud services with security flaws.
Impact: Attackers can exploit vulnerabilities in third-party services to gain
access to your environment.
Mitigation:
o Perform vendor security assessments before integration.
o Ensure third-party applications meet compliance standards.
o Regularly update and patch third-party software.
Cause: Failure to meet industry regulations like HIPAA, PCI DSS, GDPR,
ISO 27001.
Impact: Legal penalties, reputational damage, and customer trust loss.
Mitigation:
o Use cloud compliance automation tools (AWS Audit Manager,
Azure Compliance Center).
o Conduct regular security audits and ensure data localization
requirements are met.
Configuration error
Publicly exposed storage buckets (AWS S3, Azure Blob, Google Cloud
Storage).
Overly permissive IAM roles and policies (e.g., granting "Everyone"
access).
Unrestricted API endpoints leading to unauthorized access.
Lack of encryption for data at rest and in transit.
Disabled or improperly configured logging (CloudTrail, Azure Monitor,
etc.).
Data leaks & breaches (e.g., exposed databases, open storage buckets).
Compliance violations (GDPR, HIPAA, PCI DSS, etc.).
Privilege escalation due to weak IAM settings.
Mitigation Strategies
Restrict Public Access – Close unnecessary ports (22, 3389) and only allow
access from trusted IPs.
Use Private Endpoints & VPNs – Avoid exposing sensitive services to the
internet.
Enable Identity-Aware Proxies – Restrict access based on identity (Google IAP,
AWS IAM).
Monitor & Log Access – Use tools like AWS Cloud Trail, Azure Monitor, and
Google Cloud Logging for tracking access patterns.
Cloud Computing Architecture
Backend refers to the cloud itself which is used by the service provider. It
contains the resources as well as manages the resources and provides security
mechanisms. Along with this, it includes huge storage, virtual applications,
virtual machines, traffic control mechanisms, deployment models, etc. The back-
end is where all cloud processing, storage, and management take place. It consists
of:
1. Cloud Services
2. Virtualization Layer
3. Cloud Storage
4. Cloud Networking
Includes Virtual Private Clouds (VPCs), Load Balancers, and APIs for
communication.
Examples: AWS VPC, Azure Virtual Network, Google Cloud VPC.