Cloud Computing Security Issues

0
21
Cloud Computing

The IT industry has seen a tremendous growth in the past few years. One the best innovations is cloud computing. You are able to run a program on several computers connected in the same network. The shared services have helped companies reduce costs on certain IT necessities. As much as cloud computing is among the fastest growing components of IT, some people are skeptical about it. This has made them hesitant to use it.

In a bid to maximize on profits and reduce losses, companies are increasingly using the cloud network. Overtime, there is too much information placed on the cloud, somewhat risking a security loophole. Some common security concerns include:

  • Confidentiality

You need to be sure that the information you share via cloud is only seen by the intended people. The cloud network service provider always has access to the remote location where all information in the cloud is stored. Such an arrangement is unacceptable to people who wish to use the cloud network yet have highly confidential information to share. In such a scenario, you must use a service provider who ensures that the information is always encrypted. Sign a contract that guarantees you that the information is only visible to the sender and recipient computer.

  • Trust

Passing your vital information through a third party is a risk. Depending on the information passed, there is a chance that at some point, an insider attack is inevitable. This is the feeling that most trust-oriented companies have. There is no satisfying proof that the service provider is trustworthy. Currently, the only legal agreement between the client and the service provider is the Service Level Agreement (SLA). As much as this document shows what kind of service the two parties have agreed on, there is no clear format on how the SLA should be. Companies should therefore seek better ways of ensuring that trust exists among its clients.

  • Legal issues

Cloud computing is governed by several laws. However, these vary from one country to another. A specific law is only applicable within its jurisdiction, losing meaning and effect on a different location. This is the problem that cloud network users get when their data is located in a different location from them. Make certain that the laws around where your IT equipment as well as data is located fully favor you.

  • Encryption

It is among the best solutions to data insecurity. However, encryption faces a few drawbacks. For example, when a query is sent, a significant amount of data has to be decrypted. A database is designed to run query operations, which prompts decryption of too much data. This risks data insecurity. A company should make sure that it applies certain approaches that aim to reduce security breaches when decrypting data. Purushothama B.R and B.B Amberker (Purushothama & Amberker 2013) proposed one of the approaches. You must encrypt data in each cell, which are checked against the stored data using encrypted query parameters.

These cloud computing security issues are easy to deal with. Within a short time, we will have an increased number of users who have 100% trust in the service if these problems are solved.