{"id":7868,"date":"2020-05-21T09:19:35","date_gmt":"2020-05-21T09:19:35","guid":{"rendered":"http:\/\/blog.experfy.com\/?p=7868"},"modified":"2023-12-12T07:08:38","modified_gmt":"2023-12-12T07:08:38","slug":"data-security-in-the-cloud-2","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/data-security-in-the-cloud-2\/","title":{"rendered":"Data Security in the Cloud"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7868\" class=\"elementor elementor-7868\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-107eb9da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"107eb9da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7302c6a3\" data-id=\"7302c6a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3dc7f03e elementor-widget elementor-widget-text-editor\" data-id=\"3dc7f03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>What is the topic of this post is the answer to the question that I often get from a friend, and this is the dilemma, \u201cMay I keep my data in the Cloud environment and how safe is it, or what is the risk of such an action?\u201d I will try to briefly explain a few things about the functioning of the Cloud itself and the security risks that appear in this environment. So let\u2019s get started.<\/p>\n\n\n\n<p>The first thing that\u2019s definitely true is that cloud computing has changed the way it\u2019s working today. The advantage of this approach is huge because your data is available wherever you are and you can access it from all types of devices regardless of which operating system you have (mobile phones, tablets, laptops \u2026). This is a very positive thing about the advantages of using this technology because one of the effects is certainly the possibility of great savings on IT costs for the company because someone else takes care of your data, and users can use resources from cheaper devices (not everyone needs to have strong computers with powerful processors and a lot of RAM). However, one needs to know that there are three basic service models in each cloud environment, and each of these models has a different impact on cloud security and no security measure is universally applicable to all three models.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e702ec8 elementor-widget elementor-widget-text-editor\" data-id=\"e702ec8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><strong>These are the following models:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Infrastructure as a Service (IaaS)<\/li>\n<li>Platform as a Service (PaaS)<\/li>\n<li>Software as a Service (SaaS)<\/li>\n<\/ul>\n\n\n\n<p>Since the theme of this post is not to present detailed Cloud services, I will not deal with each of them individually, but I want to emphasize that each of them have their own security risks that are not universal.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1016f75 elementor-widget elementor-widget-heading\" data-id=\"1016f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n<h2 class=\"wp-block-heading\">Do you and how much do you control your data if you outsource them?<\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44edcf6 elementor-widget elementor-widget-text-editor\" data-id=\"44edcf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Cloud providers generally have well-equipped data centers, adequate logistics, and highly qualified IT staff, which small and medium-sized institutions in some countries can hardly afford at that level. Here, one should keep in mind that still, the biggest responsibility is on the user because it does not mean much if the Cloud provider takes care of all other things and the user does not protect their access to the Cloud.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cd8319 elementor-widget elementor-widget-heading\" data-id=\"9cd8319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>What information should I keep on the Cloud?<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-966eea9 elementor-widget elementor-widget-text-editor\" data-id=\"966eea9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>A big controversy is always raised around this question. Some data types are too sensitive to accommodate in a public or hybrid Cloud. First of all, this includes confidential business data, such as customer data for example.\u00a0 However, there are different variants of the Cloud and the question is which is the right model for your business. In a public Cloud, the situation is that more users share the same storage space and security is at a much lower level. In contrast, the private or hybrid Cloud has very different characteristics, and also the price of usage. So, everything should be taken into account when choosing.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-156e443 elementor-widget elementor-widget-heading\" data-id=\"156e443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Why should you have confidence in your cloud provider?<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b320c3 elementor-widget elementor-widget-text-editor\" data-id=\"9b320c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Today, most cloud providers are certified for the work they do and are trying to gain and retain a good reputation for old and new customers. This means they are ready to meet certain standards that suit you and which you probably cannot easily fulfill and reach as a company. Choosing a Cloud provider is a matter of trust and it must be built over time.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80d6761 elementor-widget elementor-widget-heading\" data-id=\"80d6761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading -->\n<h2>Do I use Cloud in a business or not?<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c42dce elementor-widget elementor-widget-text-editor\" data-id=\"6c42dce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>The answer from my side is simple \u2013 YES! But you still need to make your own decision, because of the security of your data, however, you must decide for yourself! If you decide to use this service, you need to check the compliance of Cloud Providers with the regulations, the possession of appropriate certificates, the possibility of external auditing, as well as the credibility of the providers and its administrators. Since they are aware of the risk, providers offering Cloud Computing services very seriously grasp the dangers that exist in the Cloud. Even in the event of an unintended incursion into the system, this does not mean that data from hackers is given \u201con a plate\u201d. They are encrypted and it is almost impossible to decrypt them in a reasonable time. What creates further confusion here is the large amount of news that spreads rapidly through the internet as the compromise of a large number of data is happening. This is mostly not true, but only the hash value of the passwords and it\u2019s a big question of whether and in what way can it really break up. However, my personal opinion is that, working in a cloud environment brings a number of advantages over working with isolated computers. Of course, we need to be cautious and take care of everything, but there should be no paranoia and the rejection of such technology will definitely grow in the future.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12077df elementor-widget elementor-widget-heading\" data-id=\"12077df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Future or present?<\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1806b6c elementor-widget elementor-widget-text-editor\" data-id=\"1806b6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Imagine the next scenario. You live in London, and use public garage services to have a monthly lease of a parking space for your car. It\u2019s all a complex Cloud system that allows you to access your parking place with your card and PIN code and enter the garage. At some point after unpaid bills or due to some lawsuit on the account of parking, someone extinguishes your account for access to the system and, therefore, garages in downtown London. Do you think this is a science fiction movie from the period after 2025? The answer is NO, this is news that is from today, and as you can see, that has become our reality. Whether and to what extent we use these technologies depend largely on ourselves.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data in the Cloud environment and how safe is it, or what is the risk of such an action? You need to know a few things about the functioning of the Cloud itself and the security risks that appear in this environment. One needs to know that there are three basic service models in each cloud environment, and each of these models has a different impact on cloud security and no security measure is universally applicable to all three models.<\/p>\n","protected":false},"author":685,"featured_media":7866,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[],"ppma_author":[3475],"class_list":["post-7868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud"],"authors":[{"term_id":3475,"user_id":685,"is_guest":0,"slug":"alen-ibric","display_name":"Alen \u0130bri\u00e7","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7b9fc7fb-1f17-4554-9f19-b942b50e055c-150x150.jpg","user_url":"http:\/\/www.bilkent.edu.tr\/","last_name":"\u0130bri\u00e7","first_name":"Alen","job_title":"","description":"<a href=\"http:\/\/alenibric.com.tr\/\">Alen \u0130bri\u00e7<\/a> is Senior Computer Engineer at Bilkent University, Turkey."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/685"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=7868"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7868\/revisions"}],"predecessor-version":[{"id":34866,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7868\/revisions\/34866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/7866"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=7868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=7868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=7868"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=7868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}