Page 177 - DCAP609_CLOUD_COMPUTING
P. 177
Cloud Computing
Notes
Example: In cloud based architecture, data is replicated and moved frequently so the risk
of unauthorised data recovery increases dramatically. Like, disposal of old equipment, reuse of
drives, reallocation of storage space. The manner that data is replicated depends on the service
level a customer chooses and on the service provided.
Different cloud vendors offer different service levels. Risk of unauthorized access to data
can be mitigated through the use of encryption, which can be applied to data as part of the
storage service or by on-premises equipment that encrypts data prior to uploading it to
the cloud.
3. By sharing storage and networks with many other users/customers it is possible for other
customers to access your data. Sometimes because of human error, faulty equipment, a
bug and sometimes because of criminal intent. This risk applies to all types of storage and
not only cloud storage. The risk of having data read during transmission can be mitigated
through encryption technology. Encryption in transit protects data as it is being transmitted
to and from the cloud service. Encryption at rest protects data that is stored at the service
provider. Encrypting data in an on-premises cloud service on-ramp system can provide
both kinds of encryption protection.
4. It increases the number of networks over which the data travels. Instead of just a Local
Area Network (LAN) or Storage Area Network (SAN), data stored on a cloud requires a
WAN (wide area network) to connect them both.
11.3.2 Risks of Storing Data in the Clouds
For all the potential of the cloud storage model, there are still a few disadvantages. By utilizing
cloud storage, users relinquish direct control over their data. Although a cloud storage provider
is far less likely to have its data lost or compromised than most individuals or organizations,
people are still more comfortable knowing precisely where their critical data is located and who
is personally responsible for it. Access to data stored on a distributed network is also constrained
by the access to the Internet. Lower Internet bandwidth will result in decreased performance and
an Internet service outage will completely sever an organization’s access to its information.
Self Assessment
Fill in the blanks:
9. Cloud storage is defined as a model of ……………………. enterprise storage.
10. The safety of the files depends upon the ……………….. websites.
11.4 Evaluating Online File-storage and Sharing Services
Online storage provides users with the peace of mind that the data will remain intact in any
event, including local hardware malfunctions, accidental deletions, thefts, and disasters. Online
storage is the perfect solution for anyone who needs to access their data from multiple locations
or share it with others within an instant. Online storage services typically allow subscribers to
purchase and access extra storage space within a number of minutes. Since, the data is stored in
the same virtual location as other files, searching for files is much easier than searching for files
that are spread out amongst multiple storage devices.
172 LOVELY PROFESSIONAL UNIVERSITY