Thursday, April 17, 2014

Top Challenges Faced by Cloud Security

In the computing world, cloud security is a sub-domain of Information security. Cloud model is a type of distributed computing which includes services such as IaaS (Infrastructure-as-a-service), SaaS (Software-as-a-service) and PaaS (Platform-as-a-service). As the cloud structure is still not fully standardized, it contains much inherent vulnerabilities. This paves the way for network intruders to get access of customer credentials. 


Here is the list containing some of the security challenges commonly found under a cloud environment.

Data Vulnerability

Most cloud platform vendor’s trumpet about the robustness of their services, often claiming 100% data security of the enterprise data. The fact was boasted on the basis of encryption services provided to customer data before actually storing it on server space. Still the data can be accessible to third party organizations (Cloud vendors) because of access to decryption methods. Data vulnerability can only be prevented if a customer encrypts the whole information at his end before finally transmitting data through the channel.   

Service Hijacking

The multi-tenant architecture of cloud is a real threat for providing safe services to all customers. For example, if a hijacker gains access to your account credentials, he can easily intercept, forge or act on your behalf. Such distorted information can be used to redirect users to malicious websites making them a victim of phishing attacks. To prevent service traffic hijacking instances, organizations should deploy authentication controls over their login credentials, in order to reduce the risk of data loss.  A two-way authentication reduces the chances of snooping in cloud systems.

Contract Management

In a cloud computing contract, software or hardware resources are leased to customers. Only a single contract is required to acquire software and hardware integration. Cloud contracts are known as service-level agreements (SLAs). SLA generally focuses on the quality of network interaction, but under shared architecture it becomes nearly impossible to deliver the promised quality. Also, relatively low compensation is provided against service breaches.

Lock-in Situations


Customers must be aware of the cost associated with changing a business service from one platform to another. The switching cost must be in your mind before finalizing a deal for cloud services on contract basis. 

No comments:

Post a Comment