Page 1030 - Cloud computing: From paradigm to operation
P. 1030

7                                                     Security


            RPO     Recovery Point Objective

            RTO     Recovery Time Objectives
            SaaS    Software as a Service
            SLA     Service Level Agreement

            SMS     Short Message Service
            SSO     Single Sign-On

            VDC     Virtual Data Centre
            VM      Virtual Machine


            5       Conventions
            None.


            6       Overview
            With the rapid expansion of the cloud computing market and the establishment of industry chains, security
            issues continue to be a major and important topic that cannot be ignored. Cloud computing systems are
            facing  more  challenges  than  traditional  information  technology  (IT)  systems  because  they  are  more
            complicated, and huge amounts of users' private data have been stored in the cloud. Both security and
            privacy protection are the most important factors when customers evaluate the use of cloud computing
            services.
            More and more cloud services will be supplied, and methods to guarantee the reliability of these cloud
            services  have  become  more  urgent.  It  is  therefore  necessary  to  thoroughly  investigate  the  operational
            security of cloud computing to provide guidelines for cloud service providers (CSPs). The guidelines can help
            CSPs reduce the security risk from improper operation, unreasonable business design, etc., and improve the
            overall security level of operation for cloud computing services.
            From the perspective of CSPs, the main security challenges of operational security are described below:
            1)      Challenges to the maintenance of cloud computing infrastructure: When cloud computing provides
                    the users with IT infrastructure, a platform or software as a service, the stability, reliability and safe
                    delivery  of  cloud  services  are  a  prerequisite  to  carry  out  business.  In  order  to  guarantee  that
                    customer service is not interrupted, the infrastructure of the cloud system should be ensured for a
                    reliable and stable operation, and the necessary precautions should be adopted to protect the safety
                    and privacy of user's information. Even in the event of a small failure, many CSCs  may experience
                    difficulties such as business interruption or data loss. CSPs should seriously consider how to quickly
                    locate the faults and automatically switch to the backup system seamlessly to protect the availability
                    of customers' service.
            2)      Challenges to the management mode of cloud computing: The characteristics of cloud computing,
                    such  as  cross-regional  services,  huge  computing  power,  separation  of  data  management  and
                    ownership,   distinguishes  it   from  the traditional  IT services.  These challenges  require  effective
                    management and co-operation between branch nodes to solve security problems by CSPs. For CSPs,
                    some necessary technical measures, such as security configuration management, etc., a reasonable
                    distribution of management authority, and a set of effective management rules and processes will
                    be needed to prevent the leakage of user data. For example, CSPs should take measures to prevent
                    the internal administrators from overstepping their authority so as to prevent users from abusing
                    the cloud computing resources.
            Overall, for the complete security of cloud applications operated on the cloud infrastructure, CSPs should
            adopt different technological methods and management mechanisms not only to maintain the security,
            stability and availability of the cloud infrastructure, but also to protect the business continuity and the user
            data of the cloud services operated.





            1022
   1025   1026   1027   1028   1029   1030   1031   1032   1033   1034   1035