Home of RF and Wireless Vendors and Resources

One Stop For Your RF and Wireless Need

cloud storage security | Security aspects in cloud storage

This page of cloud storage security covers security aspects in cloud storage.The basic security mechanisms used by client (user) and server (provider) of cloud storage are described. Also refer following sub-topics of cloud storage tutorial.
Main Page of tutorial  What is Cloud Storage  Types  Infrastructure  How does it work  traditional storage vs cloud storage  Service providers  cloud storage security  cloud computing tutorial 

As we know there are many benefits of cloud storage services as mentioned below:
• Scalable• No investment cost• pay based on consumption only • access from anywhere and so on.

Inspite of these benefits clouds pose threats as mentioned below:
• Unknown exposure• loss of control• fast and reliable network needed • inherent risk of outsourcing• customization not possible and so on.

Above factors have lead to security concerns for both the customer as well as provider. In cloud storage security customer's interests are to protect outsourced programs and data, prevent attacks by provider and to protect against attacks on provider by other tenants. The cloud service provider's interests are to protect infrastructure and maaintain service quality for the others. Infrastructure protection include protection against abuse by tenants, like botnets and spammers which pay for the service and protection against tenant to tenant attacks.

cloud storage security mechanisms

Following are the mechanisms of cloud storage security:

• Data at rest encryption
• Data authentication/Integrity protection
• Data replication
• Access control to data

cloud storage security fig1

Though there is access control between the client and storage server, security is essential. This is because many attackers bypass the access control. Due to encryption access control is shifted to key access. This makes easier to guard the keys. This is depicted in the figure-1 below.

cloud storage security fig2

Data encryption can be done as mentioned on client side as well as cloud service provider side.

What is difference between

Circuit Switching vs Packet switching
packet switching vs message switching
Internet Vs Intranet
Difference between OSI and TCPIP layers

RF and Wireless tutorials

WLAN  802.11ac  802.11ad  wimax  Zigbee  z-wave  GSM  LTE  UMTS  Bluetooth  UWB  IoT  satellite  Antenna  RADAR 

Share this page

Translate this page