Anticipating the possible security issues related to cloud hosting

Posted: October 24, 2013 in Articles
Tags: , , , , , ,

CloudCloud Hosting is a way of creating cost effective, scalable and safe web architecture by configuring servers. With all its advantages there are some concerns which are plaguing the extensive use of Cloud Hosting. One of such issue is Security. The security mentioned could be the security of data from hardware damage, but such security is enhanced in cloud hosting since the data is distributed. The real security issues are:

Data Breaches

Data breaches refer to the access of client’s data by someone other than a client. The magnitude of thisthreat was illustrated in the research paper by CSA (Cloud Security Alliance) that how a multitenant server can be breached if the cloud service database is not designed properly.

Service Traffic Hijacking

Hijacking is another big security threat that lingers upon the use of cloud hosting. This is when a hijacker accesses your credentials and monitors every activity that is been done by you. Moreover, he can redirect your clients to malicious and illegal sites.

Incompatibility

Storage services provided by one cloud vendor may be incompatible with another vendor’s. In such a case, the data compatibility takes a setback and suffers a major blow.

Insecure Interferences and API

APIs are integral to security and availability of general cloud services. The organizations and third parties work on these interfaces. This makes the new API complex and a need for organizations to give up their secrets. In this case, CSA advices the companies to completely understand the security norms and implications and then take any step forward.

Insiders

The insider can be en employee a former worker who gets the access of the system and uses it for personnel and illegal purposes. If the cloud is not built properly, this insider can cause much more damage. This situation worsens when the encryption keys lies with the host. A statement of CSA says,“Even when the encryption is implemented, if the keys are not kept with the customer and are only available at data-usage time, the system is still vulnerable to malicious insider attack”.

Denial of Service

Denial of service has been a thorn in service provider’s side for a long time now. It is possible that a malicious user will take all the possible resources. Thus, the system cannot satisfy any request from other legitimate users due to resources being unavailable.

Cloud Abuse

This means that a hacker is using a cloud to crack an encryption which is difficult on a standard computer or a bad guy using cloud to launch a distributed denial of service attacks or propagate malware. The challenge here is for cloud providers to define what constitutes abuse and to determine the best processes for identify it.

Conclusion

Cloud is surely a thing of present and future;it has great advantages but there are some security issues that need to be rectified or taken care of by the organization for the fulfillment of cloud’s tremendous potential. Thus, a small compromise in the service provided can have long lasting effects on the image of the organization as well as on the host.

Author Bio: RenukaRana, Editor at MyRealData spends considerable part of her time in writing about technology including cloud hosting, Hosted PBX and QuickBooks hosting. When not writing, she loves to dig deeper into knowing the best and the latest technology in industry.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s