翻訳と辞書
Words near each other
・ CloudBook
・ CloudBoost
・ Cloudbreak mine
・ Cloudbric
・ Cloudbuilt
・ Cloudburst
・ Cloudburst (1951 film)
・ Cloudburst (2011 film)
・ Cloudburst (comics)
・ Cloudburst (disambiguation)
・ Cloudburst (Transformers)
・ Cloud computing comparison
・ Cloud computing consulting
・ Cloud computing issues
・ Cloud Computing Manifesto
Cloud computing security
・ Cloud condensation nuclei
・ Cloud Control
・ Cloud County Community College
・ Cloud County Health Center
・ Cloud County Historical Museum
・ Cloud County Thunderbirds
・ Cloud County Veterans Memorial
・ Cloud County, Kansas
・ Cloud cover
・ Cloud Creek crater
・ Cloud Creek, Oklahoma
・ Cloud Cruiser
・ Cloud cuckoo land
・ Cloud Cuckoo Land (journal)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Cloud computing security : ウィキペディア英語版
Cloud computing security

Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
==Security issues associated with the cloud==

Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers.〔Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). (CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification ). Expert Systems with Applications, 42(21), 7905–7916.〕 Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid, and Community). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud). The responsibility goes both ways, however: the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the user must take measures to fortify their application and use strong passwords and authentication measures.
When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially business sensitive and confidential data is at risk from insider attacks. According to a recent Cloud Security Alliance Report, insider attacks are the third biggest threat in cloud computing.〔(【引用サイトリンク】url=https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf )〕 Therefore, Cloud Service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers must be frequently monitored for suspicious activity.
In order to conserve resources, cut costs, and maintain efficiency, Cloud Service Providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.〔
The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist. For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Cloud computing security」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.