Improving Cloud Security Using Distributed Ledger Technology

Improving Cloud Security Using Distributed Ledger Technology

Copyright: © 2023 |Pages: 19
DOI: 10.4018/979-8-3693-0593-5.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The confidentiality, integrity, and availability triad is a fundamental principle for information security. The objective of this chapter is to examine this triad where blockchain technology can be applied to enhance security in cloud computing. The current pasture of cloud security is explored to identify the gaps and approaches for using blockchain technology to reduce those gaps are discussed in this chapter. Blockchain technology is well-recognized for its ability to ensure data integrity. The largest gap that can be reduced is in this area. With the decentralized and distributed architecture of blockchain, there are ways to leverage it to improve the availability of cloud security. Confidentiality, where encryption plays a significant role, has the least gap in cloud computing; however, since the responsibility for assuring confidentiality is on the user, blockchain offers alternative and additional strengths. This chapter also covers a detailed discussion of avoiding prevalent security threats by implementing blockchain technology in cloud computing for making it more secure.
Chapter Preview
Top

Current State Of Cloud Security

In recent years, numerous surveys have been concentrated on exploring security challenges in cloud computing. A comprehensive review of cloud security is provided by delving into distinct aspects while addressing the issues and challenges in this chapter's cloud security. A cloud service provider (CSP) refers to an entity or organization that provides services to cloud consumers. To enhance the security capabilities, cloud service providers are dedicating considerable resources however there are still challenges remaining. Their responsibilities encompass procuring and managing cloud infrastructure, as well as structuring and arranging cloud infrastructure.

CSPs offer cloud services that are generally aligned to three different models. In the software as a service (SaaS) model, services are delivered by the cloud provider at specified levels by configuring, maintaining, deploying, and updating the various software applications. The SaaS provider manages and controls the infrastructure and applications due to the limited administrative applications of cloud. In the Platform as a Service (PaaS) model, the cloud provider manages the computing infrastructure of the platform, whereas cloud software supplies the platform elements such as runtime software, databases, and middleware components. In the Infrastructure as a Service (IaaS) model, the cloud provider provides computing resources encompassing networks, storage, servers, and hosting infrastructure (Tabrizchi & Rafsanjani, 2020).

All cloud vendors provide security services under a Shared Responsibility model where responsibility for security is shared by CSPs and Customer organizations at varying degrees. The Shared Responsibility Model stands as a security and compliance framework outlining the responsibilities of both cloud service providers (CSPs) and customers in ensuring the security of distinct aspects of the cloud environment. These responsibilities encompass infrastructure, hardware, endpoints, settings, data, configuration, network controls, operating system (OS), and access rights. As per the Shared Responsibility Model, the cloud provider is responsible for supervising and addressing security risks related to the cloud platform and its underlying infrastructure.

On the other hand, end users, whether they are individuals or organizations, bear the responsibility of protecting their data and other resources stored in any cloud environment. To ensure the adherence to security standards, Cloud security practices are influenced by compliance requirements and regulations. Compliance with industry standards and data privacy regulations such as General Data Protection Regulation (GDPR) in the EU, Health Insurance Portability and Accountability Act (HIPAA) in the USA, and California Consumer Privacy Acts (CCPA) remain a top concern, and cloud providers are working to ensure compliance with the services. There are more such regulations in development that will become regulatory requirements worldwide. Encryption plays a significant role in ensuring the security of data stored in the cloud. Organizations are implementing encryption methods to protect data while it is at rest, in motion, and being processed in the cloud. In addition, strategies such as data loss prevention (DLP) and data classification are used to protect sensitive information.

To ensure compliance with security standards, Cloud security practices are influenced by compliance requirements and regulations. Compliance with industry benchmarks and privacy regulations for data (such as GDPR, HIPAA, and CCPA) remains a top concern, and cloud providers are striving to guarantee compliance in their services. Encryption serves a pivotal function in upholding the security of data stored in the cloud. Enterprises are integrating encryption techniques to protect data throughout its static, transit, and processing phases in the cloud. Additionally, strategies like data loss prevention (DLP) and data classification are employed to protect sensitive information.

Complete Chapter List

Search this Book:
Reset