Securing Business IT on the Cloud

Securing Business IT on the Cloud

Bina Ramamurthy
DOI: 10.4018/978-1-4666-5788-5.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this chapter, the author examines the various approaches taken by the popular cloud providers Amazon Web Services (AWS), Google App Engine (GAE), and Windows Azure (Azure) to secure the cloud. AWS offers Infrastructure as a Service model, GAE is representative of the Software as a Service, and Azure represents the Platform as a Service model. Irrespective of the model, a cloud provider offers a variety of services from a simple large-scale storage service to a complete infrastructure for supporting the operations of a modern business. The author discusses some of the security aspects that a cloud customer must be aware of in selecting a cloud service provider for their needs. This discussion includes the major threats posed by multi-tenancy in the cloud. Another important aspect to consider in the security context is machine virtualization. Securing these services involves a whole range of measures from access-point protection at the client end to securing virtual co-tenants on the same physical machine hosted by a cloud. In this chapter, the author highlights the major offerings of the three cloud service providers mentioned above. She discusses the details of some important security challenges and solutions and illustrates them using screen shots of representative security configurations.
Chapter Preview
Top

3. Securing The Business Operations On The Cloud

A high level view of the cloud-based system architecture is shown in Figure 1. The client side shown on the left depicts the exponential growth in mobile devices, social networks, and the diversity of application domains. Data generated by these technological advances has been characterized by variety, veracity, high volume and high velocity (the four V’s) (Zikopoulis, 2012). Data generated offers a gold mine of intelligence and most businesses desire to take advantage of this. This warrants large and efficient storage and secure access to the data and algorithms. Businesses have been increasingly relying on the cloud to address these newer demands as shown below in Figure 1.

Figure 1.

Architecture of a cloud-based system

978-1-4666-5788-5.ch006.f01

Complete Chapter List

Search this Book:
Reset