Cloud computing security

Cloud computing security is a secure way to store and access files and programs over the Internet on an external computer or a memory service instead of on a computer's hard drive. It is commonly used to store large amounts of files from devices that may have limited storage. Cloud computing has many advantages; however, it involves trusting an external service to keep sensitive data secure. If hackers breach a cloud computing service, any personal information kept by that service could be compromised. Individuals can minimize risks by choosing a secure cloud computing service, encrypting files, and taking other security measures.rssalemscience-20170120-92-156548.jpgrssalemscience-20170120-92-156553.jpg

Background

Modern computer memory is very different from early computer memory. In the past, data was kept on large cathode ray tubes, which could store less than two hundred bytes of information. The US government eventually released the first computer with enough internal memory and processing power to store and run a simple program without the aid of external hardware.

In the early 1950s, computer engineers began to experiment with magnetic-core memory. This memory format could store less files than other forms of memory, but it could perform at a much faster rate. This developed into the first random-access memory (RAM). RAM is used to carry out quick computations that do not need to be stored for an extended period. It is constantly wiped clean and rewritten for new calculations. While it first premiered in the early 1960s, variants of RAM are still used into the twenty-first century.

Over time, hardware engineers developed hard drives. These drives utilized magnetic storage, which allowed them to store much larger amounts of data than cathode ray drives could keep. However, hard drives wrote memory slower than other types of memory. This made them ideal for long-term file storage but poor choices for day-to-day operations. Computer engineers then developed flash memory, which was capable of storing large amounts of data and quickly reading and writing files. However, flash memory was expensive to produce in large quantities.

Overview

Modern computing devices, such as personal computers, laptops, smartphones, and tablets, often require large amounts of storage. This is because computer users consume large quantities of media in the form of videos, movies, music files, photographs, and games. This media takes up much storage space. Some device manufacturers have dealt with this problem by including expanded amounts of memory in their devices. While effective, this solution can drastically raise the cost of the device, making it too expensive for many consumers to purchase it and less cost effective for manufacturers to produce it. Other manufacturers include expansion drives, allowing device owners to add memory as needed. While this lowers the initial price of the device, the cost of continuously adding storage to a device can become expensive.

The amount of processing power in a device has faced similar scaling problems. While devices grow more powerful, the demands placed on them is growing at an unprecedented rate. Older devices quickly become obsolete, as their hardware becomes unable to meet the demands of cutting-edge software. A common solution to storage and processing problems is cloud computing.

When utilizing cloud computing, a computer uses a high-speed network to shift the burden of memory or power from itself to some distant machine. For example, computer users who need more memory for a large collection of music files might pay a small monthly fee to store their files on a company's large collection of servers. Because the company has the resources and expertise to devote to a massive server framework, many consumers are able to secure limitless amounts of storage for themselves. Additionally, this storage can be accessed from any computer or device connected to the Internet.

The same applies to processing power. Engineering projects, computer simulations, and scientific research typically require incredibly powerful computers. Through cloud computing, users can purchase access to capable machines through the Internet. This is often more affordable than purchasing new supercomputers and allows users to work on and run their projects from any location with a high-speed Internet connection.

Unfortunately, cloud computing is not without risks. Because of its price efficiency and convenience, large amounts of important data are stored in cloud computing services. This data includes sensitive information such as private documents, irreplaceable photographs, credit card information, and tax data. Hackers have breached cloud storage databases, gaining access to the personal information stored within them. Hackers can use this stolen information for themselves or sell it to criminals for a high price.

Individuals can take several steps to keep data secure on a cloud storage network. Consumers should research a network before choosing to store any data on it. They should look for records of previous hacks and compare those records to those from other networks. While most cloud computing services have their own complex cybersecurity procedures, computer users can add their own layers of security. For example, computer users may encrypt their own data before submitting it to the cloud storage network. Once encrypted, data can only be read by a special decryption key. As long as users keep their decryption keys safe, their data cannot be stolen.

Consumers also should ensure that the cloud service keeps its servers in a secure location. Hackers who gain physical access to a server room can easily steal the contents of servers. Consumers should make sure that the number of people granted access to sensitive information is minimal. A single user accessing data from an unsecure access point, such as public Wi-Fi or an unprotected private network, could lead to a leak of private information. Users can add another layer of security to important files by routinely backing up these files on external drives to prevent permanent loss.

Bibliography

Coles, Cameron. "9 Cloud Computing Security Risks Every Company Faces." Skyhigh, www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces. Accessed 15 May 2017.

"Computer Memory History." Computer Hope, 5 May 2017, www.computerhope.com/history/memory.htm. Accessed 15 May 2017.

"High Performance Computing." Amazon Web Services, aws.amazon.com/hpc. Accessed 15 May 2017.

Mohamed, Arif. "A History of Cloud Computing." ComputerWeekly, www.computerweekly.com/feature/A-history-of-cloud-computing. Accessed 15 May 2017.

Price, Daniel. "Five High Profile Could-Based Failures." Cloud Tweaks, 20 May 2014, cloudtweaks.com/2014/05/five-high-profile-cloud-based-failures/. Accessed 15 May 2017.

Rashid, Fahmida Y. "The Dirty Dozen: 12 Cloud Security Threats." InfoWorld, 11 Mar. 2016, www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html. Accessed 15 May 2017.

"Security for Cloud Computing: Ten Steps to Ensure Success, Version 2.0." Cloud Standards Customer Council, Mar. 2015, cloud-council.org/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-Ensure-Success.pdf. Accessed 15 May 2017.

"Top 10 Security Tips for Businesses That Utilize the Cloud." State of Security, 13 July 2016, www.tripwire.com/state-of-security/featured/top-ten-security-tips-for-businesses-that-utilize-the-cloud. Accessed 15 May 2017.