As mentioned in the first part of this article, there are several stages at which the data through cloud hosting platform must be protected against data loss and unauthorized access. The first step is to ensure that the physical elements of the cloud hosting platform, as described, however, additional steps include architectural and software-based security measures to protect not only the platforms on which data is stored, but also data in transit and subsequent access points that allow you to actualize users to interact with the data.
Models of public cloud
Cloud offerings, including Cloud hosting, can be broadly classified in terms of their method of deployment (no matter whether they are infrastructure, platform or software as a service), or as a public cloud, private cloud or a hybrid cloud (a combination of the two). Most of the difference between public and private clouds spinning around the levels of security and privacy, not technical specifications. As the name suggests, public cloud uses the access point are available on public networks (e.g. Internet), public networks for communication of information and co-clustered cloud servers to store information. Essentially,anyone can “knock on the door of” cloud-based service, trying to intercept the information in the way and potentially to share their server resources.
Services, of course,must be protected endpoint authentication, data encryption and anti-virus / firewall measures on the server platform, to keep data safe, but they are exposed to ‘attack’ in almost every point in their architecture. Therefore, it is important that consumers are made aware of such services, which bears the risks of each service and the fact that the supplier puts in place to protect the data of its customers.
For organizations that are engaging in confidential data, but they may require additional restrictions on who may try to gain access to the cloud-based service, network, which it uses and sharing of the cloud servers. In particular, some organizations will be regulated by Decree, which requires that they retain control data for which they are ultimately responsible.
Private clouds may use a different architecture, but they are determined by providing the above-mentioned safety measures. Servers may be located on the Organization’s own premises or in the data center facility, but they will be accounted for using this single customer; whether physical or virtualised hardware division separation between clusters of servers an organization’s cloud platform will be their own firewall. In addition to protecting data in transit and to prevent untrusted users from accessing the cloud, a private cloud can be used again or virtualised physical separation from the general public networks. For example an organization can use to connect local area network (LAN) to access the cloud, which is located on the internal servers on a single physical location or a dedicated line connecting to servers at a remote location. In addition, technologies such as MPLS (Multi-Label Switching Protocol) can be used to provide the Organization with a trusted network connection controlled by individual vendors, the entire infrastructure of the public network. The latter can provide greater flexibility and scalability enables organizations to take advantage of the cloud hosting providers can provide a greater degree.
Hybrid cloud combines elements of public and private clouds, and therefore can provide security, organizations require for their sensitive and private data, allowing them to effectively scalability of the cost of access to the public cloud for their unclassified transactions. For example an organization can store all of their data is protected client systems and databases posted on the website in the private cloud as required by regulation,but gets computing resources from public clouds for their brochurewares website hosting platform.
Experience in the data center
The previous part of this article referred to the benefits of data center location in terms of physical server maintenance, and data loss prevention. It is also worth noting that public clouds and private clouds that use location data centers by third parties for their hosting (while introducing vulnerabilities in data transmission) can take advantage of local expertise in the maintenance of software and anti-virus measures, including, to the Example corrections to optimize both the conservation and safety data.