, insider attacks are the third biggest threat in cloud computing.[3] Therefore,
Cloud Service providers must ensure that thorough background checks are conduct
ed for employees who have physical access to the servers in the data center. Add
itionally, data centers must be frequently monitored for suspicious activity.
In order to conserve resources, cut costs, and maintain efficiency, Cloud Servic
e Providers often store more than one customer's data on the same server. As a r
esult, there is a chance that one user's private data can be viewed by other use
rs (possibly even competitors). To handle such sensitive situations, cloud servi
ce providers should ensure proper data isolation and logical storage segregation
.[1]
The extensive use of virtualization in implementing cloud infrastructure brings
unique security concerns for customers or tenants of a public cloud service.[4]
Virtualization alters the relationship between the OS and underlying hardware be it computing, storage or even networking. This introduces an additional layer
- virtualization - that itself must be properly configured, managed and secured
.[5] Specific concerns include the potential to compromise the virtualization so
ftware, or "hypervisor". While these concerns are largely theoretical, they do e
xist.[6] For example, a breach in the administrator workstation with the managem
ent software of the virtualization software can cause the whole datacenter to go
down or be reconfigured to an attacker's liking.
12. what is cloud cryptography?
Crypto cloud computing is a new secure cloud computing architecture. It can prov
ide protection of information security at the system level, and allows users acc
ess to shared services conveniently and accurately. Crypto cloud computing prote
cts individual s connections with the outside world. It can protect the personal p
rivacy without any delay of information exchange.
long type
1.