Subscribe Us

Cloud computing and common questions about security

The cloud computing system is nowadays more and more preferred. However, recently researches show that the security problems have been the biggest barrier to the decision that cloud computing will continue to be applied or not. Cloud computing or Virtual server computing is the system that uses computer and internet technology. The term “cloud” refers to the internet and its infrastructure.

All of us have to admit that we cannot absolutely manage our environment, data and even people. Changes in the cloud computing system can increase or decrease the risks of losing data. The cloud application that provide clearly information and updated management tools will help decreasing the risks. However, there are some others cloud applications that cannot adjust the security status, and this will definitely increase the risks for users.

There are many questions about the pros and cons of the using of cloud computing. Security, usefulness and management are always the biggest questions. Security is the issue that is most cared about. In this articles, we will take an overview about common questions about the cloud computing’s security. Answer those questions can help us quickly make decision about whether continue apply cloud computing system or not.

1. Shall the cloud computing’s suppliers use the security standard or only use their actual experience? (SAML, WSTrust, ISO, etc)

Standards play important roles in the cloud computing system as the connection between service and security. So the question about the standard of security is always the first things that the users care. Of course, if the suppliers work base on the standards, the users will more trust in the cloud computing systems.



2. Who will be responsible for ensure the safety for the data?

In fact, the responsibility belongs to suppliers. However, nowadays, this role belongs to the system, not suppliers. This is the big worries of users who store all their data and information on the cloud system. 


3. How to make sure that our data has been stored on the system and our staff, clients can access & download the necessary data and application?

The issue on information management and access has been still the challenge in security. The technologies such as federation, the safe Virtual server computing, and backup systems play important role in the cloud computing security. You can login your account via internet to make sure that all your information has been all uploaded. And you can check by another account to see whether you cooperator can download your files or not.

Above are three common questions about the security of cloud computing systems. By answering those questions, the cloud computing suppliers can have effective solution to make this system more perfect so that it can be used widely in the near future.

Post a Comment

0 Comments