It can be met by applying existing security techniques and following sound security practices.
Cloud data security techniques.
Generally encryption works as follows.
Protecting data in the cloud can be similar to safeguarding data within a traditional data center.
However the encryption algorithm has solved the problem of security.
Security in the cloud is not the same as security in the corporate data center.
Protects from unwelcomed government.
Authentication and identity access control encryption secure deletion integrity checking and data masking are all data protection methods that have applicability in cloud computing.
Encrypting sensitive data before it goes to the cloud with the enterprise not the cloud provider maintaining the keys.
You have a file you want to move to a cloud you use certain software with which you create a password for that file you move that password protected file to.
However data protection related techniques need to be further enhanced.
If prospective customers of cloud computing services expect that data security will serve as compensating controls for possibly weakened infrastructure security since part of a customer s infrastructure security moves beyond its control and a provider s infrastructure security may for many enterprises or may not for small to medium size.
Defense in depth is particularly important when securing cloud environments because it ensures that even if one control fails other security features can keep the application network and data safe.
Different rules and thinking apply when securing an infrastructure over which one has no real physical control.
Cloud data protection cdp.
The prospective cloud adopters definitely would have security concerns with the storing and processing of data in a public hybrid or in a community cloud.
Simple data encryption is not the only solution to rely upon in cloud data security.
Services of cloud computing are provided across the entire computing spectrum.