Clouds from Both Sides
نویسنده
چکیده
“Cloud computing” is the buzzword du jour. Everyone is either doing it or wants to; some technophiles even liken it to the Industrial Revolution. (Admittedly, those of us of a certain technical age have to squint to differentiate it from the time-sharing service bureaus of the 1960s.) But is the cloud “secure”? The question as I’ve just phrased it is unanswerable because neither “secure” nor (especially) “cloud” have rigorous definitions. We also have to ask the first question in any security dialog: “What are you trying to protect against whom?” And one more question that’s asked all too infrequently: “Secure compared to which alternatives?” This last question is often the most interesting. Intuitively, the cloud can provide computing cycles (for example, Amazon’s EC2) and/or remote storage; the latter can be just for the owner, or it can permit sharing. For “security,” we can use the usual trio of confidentiality, integrity, and availability. Our questions, then, change: For remote storage and computing, does the cloud provide more or less confidentiality, integrity, and availability across a wide spectrum of attackers? Availability is probably the easiest to answer. I assert that despite occasional well-publicized failures, a professionally run cloud service is more available than a typical in-house solution. The cloud service can run more redundant resources to resolve outages, whether malicious or accidental in origin. A good cloud service will use RAID disks and back them up. Put it this way: How recent are your backups? When did you last test your ability to recover from a disk crash? Do you have more servers than Amazon? Do you have more bandwidth than Google? Yes, a failure at a large provider will affect more users; conversely, we hear about such failures more than we hear about the routine (and frequent) outages at typical corporations. The difficult issue is whether your enterprise can function if all of it is cloud-resident. Diversity is always a good thing, but should you seek it in your own environment or via different cloud providers? Integrity and confidentiality are somewhat harder to assess. Most (though, of course, not all) penetrations result from exploitation of holes for which patches are already available. Is your own in-house staff conscientious about installing all available fixes? Are your systems properly configured, especially for sharing data? Would a service provider do better? These questions aren’t easy to answer. If the reason for a delay in patching is lack of resources, the cloud provider is likely to be better. On the other hand, many enterprises delay until they can assess the compatibility of their own, in-house applications with the new system—and cloud providers have many applications to worry about. Sharing resources with outsiders is almost certainly better done via the cloud because the cloud provider’s access control mechanisms are tuned for that sort of scenario, and they’ve dealt with the underlying platforms’ complexity. In-house computing probably has the edge when considering possible attackers. Apart from a provider’s own employees turning to the dark side, you run the risk of being collateral damage when some other customer is targeted. There are also legal issues to consider: under US law, at least, you arguably have less protection against “subpoena attacks” when your data isn’t stored in-house. I don’t claim that the answer to cloud computing is simple. But I do assert that running your own systems isn’t inherently better, even from a security perspective. You need to do a detailed assessment for your own particular situation.
منابع مشابه
Detection of some Tree Species from Terrestrial Laser Scanner Point Cloud Data Using Support-vector Machine and Nearest Neighborhood Algorithms
acquisition field reference data using conventional methods due to limited and time-consuming data from a single tree in recent years, to generate reference data for forest studies using terrestrial laser scanner data, aerial laser scanner data, radar and Optics has become commonplace, and complete, accurate 3D data from a single tree or reference trees can be recorded. The detection and identi...
متن کامل3D Detection of Power-Transmission Lines in Point Clouds Using Random Forest Method
Inspection of power transmission lines using classic experts based methods suffers from disadvantages such as highel level of time and money consumption. Advent of UAVs and their application in aerial data gathering help to decrease the time and cost promenantly. The purpose of this research is to present an efficient automated method for inspection of power transmission lines based on point c...
متن کامل3D Classification of Urban Features Based on Integration of Structural and Spectral Information from UAV Imagery
Three-dimensional classification of urban features is one of the important tools for urban management and the basis of many analyzes in photogrammetry and remote sensing. Therefore, it is applied in many applications such as planning, urban management and disaster management. In this study, dense point clouds extracted from dense image matching is applied for classification in urban areas. Appl...
متن کاملWhat does reflection from cloud sides tell us about vertical distribution of cloud droplet sizes?
Cloud development, the onset of precipitation and the effect of aerosol on clouds depend on the structure of the cloud profiles of droplet size and phase. Aircraft measurements of cloud profiles are limited in their temporal and spatial extent. Satellites were used to observe cloud tops not cloud profiles with vertical profiles of precipitation-sized droplets anticipated from CloudSat. The rece...
متن کاملTechnical note Evidence of the coexistence of upstream and downstream solitary wavetrains in the real atmosphere
From a true colour image of the Sea-viewing Wide Field-of-view Sensor (SeaWiFS) onboard the Orbview-2 satellite, we observed two packets of orderly wave clouds on two sides of Hainan Island in the South China Sea. A packet of 23 wave clouds stretches southward from the island. A second packet of more than 20 wave clouds stretches north-eastward off the north-east coast of the island. The concav...
متن کاملObscuration of Active Galactic Nuclei by Circumnuclear Starbursts
We examine the possibility of the active galactic nucleus (AGN) obscuration by dusty gas clouds that spurt out from circumnuclear starburst regions. For the purpose, the dynamical evolution of gas clouds is pursued, including the effects of radiation forces by an AGN as well as a starburst. Here, we solve the radiative transfer equations for clouds, taking into consideration the growth of cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Security & Privacy
دوره 9 شماره
صفحات -
تاریخ انتشار 2011