Is My Public Cloud Too Public? Part 2

Is My Public Cloud Too Public? Part 2

Scalability and Multi-tenancy in Public Clouds

Continued From Part 1…

Public cloud computing describes a computing architecture that extends the service-oriented approach (exemplified in such concepts as “utility computing,” “service-oriented architectures” and “software as a service”) into a marketplace model. Providers offer services that “run in the cloud”, as they are accessible using Internet Protocol and are location independent. This means that users have no need to know where the underlying IT resources exist.

Cloud services have two hallmarks: They are scalable (the required resources of storage and computing power can be increased or decreased according to customers’ needs), and they are multi-tenant (they provide simultaneous, secure hosting of services for various customers utilizing the same cloud infrastructure resources).

Perceived risks in the Public Cloud

Source: PWC IT Outsourcing and Cloud Computing Survey

The good news is…

While the biggest obstacle facing public cloud computing is security, the cloud computing paradigm provides opportunities for innovation in providing security services that hold the prospect of improving the overall security of some organizations. The biggest beneficiaries are likely to be smaller organizations that have limited numbers of information technology administrators and security personnel, and lack the economies of scale available to larger organizations with sizeable datacenters.

Potential areas of improvement from which organizations may derive security benefits when transitioning to a public cloud computing environment include the following:

Staff Specialization

Cloud providers, just as organizations with large-scale computing facilities, have an opportunity for staff to specialize in security, privacy, and other areas of high interest and concern to the organization. Increases in the scale of computing induce specialization, which in turn allows security staff to shed other duties and concentrate exclusively on security issues. Through increased specialization, there is an opportunity for staff members to gain in-depth experience, take remedial action, and make security improvements more readily than would otherwise be possible with a diverse set of duties.

Platform Strength

The structure of cloud computing platforms is typically more uniform than that of most traditional computing centers. Greater uniformity and homogeneity facilitate platform hardening and enable better automation of security management activities such as configuration control, vulnerability testing, security audits, and security patching of platform components. Information assurance and security response activities also benefit from a uniform, homogeneous cloud infrastructure, as do system management activities, such as fault management, load balancing, and system maintenance. Additionally, many cloud providers meet standards for operational compliance and certification, which augments their credibility.

Resource Availability

The scalability of cloud computing facilities allows for greater availability. Redundancy and disaster recovery capabilities are built into cloud computing environments, and on-demand resource capacity can be exploited for better resilience when facing increased service demands or distributed denial of service attacks, and for quicker recovery from serious incidents. When an incident occurs, an opportunity also exists to capture information more readily, with greater detail and less impact on production. In some cases, however, such resiliency can have a downside. For example, even defending against an unsuccessful distributed denial of service attack can quickly consume large amounts of resources and cause charges to soar, inflicting serious financial damage to an organization.

Part 3:  Backup and Recovery…

By Gopan Joshi

Gopan is Product Manager: Cloud Computing Services, Netmagic Solutions Pvt. Ltd. and has expertise in managing products and services in various market scenarios and life cycle stages. His experiences ranges from introducing cutting edge innovations in existing products, existing markets to new technology, new markets

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting Did you know that 113 phones are lost or stolen every minute? What about the fact that 1 in 10 computers are infected with a virus every month? Thanks to World Backup Day, an independent initiative that was started in 2011, awareness is being raised about…

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Mr. Robot And Burning Online Privacy Risks Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind. As one…

Small Technology Providers (STPs) — VARs, ISVs, Integrators, And SME Consultants

Small Technology Providers (STPs) — VARs, ISVs, Integrators, And SME Consultants

Small Technology Providers (STPs) Continuation from last weeks article. See the article here  Here’s the opportunity for little / middle guy.  It’s funny, I’m a big networker and I can’t tell you how many conversations I’ve had with IT folk across all these specialty functions and everyone says the same thing:   They all felt like…

Global Cloud Development An Open Question

Global Cloud Development An Open Question

Global Cloud Development Statistics and projections from Cisco’s Global Cloud Index show that the world’s data centers are already processing 4.7 zettabytes (4.7 million petabytes) per year. Cisco research says this amount will continue to grow by 23% annually for the next few years. (Inforgraphic Source: https://visual.ly/how-much-petabyte) If we project these numbers over the next 25…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor