Does The Flat Model Offer Enough Security In Cloud Computing?

Does The Flat Model Offer Enough Security In Cloud Computing?

The kind of network model that one employs to compile, distribute and exchange data determines the security of its passage through the Internet. This brings the question of whether the flat model can serve as the best security option for cloud computing. This model, first of all, helps to create a more direct relationship between the data provider and the recipient compared to tiered structures. Tiered structures are networks that have not only the access and the core but other integrated endpoints within the distribution path. The flat system only has the access and end points. It virtually eliminates the necessity of intermediaries, which leads to fast and more reliable information retrieval.

The basic question is: is it still the way to go when thinking about cloud security?

Security in flat cloud

The tiered networks, for one, have always relied on data providers to install safety measures. They cut access to data that is considered a threat through firewalls and such. The flat model has only the gadgets/equipment in use to blame for anything that happens during the information migration.

According to analysts, the above is a better security measure because it does not arbitrarily block content like tiered end points often do. A firewall may restrict data even when it reveals the faintest signs of a bug in it but the flat network relies on the comparatively advanced detection system in place. Furthermore, since the advent of the access-core model, many capable entrepreneurs have displaced old-time providers who manipulated the end points with outdated machines. Servers, nowadays, from independent layers are more advanced and thus higher in protection.

The other pro about the flat model is that it consists of software that can overcome restrictions, automatically, to gain access to another point. This eliminates the need of multiple middlemen, each with a private firewall, like the hierarchal systems have. The security blessing here is that when middlemen reduce, security issues go down.

Secure architecture

For the cloud to operate efficiently, it must have a dynamic architecture. These are nodes that intertwine, each feeding the other with information across various data networks. One of the chief advantages of the architecture of the flat model is that it is linear. There are no more clash points that are apparent in multi-tier networks, nor are there slow human middlemen to direct data traffic.

The security implication of this architecture is that it eliminates the delays that can help hackers to study a layer and make a move, in transit, before one retrieves data. This might appear a very theoretical assumption but the fact that machines have split-second detection capabilities to give or not give access to networks nullifies any doubts. There is no need to transfer from one node to another to find a safe entry point to a database, through trial and error. In the flat model, one is switched automatically to the safest node to a database available. If none is secure, the device itself, on either the core or access point, automatically denies entry.

So, is it secure after all?

It is hardly possible that the flat model is an entirely secure platform for cloud computing especially considering that it relies on the advanced technology of servers and devices to respond to security concerns. If outdated machinery is in use, then there is nothing networks can do than employ the good old firewalls. They have to deal with single websites depending on whether they want one to access them or not.

The IP addresses available for running access-to-core flat cloud networks are also limiting. Recent years have seen so many independent networks grab the opportunity to use this free model that congestion is setting in. This might be a future concern of safe data distribution.

In summary, one can say that cloud computing is in the hands of different networks. The flat model appears to be the nearest thing to achieving fast data exchanges, besides offering comparatively better security than the other options. However, the security is not sufficient and network providers will need to gang up to improve on it.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…