Does The Flat Model Offer Enough Security In Cloud Computing?

Does The Flat Model Offer Enough Security In Cloud Computing?

The kind of network model that one employs to compile, distribute and exchange data determines the security of its passage through the Internet. This brings the question of whether the flat model can serve as the best security option for cloud computing. This model, first of all, helps to create a more direct relationship between the data provider and the recipient compared to tiered structures. Tiered structures are networks that have not only the access and the core but other integrated endpoints within the distribution path. The flat system only has the access and end points. It virtually eliminates the necessity of intermediaries, which leads to fast and more reliable information retrieval.

The basic question is: is it still the way to go when thinking about cloud security?

Security in flat cloud

The tiered networks, for one, have always relied on data providers to install safety measures. They cut access to data that is considered a threat through firewalls and such. The flat model has only the gadgets/equipment in use to blame for anything that happens during the information migration.

According to analysts, the above is a better security measure because it does not arbitrarily block content like tiered end points often do. A firewall may restrict data even when it reveals the faintest signs of a bug in it but the flat network relies on the comparatively advanced detection system in place. Furthermore, since the advent of the access-core model, many capable entrepreneurs have displaced old-time providers who manipulated the end points with outdated machines. Servers, nowadays, from independent layers are more advanced and thus higher in protection.

The other pro about the flat model is that it consists of software that can overcome restrictions, automatically, to gain access to another point. This eliminates the need of multiple middlemen, each with a private firewall, like the hierarchal systems have. The security blessing here is that when middlemen reduce, security issues go down.

Secure architecture

For the cloud to operate efficiently, it must have a dynamic architecture. These are nodes that intertwine, each feeding the other with information across various data networks. One of the chief advantages of the architecture of the flat model is that it is linear. There are no more clash points that are apparent in multi-tier networks, nor are there slow human middlemen to direct data traffic.

The security implication of this architecture is that it eliminates the delays that can help hackers to study a layer and make a move, in transit, before one retrieves data. This might appear a very theoretical assumption but the fact that machines have split-second detection capabilities to give or not give access to networks nullifies any doubts. There is no need to transfer from one node to another to find a safe entry point to a database, through trial and error. In the flat model, one is switched automatically to the safest node to a database available. If none is secure, the device itself, on either the core or access point, automatically denies entry.

So, is it secure after all?

It is hardly possible that the flat model is an entirely secure platform for cloud computing especially considering that it relies on the advanced technology of servers and devices to respond to security concerns. If outdated machinery is in use, then there is nothing networks can do than employ the good old firewalls. They have to deal with single websites depending on whether they want one to access them or not.

The IP addresses available for running access-to-core flat cloud networks are also limiting. Recent years have seen so many independent networks grab the opportunity to use this free model that congestion is setting in. This might be a future concern of safe data distribution.

In summary, one can say that cloud computing is in the hands of different networks. The flat model appears to be the nearest thing to achieving fast data exchanges, besides offering comparatively better security than the other options. However, the security is not sufficient and network providers will need to gang up to improve on it.

By John Omwamba

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal IBM and SAP have shaken the cloud computing world this afternoon with the announcement of one of the largest cloud deals in the industry’s history – bringing together two of the largest technology companies in a bid to offer a more holistic service to their clients. SAP…

The Education Revolution: Cloud In The Classroom

The Education Revolution: Cloud In The Classroom

The Education Revolution: Cloud In The Classroom With the back-to-school season now upon us, parents, students and teachers everywhere are once again struggling with the perpetual challenge of making kids job-ready in a high-speed and fast-changing environment. There is little doubt in anyone’s mind that information technology plays a central role in all areas of life…

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to…

Featured Sponsors

The Internet of Everything Opens Up The World

The Internet of Everything Opens Up The World

Shaping The World With New Technologies As a connected collection of intelligent objects, the Internet of Everything promises to open up those areas of the world hardest hit by economic, political and agricultural blights. Relatively inexpensive devices, paired with revolutionary energy sources and unprecedented access to information offer great promise to farmers and workers in…

Sponsors

Going Global With The Cloud: Anywhere, Anytime Access

Going Global With The Cloud: Anywhere, Anytime Access

Let’s cut right to the chase… Lots of companies have offered 24/7 availability of systems and data to their customers and employees for years. What else is new? What’s new is that a cloud computing environment can make 24/7 availability possible for small and medium size enterprises (SMEs). (Infographic Source:Towergate) Previously, only organizations with robust IT…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter