Does The Flat Model Offer Enough Security In Cloud Computing?

Does The Flat Model Offer Enough Security In Cloud Computing?

The kind of network model that one employs to compile, distribute and exchange data determines the security of its passage through the Internet. This brings the question of whether the flat model can serve as the best security option for cloud computing. This model, first of all, helps to create a more direct relationship between the data provider and the recipient compared to tiered structures. Tiered structures are networks that have not only the access and the core but other integrated endpoints within the distribution path. The flat system only has the access and end points. It virtually eliminates the necessity of intermediaries, which leads to fast and more reliable information retrieval.

The basic question is: is it still the way to go when thinking about cloud security?

Security in flat cloud

The tiered networks, for one, have always relied on data providers to install safety measures. They cut access to data that is considered a threat through firewalls and such. The flat model has only the gadgets/equipment in use to blame for anything that happens during the information migration.

According to analysts, the above is a better security measure because it does not arbitrarily block content like tiered end points often do. A firewall may restrict data even when it reveals the faintest signs of a bug in it but the flat network relies on the comparatively advanced detection system in place. Furthermore, since the advent of the access-core model, many capable entrepreneurs have displaced old-time providers who manipulated the end points with outdated machines. Servers, nowadays, from independent layers are more advanced and thus higher in protection.

The other pro about the flat model is that it consists of software that can overcome restrictions, automatically, to gain access to another point. This eliminates the need of multiple middlemen, each with a private firewall, like the hierarchal systems have. The security blessing here is that when middlemen reduce, security issues go down.

Secure architecture

For the cloud to operate efficiently, it must have a dynamic architecture. These are nodes that intertwine, each feeding the other with information across various data networks. One of the chief advantages of the architecture of the flat model is that it is linear. There are no more clash points that are apparent in multi-tier networks, nor are there slow human middlemen to direct data traffic.

The security implication of this architecture is that it eliminates the delays that can help hackers to study a layer and make a move, in transit, before one retrieves data. This might appear a very theoretical assumption but the fact that machines have split-second detection capabilities to give or not give access to networks nullifies any doubts. There is no need to transfer from one node to another to find a safe entry point to a database, through trial and error. In the flat model, one is switched automatically to the safest node to a database available. If none is secure, the device itself, on either the core or access point, automatically denies entry.

So, is it secure after all?

It is hardly possible that the flat model is an entirely secure platform for cloud computing especially considering that it relies on the advanced technology of servers and devices to respond to security concerns. If outdated machinery is in use, then there is nothing networks can do than employ the good old firewalls. They have to deal with single websites depending on whether they want one to access them or not.

The IP addresses available for running access-to-core flat cloud networks are also limiting. Recent years have seen so many independent networks grab the opportunity to use this free model that congestion is setting in. This might be a future concern of safe data distribution.

In summary, one can say that cloud computing is in the hands of different networks. The flat model appears to be the nearest thing to achieving fast data exchanges, besides offering comparatively better security than the other options. However, the security is not sufficient and network providers will need to gang up to improve on it.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Cloud Computing vs. “Cord” Computing

Cloud Computing vs. “Cord” Computing

Easily Managing Access And Authentication To Both Though end users might not notice a difference between systems and applications hosted on-site or in the cloud at their organization, administrators who manage them often have to do so quite differently. Each solution has different requirements pertaining to security, and access and authentication management. System admins want…

Connecting To Information With Cyber Physical Systems

Connecting To Information With Cyber Physical Systems

CPS Device Trends On The Rise It isn’t, “Do you remember who starred in XYZ Movie?” It’s, “Can you look it up please?” “Did you ever think you would sit at the dinner table, and when a question came up, someone would look up the answer and share it with everyone?” The words echoed at…

Did You Know That There Is A Real SHIELD?

Did You Know That There Is A Real SHIELD?

The Real Shield You cannot make this up. The ODNI (Office of the Director of National Intelligence), an Act of Congress and a European Commission special “working group” known as Article 29 are all involved. Blame it on Edward Snowden. The Europeans are “concerned” (meaning: terrified) about the privacy protections surrounding any of their data…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor