Unit 4 Part III

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

An Introduction to the Idea of Data Security

• The need for data security has a very wide scope, varying from information
that is set as public domain, through to information that needs some
protection (perhaps access control), through to data that are highly
sensitive, which, if leaked, could cause catastrophic damage, but
nevertheless need to be accessed and used by selected users.
• If we can start off our view of data security as more of a risk mitigation
excercise and then build systems that will work with humans (i.e., human-
centric), then perhaps the software we design for securing data in the cloud
will be successful.
The Current State of Data Secuirty in the Cloud
 Data Security has not developed out of cloud computing, but instead is a
development out of the idea of the “de-perimerization” of the enterprise. This
idea is put forward by a group of Chief Information Officers(CIO's) who
formed an organization called the Jericho Forum.
 Jericho Forum was founded in 2004 because of the increasing need for data
exchange between comapnies and external parties--for example:
employees using remote computers; partner companies; customers; and so
on.
Homo Sapiens and Digital Information
• Cloud computing offers individuals and organizations a much more
fluid and open way of communicating information.This is a very
positive move forward in communication technology, because it
provides a more accurate mimic of the natural way that information
is communicated between individuals and groups of human beings.
• Snippet of Information: If the information is sensitive, it may be
whispered, or, if written on paper, passed only to those allowed to
read it. So the result is that human-to-human information
communication will result in a very fluid discourse.
• Cloud computing is a platform for creating the digital equivalent of
this fluid, human-to-human information flow, which is something
that internal computing networks have never quite achieved.
• In this respect, cloud computing should be seen as a revolutionary
move forward in the use of technology to enhance human
communications.
Cloud Computing and Data Security Risk
• The most obvious risk in this scenario is that associated with the
storage of data.
• A user uploading (or) creating cloud-based data include those data
that are stored and maintained by a third party cloud provider such
as Google, Amazon, Microsoft, and so on.
• This section has several risks associated with it:
 Firstly, it is necessary to protect the data during uploading into the
database.
 Secondly, it is necessary to store the data in the data center to
ensure that they are encrypted at all times.
 Thirdly, the access to data need to be controlled; this control should
also be applied to the hosting company, including the administrators
of the data center.
Cloud Computing and Identity
1. Identity, Reputation, and Trust
2. Identity for Identity's Sake
3. Cloud Indentity: User-Centric and Open-Identity Systems
4. The Philosophy of User-Centric Identity
5. User-Centric but Manageable
6. What Is an Information Card?
7. Using Information Cards to Protest Data
8. Weakness and Strengths of Information Cards
9. Cross-Border Aspects of Information Cards
Content Level Security
!!!!! END !!!!!!

You might also like