UPSC » Internal Security Notes » Cloud Computing and In House Machine Based Hosting

Cloud Computing and In House Machine Based Hosting

Introduction

Cloud computing is the distribution of computing services via the internet (the cloud), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, flexible resources, and economies of scale. 

  • In cloud computing, a cloud server (rather than a physical server) is used to run applications. 
  • A cloud server is built, hosted and delivered via a cloud computing platform via the internet and can be accessed remotely. They are also known as virtual servers.

Security Aspects 

  • Many cloud providers provide a variety of policies, technologies, and controls to help you strengthen your entire security posture and safeguard your apps, data, and infrastructure from threats. 
  • Because data can be mirrored at several redundant sites on the cloud provider’s network, it simplifies and lowers the cost of data backup, disaster recovery, and business continuity.

Moving to a cloud-based system, on the other hand, necessitates meticulous preparation and study. It also has significant security consequences, which your organisation must fully comprehend and manage.

  • Identity management: Manage personal identity information so accessibility to computer resources, applications, data, and services are correctly controlled. 
  • Detection and forensics: Businesses must distinguish between legitimate and illegitimate activities since there is a greater chance of unauthorised access in the cloud. 
  • Manageability: You always need a unified view of your on-premises and cloud-based infrastructures. After all, your company is a single entity, so your systems must be integrated as well. 
  • Standards: It is a method of doing something that has been agreed upon. Cloud standards ensure interoperability, allowing you to utilise the same tools, apps, virtual images, and other resources in different cloud environments without having to redesign anything. 
  • Encryption: Code to safeguard your information assets since cloud-based systems are shared by a variety of users. 
  • Governance and compliance: Roles and responsibilities, as well as regulations and procedures that your employees or groups must follow, are all defined by governance. Cloud governance should cover both your own infrastructure and infrastructure that you don’t have complete control over.
  • Storing data in the cloud: Data security and privacy, as well as rules for transporting data from point A to point B, are required for managing data stored in the cloud. It also entails overseeing data storage and processing resources.

Pros of In-House Machine-Based Hosting 

  • Gives you physical control over your backup. 
  • No need to rely on an Internet connection for access to data. 
  • Keep critical data in-house; no third party has access to your information. 
  • Can be more cost-effective for small to mid-sized companies. 

Thus, even though cloud computing has advantages to scale up various IT-related tasks but at the same time, it has disadvantages as well. If proper security apparatus is created with fixing issues of cloud computing, then there will be multiple benefits of it. It is high time that the government should work on framing national policies on cloud computing which will become a cornerstone in the field of the overall cloud computing area.