You are heresecurity

security


Public Cloud - Sharing and Data Protection



In the previous post, we saw the challenges associated with public cloud computing infrastructure. How are some of  those challenges addressed? Let us first take the most serious issue of protecting the business data from the eyes of competition while trying to share the computing applications.



In real life, some of us live in apartment complexes. The management of such apartment complexes construct almost similar looking stacked living spaces (apartment) in the same premise.

Video: 
See video

Where Is My Data? Is It Safe? Can I Move It?

Now we understand the different types of cloud applications. We also understand that Cloud Computing is a bidirectional process and we need to transmit and receive data to be able to leverage a cloud based computer. Some of this data could be stored on the cloud as well.

Let us concentrate on data now. In the earlier post, we saw that data for the individual could be private, secret, and sensitive. For enterprises it could be highly confidential. What are some issues around sending, receiving and storing data in cloud computing?

Types of Computing Applications

In an earlier post, we got introduced to Cloud Computing with an example of a gaming application. In real life, we have many other applications for computing. The simplest of them is when we communicate with other people around us using e-mail. In this application, we type, send, receive, forward and store text messages (to keep things simple).

Video: 
Courtesy: CNN - How data works in the cloud..