• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Cloud Computing : A Short Handy Guide

By Abhishek Ghosh March 23, 2014 8:22 pm Updated on March 23, 2014

Secure Cloud Computing : A Short Handy Guide

Advertisement

Secure Cloud Computing is a Big Chapter. An Average User Need Not to Know All the Terminologies. Here is a Simplified Guide in Plain English. Today, larger documents lie outside of our own computer; we save, restore files or entire folders which might be available to other peoples : a few years ago what was once considered to be a small masterpiece to the technology-loving IT professionals, is now is no more than a basic knowledge for any kind of workers. For this knowledge, one need not no engineering degree.

Dropbox, Google Drive, Microsoft Skydrive, CloudMe – are only few of all of the providers of Public Cloud Storage; which is beyond the scope of Article. Except for a few differences in the expression of all online storage solutions operate on an identical principle : The user logs in to a system of provider with a username and a secret, may be only the password. With these user data the user can log on to the online service and drop files or folders on the memory system of the provider, edit or delete. By default, no access is possible at first through third parties, and the user accesses via web browser itself to the service. 

These part actually belong to Permissions and Identity Management on Cloud Computing Platform. Protection of Sensitive Data in the Cloud is itself another chapter. All of these belongs to, what is said with a difficult terminology – Core Components of Cloud Computing. Practically these are extensions of computer security, network security, information security. We will not discuss elaborately, if the reader wishes; can read the multi-part article named Checklist for Secure Cloud Computing. Again; Secure Cloud Computing is a Big Chapter. Our intention is to mention only the major points within this article, as it targeted for the average user.

Advertisement

---

 

Secure Cloud Computing : Basics One Should Know About

 

Usually, the providers now employ the freemium business model.  This means that the basic service is offered as free of charge and beyond  a certain limit, such as the need of more space is chargeable. The size of the offered free space available varies depending on the provider, usually is within the range of 2-5 gigabytes. So far, it is so easy to understand. But now the problems start – actually, the bargain with giveaway of Personal Data starts from this point. 

Secure Cloud Computing

Apple provides Free Space, but that is to a limited number of identifiable users. That business model of iCloud is not truly a Freemium model – they already know about many personal matters; it is acceptable as we also have some dimension to bargain with Apple – not well understood, right? If the User’s original name, Model number is not known; then claim of warranty will not be valid. The wrong hood of comparison is – Apple is a hardware manufacturer. Their primary business is not to sell software or Cloud based products. If too much security bugs their brand value, simply, they will discontinue that part. Like, Optical Drives are known to face more issue in long term, Apple simply dropped it in favor of smaller Solid State non rotating stuffs. Apple is an example of Brand; one can think of IBM in this position.

Secure Cloud Computing sounds like an unknown phrase to many.  Practically it means, the probable security architecture which we can follow for a certain Cloud Service. In simple words, the ways can be :

 

  1. Deterrent controls
  2. Preventative controls
  3. Corrective controls
  4. Detective controls

 

Secure Cloud Computing : A Short Handy Guide

 

We will tell you few words as a list, which is more than enough to ensure secure cloud computing, provided that your usage of variants of Cloud Computing Services is very limited. They are quite easy to follow and actually derived from the 4 ways mentioned above :

 

  1. Read The Fine Print : Everyone knows it is good to read, but none reads. Microsoft and Google are notorious for twisted words, changing policies.
  2. Always Take Backup Multiple Times and Have a Physical Storage on Your Hand
  3. Please Note Server Location : Everyone knows, it is quite important now.
  4. Understand What Protocol is Used to Connect or Upload
  5. Use Your Own Encryption : For example, simply applying a difficult password to a zip file and uploading any where makes it a bit more difficult to break in to.
  6. Secure Own Platform : Try to avoid insecure Operating System Platforms. Linux or original UNIX derivatives are known to be safer but abnormal compilation can turn it towards bloated – Android is a good example.
  7. Know When to Terminate Using the Service
  8. Understand the Importance of Data : If a 16GB folder with your pet’s videos, images are stolen; possibly the loss is not much; but if a zipped archive of this website is accessible; it will take few minutes to create an illegal clone. It is quite difficult to clean the illegal clones – Law, by default takes the person alleged is under attack.

 

Despite all the alerts, it is not rare to come across a friend who usually uploads almost the full of his full family album to Facebook.

This Article Has Been Shared 457 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Cloud Computing : A Short Handy Guide

  • How to Build a Private Cloud

    Building a Private Cloud infrastructure is not very easy for building a Company’s IT Infrastructure. Many brand and Open Source Projects.has various resources.

  • Installing WordPress on Heroku with Rackspace Cloud Database

    Installing WordPress on Heroku with Rackspace Cloud Database is not very tough if you want to host WordPress on Heroku Cloud and use Rackspace Cloud Database.

  • Repairing WordPress Database : Using Cloud Database Server

    Repairing WordPress Database is easy by using Cloud Database Server like from The Rackspace Cloud which provides MySQL database server with PHPmyAdmin software.

  • SSL Certificate for WordPress on Rackspace Cloud Sites

    SSL Certificate for WordPress on Rackspace Cloud Sites needs a bit tweaking to be working flawlessly without duplicate content issue or 404, 500 server errors.

  • Using https URL of Rackspace Cloud Files for WordPress

    Using https URL of Rackspace Cloud Files for WordPress needs some extra steps for more secured delivery of Static Content of your SSL enabled WordPress site.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is ChatGPT? February 3, 2023
  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Secure Cloud Computing : A Short Handy Guide," in The Customize Windows, March 23, 2014, February 5, 2023, https://thecustomizewindows.com/2014/03/secure-cloud-computing-handy-guide/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT