Data cloud storage seems to be a familiar term with many people nowadays. To satisfy the increasing, varied demands, providers has offered a wide range of cloud storage services: private, community, public or hybrid.
Public cloud has proved to be an effective solution for anyone with tight budget. However, the shared access feature to cut down on cost, meanwhile, may raise significant cloud security issues that shold be taken in serious consideration.
Data leakage seems to be the common cloud security issues in general. However, public cloud, where protection level is lower than other types, is likely to be hacked. The huge amount of data uploaded makes cloud environment much more desirable for hijackers. Despite public cloud providers’ efforts to enhance their security system along with large data access, customers should partly take responsibility. It is necessary to use encryption and multi verification to keep all sensitive information strongly protected.
Weak cloud security strategy
It is cloud storage provider’s obligation to build a strong security system. The lack of encryption usage as one of the most fundamental solution to protect confidential data may lead to disastrous consequences. Besides, some public cloud providers try to convince customers of their sophisticated security system with both encryption and multi authentication. However, identity management problems and weak verification password may make public cloud security issues even more serious.
Many people using public cloud services concern their ownership of data access. Since the key feature of public solution is a large number of clients share the same cloud resources, unlimited access to data sources is obvious. The shared access adds potential risks to customers: hacking may be much easier and insider threats may greatly rise. Moreover, some providers can gain ownership of their clients’ data stored in cloud, which may cause futher threats.
DoS attack is not a new public cloud security issue but hardly any provider can resolve it. Normally, it affects availability through slowing down document processing or denying data access. This can cause customers significant trouble when they are in need of data or in rush hour for a transaction or project.