LOST CONTROL: in the cloud using the infrastructure of the
other, necessarily give customers control of the supplier on a number of
issues that can affect security. At the same time, the agreement (or contract) that
can not make a commitment to provide this service in a part of the service provider
cloud, thus leaving a gap in the defense and security.
DEPENDENT : currently there are very few tools, procedures or standard data format
to ensure service portability. This can make it difficult for customers to move
to move to a different provider or transferring data to other applications on the
client. This leads to dependency on a service provider cloud,
especially the flexibility of the data, the most fundamental aspect, not be activated ...
NO WAY INTO CUP: centralized service characteristics the main cloud computing.
this could lead to risks that can not be separated storage of customers
differently, could have security attacks as mixed data of other customers
together. However, it should see that the attack on the resource isolation mechanism
is still a lot less and a lot more difficult for an attacker when compared to
attacks on traditional operating systems .
CALCULATION oF COMPLIANCE: services must meet the requirements of a license, certification
that (for example, industry standards or legal requirements) can be risky to move
applications to the residents cloud:
if the service provider cloud can not provide proof
of their compliance with the relevant requirements
if the service provider cloud does not provide mechanisms control
services to customers.
iNTERFACE bE dISCLOSED: the interface makes a disclosure risk ever-increasing attacks
increase, especially when combined with remote access and web browser vulnerabilities.
dATA pROTECTION: cloud pose a risk to the protection of customer data for
customers and suppliers. In some cases, it may be difficult to reach
customers (in its role as a data controller) to check for data processing efficiency of the
supply and hence to ensure that data is processed legally reasonable. This problem is
exacerbated in the case of data transfer, for example, between the cloud
related.
DELETE DATA OUT YET: when a request to delete a resource computing
clouds are made , as with most operating systems, this may not necessarily
lead to wiping out the data. Delete all, or delete data at the right time can also
12
failed, or because there are backup copies of data, or for elimination also
store data from other clients. When centralized data with reuse mechanism of
hardware resources, the risk of not disposing of data is very high.
RISK OF INTERNAL: This case is very rare, but its effects are large.
For example, the system administrator's cloud computing vendors. Their one mistake
can cause huge consequences. However this is very unlikely to happen because the service provider
cloud security with very high principles, a person is not enough authority to make
corrupt system.
đang được dịch, vui lòng đợi..
