Cloud service is the future of computing environment
The reason why the cloud service became popular is that people want to cut costs, solve the complexity of managing computer systems directly, respond to the market quickly, and expand the system efficiently.
The number of companies that are considering or promoting deployment of the cloud service is increasing explosively.
About 40% of companies will use the cloud service without owning their IT infrastructure. If including the closed private cloud service, the number of companies will reach 70%. At this point in time, the supply of the cloud service does not meet the demand of users. That’s because the IaaS, which should be implemented first for implementation of a complete cloud environment, has not been implemented yet.
The effort to overcome the current limitation is actively being made. In accordance with the rise of open stack, which can cope with the monopoly of Amazon’s EC2 service, the environment where users directly operate the servers via the web anytime and anywhere is taking shape more clearly. In addition, it builds a shared system of resources and information through secured and flexible IT infrastructure, as well as cutting costs.
But cloud service is not completely brand new.
Technically, it is the result of combining the server virtualization technology with the distributed processing technology based on business needs. In short, it can be called an elastic on-demand virtual machine. Some misunderstand the meaning of ‘cloud’ as information that is saved in the air. However, the information processed in the cloud service is stored and operated on a physical server. The information is elastically processed by the virtualization technology and the distributed processing technology.
Therefore, cloud service has the same security vulnerabilities with those of the existing web environment. Security threats and patterns for the IT infrastructure and applications are same for the cloud service. The difference between the existing security solution and the cloud security solution follows the cloud characteristics.
The security solution installed in the IT system infrastructure solely owned by a company has an exclusive structure. However, the security solution installed in the cloud system infrastructure should include the cloud characteristics. In short, in accordance with the elastic on-demand virtual machine environment, virtualization and distributed processing should be available. However, the security solution installed in the cloud system infrastructure should include the cloud characteristics. Because of the characteristics of the cloud service, all information is saved and processed in a virtualized space. Therefore, the cloud security solution should respond to such virtualization and distributed processing.
To meet the complex cloud service technology, deep cooperation with a service provider is necessary. Because of the characteristics of the cloud service, the required technology level is significantly high when the cloud size is large. Therefore, capability of huge cooperation is one of the factors that should be considered as important in choosing the cloud security solution.