By guest author Shaloo Shalini
In 2010, in professional and popular circles of opinion, “cloud security” has gone from being tagged as an oxymoron to no longer being one. Well, “cloud security” could be an oxymoron just for the effect of it. It is as much of an oxymoron as “honest broker” or “working from home,” unlike the true oxymoron “definite possibility.”
Several surveys and analysts across the industry have written about cloud security as the topmost concern of CIOs today. There are others who play down security concerns and believe that the cloud actually raises the industry’s bar on the security front. There have been debates among experts and communities on the topic. But these often fail to answer the question, Is cloud computing inherently less secure than traditional computing? Is it in any way inferior to traditional IT systems when it comes to the security? Or is the perception of security in the cloud context the real issue? Security encompasses not just the physical security of computing resources and data but also access, authorization, tracking, audit, data availability, and data leakage.
Were mainframes considered more secure than desktops when the latter arrived? Was the security of distributed computing or peer-to-peer models inferior to that of client-server models? Time and again, we have been witness to similar concerns as technology evolves, unfolding newer layers and greater specialization and sophistication. With each turn of evolution comes the need to secure the newer frontiers and interfaces that emerge in newer computing models. System security has to evolve hand in hand with the systems themselves. Cloud computing (and cloud security along with it) is still in its early stages of evolution and deployment. It is but natural to have concerns about cloud security at this stage. At the same time, through experimentation and efforts in this direction, we need to see whether security itself is evolving to address many of the popular concerns.
In the end, it all boils down to the comfort level with the amount of control in terms of people being in charge of their data and systems at all times, directly or via delegation to a third-party provider for reasons such as scale, efficiency, and flexibility addressed through clouds in the form of XaaS offerings – IaaS, PaaS or SaaS, and a multitude of others such as data, integration, and storage as a service. Once providers begin to mature and create bulletproof and watertight security for their cloud-based offerings, taking care of the multi-layering and multi-tenancy aspects and start honoring SLAs to that effect – all concerns about cloud security will be the typical engineering problems to be solved, similar to desktop security – or physical, virtual, or mobile device security, for that matter. It goes without saying that organizations need security at all levels depending upon their specific security needs – those that are catered to by providers as well as the required level of security in applications and interfaces to such secure provider offerings.
Winston Damarillo, a serial entrepreneur and founder and CEO of Morphlabs, has a pragmatic view on cloud security and an interesting one when it comes to entrepreneurship and blue-sky opportunities in the cloud. He spearheads several initiatives in the Philippines that help entrepreneurs and is active in the World Economic Forum, where his focus is on the role of IT to help change lives in developing countries.
Winston believes that if entrepreneurs and cloud adopters start working to meet IT needs in places where they can be more inventive and innovative and take more risks, especially in areas that are not overproctected by over-engineered regulations, then they can understand cloud security concerns better because they are implementing solutions in reality. He says, “Once you know the issues very well in your cloud adoption context, you are automatically in a better position to secure it much more effectively than anybody else. But look for problems where the need is there and now. Before we talk about all the things that could go wrong, there are other things that are not serviced by IT at all today – those areas are ripe for cloud-based innovation.”
Winston sees a lot of cloud adoption in developing countries. Adoption is typically based on private clouds and private-public hybrid cloud models that make generous use of open source technology and components along with cloud computing paradigms to address e-health, e-governance, e-social, university, and community initiatives.