SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Cloud Computing




                  By
                  Pallavi Khandekar &
                  Jacob Bennett
Cloud Service Models

• Software as a Service (SaaS)
   – It is a software product that is provided to you when you logon to the
     cloud

   – These services are meant to be accessible to everyone with a
     computer and an internet provider – Unless you have dialup.

   – It is used for creating, storing, accessing, and manipulating your files
     from any internet connection.

   – Some examples are: Boise State Gmail, Google Docs, or any other
     application you access exclusively through the internet.
Cloud Service Models

• Infrastructure as a Service (IaaS)

   – It is a computer/s that exist on the cloud.

   – It is used for adding virtual machines to a network or for the
     capacity to expand and contract dynamically as you need it.

   – As a user, my computer becomes nothing but the means to
     access another more powerful computer.
      • Do NOT need corporate software installed on the company
        PC!
      • Do NOT need a specific operating system!
Cloud Service Models

• Platform as a Service (PaaS)

   – Like IaaS, PaaS is geared towards providing a platform on which a
     developer may develop, publish, and maintain their source code.

   – It can be defined as an IaaS that will connect to a PC instead of the
     other way around.

   – Think, email that is pushed to your phone and not pulled.
Cloud Service Models
Current Concerns and Challenges

•   Security
•   Dependency
•   Legal Issues
•   Decreased flexibility
Security
    Security of Cloud Computing refers to policies, technologies and controls deployed
    to protect data, application and the associated infrastructure.




                                    Security and Privacy




Security Issues faced by Cloud providers           Security Issues faced by Cloud customers

•          Data Loss / Data theft                  •        Data/ Service Access
•          System Boundaries                       •        Data confidentiality
Traditional System   Cloud Architecture
   architecture



       App                 App


     Server               Server
                       virtualization
      port




    Network             Network
Mobility
 App              App                            App



Server         Server 1                        Server 2
              virtualization                 virtualization
 port




Network        Network                         Network



                               Do they share same
                                 policy/security
                                      layer?
Are they
                                     interacting?
           Co-existence

App 1      App 2          App 1       App 2



Server 1   Server 2            Server 1
                             virtualization
 port       port




Network    Network            Network
Multiple Level Security
Datacenter facility security       Operating systems and application level
•    Physical controls             •   Directory Federation (SAML)
•    Access controls               •   Access control and monitoring
•    Video surveillance            •   Anti malware and anti-Spam
•    Background checks             •   Patch and configuration management
                                   •   Secure engineering.



Network Level                      Data Level
•       Edge routers               •        Access control lists
•       Multiple-layer firewalls   •        User level access and authorization.
•       Intrusion detection        •        Field and data integrity.
•       Vulnerability scanning
•       Encryption
Dependency (loss of control)
•   No or little insight in CSP contingency procedures. Especially backup, restore and
    disaster recovery.

•   No easy migration to an other CSP.

•   Measurement of resource usage and end user activities lies in the hands of the
    CSP

•   Tied to the financial health of another Company.

•   Quality problems with CSP(Cloud Service Providers).

•   No influence on maintenance levels and fix frequency when using cloud services
    from a CSP
Legal and Contractual issues around
                  Cloud Computing
Few important legal issues that must be taken care before signing up with the CSP:

1.   Physical Location of data:
     •   Customer should know actual physical location of their data.
     •   In case of dispute arises between vendor and customer which country’s court
         system will settle the conflict? (e.g. customer is in China and vendor is in US.)
2.   Responsibility of your data:
     •   What if data center is hit by a disaster?
     •   Is there any liability coverage for breach of data?
     •   What can be done if data center gets hacked?
3.   Intellectual Property Rights:
     •   Is your data protected under the intellectual property rights?
     •   Third party access
QUESTIONS ???

Weitere ähnliche Inhalte

Was ist angesagt?

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Anne Starr
 

Was ist angesagt? (20)

AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - Vocus
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
Intermedia Overview
Intermedia OverviewIntermedia Overview
Intermedia Overview
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Zimbra collaboration suite
Zimbra collaboration suiteZimbra collaboration suite
Zimbra collaboration suite
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?20N2012- Is there any danger or risk in Green?
20N2012- Is there any danger or risk in Green?
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 

Ähnlich wie Bright and Gray areas of Clound Computing

Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Khazret Sapenov
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
CloudPassage
 
SaaS - Taking a Closer Look
SaaS - Taking a Closer LookSaaS - Taking a Closer Look
SaaS - Taking a Closer Look
Anja Rej
 

Ähnlich wie Bright and Gray areas of Clound Computing (20)

talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
 
SaaS - Taking a Closer Look
SaaS - Taking a Closer LookSaaS - Taking a Closer Look
SaaS - Taking a Closer Look
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Bright and Gray areas of Clound Computing

  • 1. Cloud Computing By Pallavi Khandekar & Jacob Bennett
  • 2. Cloud Service Models • Software as a Service (SaaS) – It is a software product that is provided to you when you logon to the cloud – These services are meant to be accessible to everyone with a computer and an internet provider – Unless you have dialup. – It is used for creating, storing, accessing, and manipulating your files from any internet connection. – Some examples are: Boise State Gmail, Google Docs, or any other application you access exclusively through the internet.
  • 3. Cloud Service Models • Infrastructure as a Service (IaaS) – It is a computer/s that exist on the cloud. – It is used for adding virtual machines to a network or for the capacity to expand and contract dynamically as you need it. – As a user, my computer becomes nothing but the means to access another more powerful computer. • Do NOT need corporate software installed on the company PC! • Do NOT need a specific operating system!
  • 4. Cloud Service Models • Platform as a Service (PaaS) – Like IaaS, PaaS is geared towards providing a platform on which a developer may develop, publish, and maintain their source code. – It can be defined as an IaaS that will connect to a PC instead of the other way around. – Think, email that is pushed to your phone and not pulled.
  • 6. Current Concerns and Challenges • Security • Dependency • Legal Issues • Decreased flexibility
  • 7. Security Security of Cloud Computing refers to policies, technologies and controls deployed to protect data, application and the associated infrastructure. Security and Privacy Security Issues faced by Cloud providers Security Issues faced by Cloud customers • Data Loss / Data theft • Data/ Service Access • System Boundaries • Data confidentiality
  • 8. Traditional System Cloud Architecture architecture App App Server Server virtualization port Network Network
  • 9. Mobility App App App Server Server 1 Server 2 virtualization virtualization port Network Network Network Do they share same policy/security layer?
  • 10. Are they interacting? Co-existence App 1 App 2 App 1 App 2 Server 1 Server 2 Server 1 virtualization port port Network Network Network
  • 11. Multiple Level Security Datacenter facility security Operating systems and application level • Physical controls • Directory Federation (SAML) • Access controls • Access control and monitoring • Video surveillance • Anti malware and anti-Spam • Background checks • Patch and configuration management • Secure engineering. Network Level Data Level • Edge routers • Access control lists • Multiple-layer firewalls • User level access and authorization. • Intrusion detection • Field and data integrity. • Vulnerability scanning • Encryption
  • 12. Dependency (loss of control) • No or little insight in CSP contingency procedures. Especially backup, restore and disaster recovery. • No easy migration to an other CSP. • Measurement of resource usage and end user activities lies in the hands of the CSP • Tied to the financial health of another Company. • Quality problems with CSP(Cloud Service Providers). • No influence on maintenance levels and fix frequency when using cloud services from a CSP
  • 13. Legal and Contractual issues around Cloud Computing Few important legal issues that must be taken care before signing up with the CSP: 1. Physical Location of data: • Customer should know actual physical location of their data. • In case of dispute arises between vendor and customer which country’s court system will settle the conflict? (e.g. customer is in China and vendor is in US.) 2. Responsibility of your data: • What if data center is hit by a disaster? • Is there any liability coverage for breach of data? • What can be done if data center gets hacked? 3. Intellectual Property Rights: • Is your data protected under the intellectual property rights? • Third party access

Hinweis der Redaktion

  1. DataLoss / Data theftData may get lost because of facts like equipments/software failures or stolen by hackers because of shared resource nature of Cloud. The providers must make efforts to overcome such problems as they may loose trust of their clientsSystem BoundariesDue to virtual nature of cloud, there is no specific system boundary. Resources are shared across clouds and so any data transferred should be properly encrypted using proper encryption algorithms and SSL-encrypted communication based on sensitivity of dataData ConfidentialityDue to virtual nature of cloud, one cannot be sure where the data or/and application are physically located and what is the protective mechanism in that place. The existence of a “super user” in the enterprise providing cloud computing services to carry out the management and maintenance of data, is a serious threat to user privacy.Data AccessPredictable access to their data and application at all times and conditions.Failure management and recovery
  2. The traditional architecture has a server connected to a network on which application resides.So you have only a single access point for the network into the server. In contrast the cloud environment resides on a virtualization framework. So the network now goes into theVirtualization layer. Thus you have more than one access points and environment to manage. This includes managing network switching policies, firewall policies and access policies.
  3. 1. In a traditional system architecture we have an appln running on one particular server2. Now in a cloud there are multiple servers and the application migrates from one server to another for load balancing, failure recovery etc.3. This migration is not guaranteed to be in the same data center/server farm .4. There is always a question if the new location shares the same security policies on each of the layers is not exposed to any specific vulnerability.
  4. 1. In a typical system, the user had the control to separate applications completely and make them run separately on servers .2. Thus a nice isolation layer can be created between them using firewall or any other hardware features.3. In a cloud, we may have multiple applications running on same server. 4. We cannot guarantee if the two applications may interact. For all we know one app may be snooping traffic /data of another application?Hence It’s a challenge to maintain the isolation between the applications and scale it on multiple physical servers with mobility
  5. To handle the above security challenges following levels of security should be applied.
  6. In Cloud architecture data is stored at the CSP’s side. So we have mentioned Dependencies:No or little knowledge of the way the backup or restore of data is done.No easy migrations to an other CSP.In cloud architecture you only pay for what you use. So measurement of resource usage lies in hands of the CSP.Tied to the financial health of CSP.Quality problems with CSP. (e.g. CSP might use cheap disk drives etc)No influence on data maintenance.
  7. Customer should know the physical location of their data so as to be clear of the provisions of prevailing law in particular nation.Same as screenWill the Insurance company compensate for loss of your business?Same as screenThough all the CSP’s try their best to provide data security, no security is assumed to be full proof. So if data centre is hacked can you move against vendor/CSP.What means do you have if data gets infringed.The customer must always be notified when vendors provide third party access to customers stored data, whether it is a legal authority or internal employee.