Cloud Provider Assurances
Airange can use various methods to ensure proper authentication of the clients they serve. First, aging passwords are very important. This is where passwords are changed after sometime otherwise they expire. This ensures that sniffing does not occur. Secondly, aging accounts can help. This is whereby the clients are required to have new accounts. Therefore other people cannot continue using the accounts of a particular client (Velte, 2010). In addition, Airange can emphasis on the strength of passwords is important for authentication purposes. In this case, only passwords of certain strengths that cannot be guessed are allowed. Other people cannot therefore guess passwords. Therefore there are various methods that Airange can enhance authentication in provisions of services to their clients.
There are various methods that Airange can ensure confidentiality of the client’s data. First, virtualization puts data in a situation that other clients cannot access. However, this method can be non confidential when data is being transferred from the client to another place and hence data encryption is important in ensuring data confidentiality when being transferred. This is putting the data in a form that it cannot be read unless it is decoded by specific people. In this case, when data is stolen or accessed wrongfully, it cannot be read hence confidentiality is ensured. Physical control is another method (Rekhis,, 2011). Airange can ensure that there is limited physical access to data of its clients to ensure other clients do not access the data of others.
The type of assurance that the clients would require regarding the security of their utilities and softwares includes internet security, perimeter security and physical security. The clients need to be assured that there will be no attacks related to the internet such as hacking by people intending to steal their data (Velte, 2010). Secondly, they need physical security of their data such that they are sure that the data stored by Airange cannot be physically accessed by unauthorized people. The clients also need perimeter security for example whereby the use of firewalls is ensured. This helps to detect intruders into the clients’ server. In addition, there should be enough security measures to ensure the safety of the data of the clients.
References.
Velte, A. T., Velte, T. J., & Elsenpeter, R. C. (2010). Cloud computing: A practical approach. New York: McGraw-Hill.
Rekhis, S, Boudriga, N., and Obaidat, Server Side Security, In H. Bidgoli (Ed.),(2011) Handbook of information security, volume 2 Part 3: Foundations of Information, Computer and Network Security. New York, NY: John Wiley & Sons, Inc.