I-Keep is a cloud infrastructure provider that stores confidential data for various clients. Its paramount concern is to make sure that unauthorized entities do not tamper with or modify any images. On the other hand, Airange is a cloud service provider that processes tasks and provides software support for its clients. It uses applications developed by other vendors and integrates them on its platform (Border, 2006).
The security assurances associated with a cloud service could be customized according to the needs of consumers. The
cloud infrastructure provider must comply with the requirements at the lowest level of abstraction. For example, Airange should synchronize and ensure the different sets of security requirements that surface at the front-end level of cloud computing (Gezelter, 2008).
Images stored in Airange’s cloud are not located on a single machine. Rather, they are distributed across the entire virtual layer. Airange must create a remote management capability for Medical Imaging’s images to ensure their security. The data are also hosted on devices that belong to I-Keep, the third-party ISP. Airange needs to clarify to Medical Imaging and MediaInc how the cloud partners protect the confidentiality of images (Rekhis, Boudriga, & Obaidat, 2009).
I-Keep knows that a single failure in its infrastructure security mechanisms, can allow hackers to access thousands of images owned by Medical Imaging, and MediaInc and perhaps images owned by other enterprises. Its concerns would be all the following: improve on the method used in physical protection of data storage devices, manage backup information, control and deny unauthorized access to data, and profile and verify security of all services available to end users.
Security policy defined by the two companies covers internet security, physical security and perimeter security. This can be implemented by use of firewalls to protect data that travel across the networks, give consumers granular access control on their own data, regardless of where their data assets are located and processed, and install security compliances between consumers‟ systems and cloud providers systems (Rekhis, Boudriga, & Obaidat, 2009).
References
Border, C. (2006). Client Side security. In H. Bidgoli (Ed.), Handbook of information security, volume 2 Part 3: Foundations of information, computer and network security. New York, NY: John Wiley & Sons, Inc.
Gezelter, G. (2008). OpenVMS Security. In H. Bidgoli (Ed.), Handbook of information security, volume 2 Part 3: Foundations of Information, Computer and Network Security. New York, NY: John Wiley & Sons, Inc.
Rekhis, S., Boudriga, N., & Obaidat, T. (2009). Server Side Security, In H. Bidgoli (Ed.), Handbook of information security, volume 2 Part 3: Foundations of Information, Computer and Network Security. New York, NY: John Wiley & Sons, Inc.