GxP Data Integrity for Cloud Apps – Part 2

GXP REQUIREMENTS IN CLOUD ENVIRONMENT

Implications of Cloud Apps in regulated environment

Cloud computing brings a number of attributes that require major attention when it comes to trusting the system. There are three major potential threats in cloud computing, namely, security, privacy, and trust. Security plays a critical role in the current era of long dreamed vision of computing as a utility. It can be divided into four subcategories: safety mechanisms, cloud server monitoring or tracing, data confidentiality, and avoiding malicious insiders’ illegal operations and service hijacking. Security is the combination of confidentiality, the prevention of the unauthorized disclosure of information, integrity, the prevention of the unauthorized amendment or deletion of information, and availability, the prevention of unauthorized withholding of information. The trust of the entire system depends on the data protection and prevention techniques used in it. The major issues in the cloud computing include resource security, resource management, and resource monitoring. Data privacy is traditionally accompanied with data security. Comparative studies on data security and privacy can help to enhance the user’s trust by securing data in the cloud computing environment.

1. Data Integrity

Data integrity is one of the most critical elements in any information system. As we have  already seen and aware that data integrity means protecting data from unauthorized deletion, modification, or tampering. Managing organization’s admittance and rights to specific enterprise resources ensures that valuable data and services are not abused, misappropriated, lost or stolen. Data integrity in the cloud system must be such that the data should not be lost or modified by unauthorized users. Besides storage of large-scaled data, cloud computing environment usually provides data processing service. Data integrity can be obtained by techniques such as RAID-like strategies and digital signature. Due to the large quantity of entities and access points in a cloud environment, authorization is crucial in assuring that only authorized entities or users can access data. By avoiding the unauthorized access, organizations can achieve greater confidence in data integrity. The monitoring mechanisms offer the greater visibility into determining who or what may have altered data or system information, potentially affecting their integrity. Cloud computing providers are trusted to maintain data integrity and accuracy. However, it is necessary to build the third-party supervision mechanism besides users and cloud service providers. Data integrity in the cloud system must be such that the data should not be lost or modified by unauthorized users. Besides storage of large-scaled data, cloud computing environment usually provides data processing service. Data integrity can be obtained by techniques such as RAID-like strategies and digital signature. Due to the large quantity of entities and access points in a cloud environment, authorization is crucial in assuring that only authorized entities or users can access data. By avoiding the unauthorized access, organizations can achieve greater confidence in

Click here to download the document.

application architecture training

Hi there  

We’re here to help! Ask us anything.