Connect with us

Hi, what are you looking for?

Tech & Science

New model to improve security of cloud computing

Cloud computing is a type of internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. For the typical user, cloud computing means storing and accessing data and programs over the Internet instead of a computer’s hard drive. While the use of a cloud gives considerable flexibility, it can be more prone to hacks and data breaches.

The idea of using a cellular structure to protect cloud computing systems comes from Pete Kofod, who founded a company called The Sixth Flag. Koford has communicated with Digital Journal about his alternative approach. The need for a new approach arose from Kofod’s frustration with current computer and on-line security approaches. According to Koford, the computer industry’s response to increasingly advanced and persistent security threats has been to continue to focus on hardening single points of failure, such as central authentication systems (in other words a single sign-on protocol for the web).

According to Koford, focusing on the source is a worthwhile approach, but it represents just one activity and it carries the risk of eventual compromise. “It’s not good enough to harden a system against an attack,” Kofod explains. “You must also have a process that contains the effects of an inevitable breach.”

Breaches happen, Kofod explains, due to a paradox in cloud computing systems. He explains this as: “If the systems that employ multiple layers of security all rely on the same single ‘Central Authentication’ mechanism, the question that never gets asked is whether those systems actually provide independent layers of defense, or ‘Defense in Depth.’ This is not an academic exercise. Recognizing the criticality of authentication systems, attackers have spent significant resources on compromising them, often successfully.”

Due to these vulnerabilities, Kofod has adopted a different approach called ‘cell structure security.’ Kofod outlines the main features in the following video:

With this Kofod outlines the basis of the cell approach: “Should the cell be compromised, the parent organization immediately isolates and collapses it. This is a concept regularly employed in clandestine warfare.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Social media platforms should feature tobacco-style health warnings for adolescents, a top US government health official said Monday.

Business

These attacks are designed to deceive employees into revealing sensitive information or downloading malicious software.

Sports

The trial of a group of rugby players accused of gang raping a student after a 2017 match by leading French team Grenoble was...

Business

NATO's chief called Monday for China to face consequences if it keeps up support to Russia.