Cloud computing safety
Article REF: H6030 V3

Cloud computing safety

Author : Laurent BLOCH

Publication date: January 10, 2026 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

Overview

ABSTRACT

Cloud Computing allows businesses and individuals to deploy data and applications among external infrastructures, leased when needed, and released when useless. It is possible thanks to the ubiquitous network and to virtual machines techniques, made available by the performances of modern microprocessors. This dissemination of data lessens data losses risks, but creates new risks related to privacy and data corruption. And there are "black clouds", used by cybercrime organisations.

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

 INTRODUCTION

Cloud computing is a network-based IT hosting service that first appeared when Amazon launched its Amazon Web Services (AWS) offering in 2006. Amazon's goal was to market the unused computing power of servers deployed around the world for its own use, which were only being used at 10% of their capacity, in order to cope with seasonal peaks, particularly during the holiday season.

The idea of offering IT services that are detached from the technical characteristics of their implementation, thanks to the network, had been formulated a few years earlier by researchers such as Michel Volle .

The uniqueness of cloud computing compared to traditional data hosting, website hosting, or computing server offerings is based on the following five characteristics:

  • deployment and termination of on-demand services, on a self-service basis, generally via a web interface, almost instantaneously;

  • broadband network access;

  • pooling of non-localized resources: infrastructure, network, software, storage;

  • rapid allocation and deallocation of resources (elasticity);

  • billing based on consumption, typically hourly.

This flexibility is made possible by the availability of four technologies that are already well known, but whose performance has recently improved considerably:

  • distributed computing;

  • a ubiquitous high-speed network;

  • the domain name system (DNS);

  • efficient platforms for virtual machines.

A few remarks about these technologies:

  • the need for a fast and ubiquitous network is obvious;

  • The availability of effective virtualization systems, which are analyzed in detail in this article, makes it possible to easily deploy new servers on demand, and in some cases even automatically, whereas with physical machines, this would require a whole logistics operation involving transport, power...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


KEYWORDS

virtualization   |   internet   |   IaaS   |   PaaS   |   SaaS   |   privacy   |   cyberattack   |   data processing   |   virtual machine   |   cloud computing

EDITIONS

Other editions of this article are available:

Ongoing reading
Virtualization and security for cloud computing

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details