Data security measures followed by the organizations in the opinion of network administrators
In this section, the actual data security measure followed by the organizations against the data protection that was shared for the cloud service is given as per the opinion of the five network administrators interviewed and is as given below
When the network administrators are asked regarding the security models they use across their organizations for the data protection that was shared across the cloud services, one of the admin replied that “We don’t directly implement any security model from our side but insist the service providers to use the cloud switch security model as it has the unique features like all the keys are maintained under the guidance of the firewalls and we hold the complete control of those keys”.
From this statement it is clear that most of the organizations has the required control on the data security of their own organizations and insist the service providers to maintain the required security model and in this case cloud switch model is used, where it stores the data in the encrypted form and the encryption keys are available with the organization itself. One of the network admin replied to the same question like “We use the HDFS security model for data protection and it provides the ultimate security for our data”.
From this statement it is clear that few organizations use their own security standards to protect their data and in this case, HDFS (Hadoop Distributed File System) is used as their required model and the main advantage with this model is that, the files are distributed randomly across the disk and the key distribution mechanism is available with the clients and the data owners. When one of the network admin is asked the same question he replied that “We insist our service providers to install the cloud cube model across the data protection and different layers of security are provided with this model”.
From this statement it is clear that, most of the organizations are aware of different security models and in this case a separate cloud cube model is used and the service providers will give different physical layers that were external and internal to the organizations. One of the admin replied to the same question like “We not aware of the data security models and the complete control is given to the service providers and we trust them in this context”. From his reply it is clear that, few organizations strive a lot and trust the service providers in this context and the service providers will implement the security models.
From this overall analysis it is clear that, the service providers should be aware of all the security requirements of the clients and implement the required security model and this model should hold the key logic in different aspects. The most commonly security model for data protection is the cloud cube model and this model provides maximum protection to the data in terms of different layers in terms of physical layer that was external and internal to the organization.