The Cloud Computing era
Pasquale Lodise
Senior Backend Developer @ TIM | GCP Cloud Architect Certified | Backend and Cloud Computing Enthusiast ??????
In 2025, we hear about the Cloud a lot, even among people who don't work in the IT industry. This computing model is present in everyday life; we use it practically every second of our day, without even realizing it. For example, when we use an app on our smartphone, the app is most likely using cloud computational resources to obtain data to show to the user, or when we back up photos to iCloud or Google Photos, we are using cloud resources to store our data and other resources to recover them.
Yes, but...what is cloud computing, technically?
When they ask me what cloud computing is, I like to answer with the definition given by NIST (National Institute of Standards and Technology) and reported in the SP 800-145 specification:
"Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models."
So, in other words, "is it just someone else's computer"? Yes, but that is too simplistic a definition. Cloud computing is a model that allows you to rent and release hardware resources as needed, of any power and type. And this can be done comfortably from home, using the Internet. The definition talks about five essential characteristics, three service models, and four deployment methods: let's see them.
Essential characteristics
NIST outlines five essential characteristics that define cloud computing. These characteristics serve as guidelines to ensure the efficiency, scalability, and reliability of cloud computing:
Service Models
NIST outlines three fundamental service models for cloud computing. These models describe the different levels of responsibility shared between the cloud provider and the customer. Understanding these models is key to choosing the right cloud service for your needs.
Deployment Models
The National Institute of Standards and Technology (NIST) defines four deployment models for cloud computing, which describe where the cloud infrastructure is located and who has access to it. These models help organizations choose the right cloud deployment strategy based on their specific needs and requirements:
领英推荐
But in the end...is data in the cloud really safe?
It's really difficult to answer this question. Generally, yes, but there are some aspects to consider.
When data is uploaded to the cloud, it is encrypted (at rest) using a key generated directly by the cloud provider. This suggests a high level of security, but there are some aspects to consider, such as the fact that the key to decrypt the data is, in fact, in the possession of the cloud provider. This could expose the data to potential internal data breaches caused by cloud provider employees.
To mitigate this problem, the customer could encrypt the data with a customer-managed encryption key (CMEK). Cloud providers offer virtual HSMs (Hardware Security Models) where it is possible to store the keys created by the customer in a totally secure manner.
Another important issue concerns data deletion. Often, when we no longer need the block storage (perhaps connected to a VM, therefore in an IaaS context) and we remove it, it could happen that the data still physically resides on the storage devices for a short period. To mitigate this problem, an operation called cryptoshredding can be performed. In essence, before deprovisioning the storage devices, the data is encrypted, and once the process is finished, the key is destroyed. This applies if a CMEK approach has not been used; otherwise, it is sufficient to simply destroy the CMEK to carry out cryptoshredding. This way, even though the data might still reside on the physical devices, without the key (which has been destroyed), it would be impossible to recover the data.
So, is the cloud provider directly responsible for everything?
Absolutely not! Remember this: the customer, in any service model, is ALWAYS responsible for their data. But there are some things that the customer is responsible for and others that the cloud provider is responsible for, and this depends on the service model.
The shared responsibility model in cloud computing clarifies the security responsibilities between the cloud provider and the customer. Understanding this model is crucial to ensure your data and applications are adequately protected in the cloud. Look at this diagram
As you can see, responsibilities vary depending on the service model. With IaaS the customer has more control, but also greater responsibility, while with SaaS the customer will have less control, but less responsibility.
?? AI Enthusiast | ?? Sales | ?? Co-Founder Pro2Be | ? Presidente Nazionale GG | ?? Speaker
1 个月Great analysis, Pasquale! Cloud computing is revolutionizing how companies manage data and operations, unlocking new opportunities for efficiency and scalability. It will be interesting to see how AI and edge computing further integrate into this ecosystem. Thanks for the insightful perspective!