APR 10, 2013 08:00 AM
![]() | It's the High-Tech Wild, Wild West out there! |
The stages of the Cloud follow the evolution of sharing on the Internet: networking, network sharing, information sharing, resources sharing, and services sharing (IBM).

Figure 1. Evolution of Sharing on the Internet
- The first stage of the Cloud was around networking, the TCP/IP abstraction. Multiple regional networks, linking computers, were built at universities and national laboratories. Their inter-networking with TCP/IP led to network sharing and the emergence of the Internet and its worldwide adoption.
- The second stage of the Cloud was around documents, the WWW data abstraction. The HTML format, the HTTP protocol, and the Mosaic browser were adopted by universities for document exchange and then worldwide for information sharing. Then, grid computing emerged with the creation of standards and software for remote resources sharing and collaboration, exclusively utilized for highly scalable High Performance Computing (HPC) jobs.
- The newest stage of the Cloud, cloud computing, has emerged to provide services sharing by abstracting infrastructure complexities of servers, applications, data, and heterogeneous platforms.
No wonder then that CSA Security Guidance for Critical Areas of Focus in Cloud Computing considers two categories of assets that can be supported by the Cloud:
- Data (information)
- Applications/ functions/ processes (transactions/ processing)
CSA has also developed a simple framework to help evaluate initial cloud risks and inform security decisions:
- It is a quick method that helps understand:
- Importance of what is considered to be moved to the cloud
- Organization's risk tolerance
- Which combinations of deployment and service models are acceptable
- It also helps get a good idea of potential exposure points for sensitive information and operations.
A concise version of the framework is provided in the following table. Note that SPI is used as an acronym for the most common cloud computing service models, Software as a Service, Platform as a Service, and Infrastructure as a Service.
Table 1. Evaluating Initial Cloud Risks
| Steps in Evaluating Risk | Details | |
|---|---|---|
| 1. Identify asset for cloud deployment
| Potential uses of asset to account for:
| |
| 2. Evaluate asset
| Ask what would be the harm if:
| |
| 3. Map asset to cloud deployment models
| Which model is acceptable for identified asset:
| |
| 4. Evaluate cloud service models and providers
| Consider:
| Consider:
|
| 5. Map out data flow
| Consider:
| Consider:
|
Anyone have ideas or sources on how initial cloud risks are or should be evaluated? Please share here!
Irena Bojanova, Ph.D., is the Founding Chair of IEEE CS Cloud Computing STC, an associate editor of IEEE Transactions on Cloud Computing, and an editorial board member of IEEE CS IT Professional. She is a professor and program director, Information and Technology Systems, at University of Maryland University College, managed academic programs at Johns Hopkins University and PIsoft Ltd., and co-started OBS Ltd., (now CSC Bulgaria). Her current research interests include cloud computing, web-based systems, and educational innovations. She is a member of the IEEE and can be reached at ibojanova@umuc.edu.


















