I have observed the database management industry for a long time now. Years of experience in this field has made me seasoned. I have seen the trends, when I began in 2008 till now when I am sharing an office with 120 people. From those days of server-side database management, we have now moved to cloud database. Recently, a popular site, infamous for sharing files over the torrent network, announced that it will be moving completely to cloud infrastructure and will have no physical server anymore.
This brings up another issue which is bothering me recently. Is the cloud server a safe option? Certainly it is still developing and has not reached its full potential. I personally predict that we would be seeing a cloud server architecture overcoming the present one by 2020 and surely not before that. There are two big reasons in favour of this opinion.
1. The architecture has not yet reached its peak, it is still in its development stage and many companies and organisations are wary of it.
2. There are too much data to move. Just imagine that some big organisations like Google or Yahoo trying to go ‘cloud’. They will need to move thousands of terabytes.
Anyway, security of data is what I am willing to talk about today. Cloud technology, like I pointed out several times, is not fully functional which means there are possible holes in the security. But this point also works as a blessing as no hacker is really targeting the cloud technology at this early stage of development because there are very few companies who are using this technology. This is exactly why Linux is secure, no hacker is going to spend effort to penetrate an OS with a 2% market share. But still there can be a few threats.
‘Thumbsucking’, as it is named somewhat weirdly, is the process where people can actually access the target machine physically. They can take the data out using portable storage devices like a flash device. This risk is hugely reduced if the cloud infrastructure is used. As most of the data will be in the cloud, physical access to one access point will not harm as much as it use to do in the existing system. But it also increases the second risk, known as HACKING!