Although the cloud hosting technology offers several benefits to its users, there are certain concerns that it carries with it. Some of the client data is housed in the cloud vendor's environment which may or may not comply with all the security norms and policies, leaving the client data susceptible to attacks and lapses. In case there is a bug in the vendor environment, all the users will become vulnerable to attacks by hackers. However, cloud adopts the following security measures to efficiently tackle these security aspects.
- Each user must be completely isolated from the other users through the virtualization technology with firewalls, intrusion detection and prevention measures.
- The data communication between the cloud service provider and client must be secured using VPNs (virtual private networks).