Documente Academic
Documente Profesional
Documente Cultură
F. A. Author
Your name, University etc.
Abstract— This research paper will examine Google Cloud Platform security
infrastructure. It will be analyzed how Google Cloud Platform security is designed,
as well as the infrastructure features. The paper will investigate how Google
Cloud protect its data, including the organizational and technical controls,
followed by Google compliance regulatory requirements.
Your name*
University* Year*
property of individuals are safe and secure? In
today’s modern society, information has
become the most expensive commodity.
This research paper will examine Google
Cloud Platform security infrastructure. It will
be analyzed how Google Cloud Platform
security is designed, as well as the
infrastructure features. The paper will
investigate how Google Cloud protect its data,
including the organizational and technical
controls, followed by Google compliance
regulatory requirements.
2. LITERATURE REVIEW
Figure 1: Cloud security
2
Hardware Infrastructure
2. Inter-Service Access Management: With
Hardware infrastructure or the lowest level
assistance of Google engineers, this
infrastructure is basically consistent of three
infrastructure operates in a way that detects
components:
individual identities, so that services can
1. Security of Physical Premises: Include data accept or deny the following access. Strong
centers, which have numerous coatings of management systems are operating to
physical security fortification. These data provide approval of identities, notifications
centers are secured with technologies as: and chains [6].
biometric identification, cameras, laser-based
detection systems. Also, only limited 3. Encryption of Inter-Service Communication:
specialized personnel can access these data With cryptographic authorization and
centers [5]. authentication the infrastructure is proficient
to secure inter-service communication. This
ensures that any third party do not have
2. Hardware Design and Provenance: Google access to the private network [6].
custom designed networking equipment that
is consistent of thousands of server machines. 4. Access management of End User Data: The
(Google custom chips, deployed on servers infrastructure is designed in a way to run
and peripherals, used for security central user identity service that verifies the
identification of Google devices at the end user login. After the verification provides
hardware level) [5]. users authorizations to the client’s device [6].
3
This layer covers the secure communication Google Cloud Platform trust principles are
between Google and the internet. This is constructed for thorough protection of
conducted through private IP space which customers privacy. Consequently, GCP
exposes subset of machines straight to practice six different trust principles, which
outside internet traffic and attacks. Google are going to be listed below:
Front End (GFE) services guarantee that all
the transportation layer security connections 1. The first and main principle Google use is
are completed and in coordination with the customer safety. The platform is designed to
accurate certificates [6]. provide instant notification to users if a safety
The Google Front End ensures proper breach is crossed and customer data is in
protection counter to DDoS attacks. danger.
Furthermore, the central identity service, that
consumers view as Google log in page which 2. GCP security provides comprehensive
request username and password, and control over customer’s data.
evaluates risk factors, which may include
whether the individual logged in from same 3. One of the trust principles include strict
device or location [7]. advertising principle. Google maintains
rigorous differentiation between the user’s
Operational Security Cloud data and the one used for business
advertising.
This layer includes various technologies for
measuring and improving security recognition 4. Google’s data centers have the most
and response. Manual security reviews, as advanced security systems, which locations
well as automated tools are included for are publicly accessible. This allows users to
security formation. Google creates important have knowledge regarding their data storage
outlays, specifically created for protection of and constant availability.
user’s devices and credentials, with usage of
different technologies and regulations for 5. Independent auditors evaluate, validate
physical, data, computers, access and certify GCP security practices.
management, network security etc. [8]. Accordingly, international security and privacy
regulations assure GCP security.
The operational security consists of four
sections: 6. Last and most important, Google does not
provide “backdoor” access to customer data
1. Intrusion Detection to any governmental agencies or units [9].
2. Safe Software Development
3. Keeping Employee Devices and Credentials
Safe Independent Third-Party Certifications
4. Reducing Insider Risk
GOOGLE CLOUD PLATFORM COMPLIANCE AND Google Cloud Platform implements various
TRUST security controls in order to ensure its
customers with high protection and security.
Therefore, GCP is implementing independent
Google Cloud Security – Trust Principles third-party audits and regulations, which not
only comply with data security, but they have
4
been certified. Google Cloud Platform has Google Cloud Platform main objective is
certifications such as: ISO 27001, ISO 27017, protection of customers data and its security,
ISO 27018, AICPA, SOC 2 and 3, PCI DSS, CSA this became a part of the company’s
Star and FedRAMP [10]. initiatives and vital focus. Google Cloud
Platform is a major leader on the market for
Privacy and Compliance Standards data protection and innovation of security and
encryption systems. The company considers
that data protection is more than security, for
Google Cloud Platform follows European
the same reasons, with all possible efforts and
Union’s General Data Protection
innovation investments, Google earns trust
Regulations (GDPR). These laws and
with today’s most valuable asset –
regulations stand for fortification of
information.
European user’s data privacy and
protection. Moreover, Google Cloud
Platform follows Australian Privacy
Principles (APPs), Australian Prudential REFERENCES
Regulations Authority (APRA), Multi-Tier M. Ali and
M. H. Miraz, "Cloud Computing Applications," in Proceedings of
Cloud Security (MTCS), Singapore
the International Conference on Cloud Computing and
Standard (SS), Japan Center for Financial eGovernance, Wales, 2013.
Industry Information Systems (FISC) and
UK NCSC Cloud Security Principles [11]. P. Srivastava and R. Khan, "A Review Paper on Cloud
Computing," International Journals of Advanced Research in
Nevertheless, Google Cloud Platform for Computer Science and Software Engineering , vol. 8, no. 6,
2018.
having the most secure payment services
follows ISO/IEC 27001 and Payment Card Google, "Google Cloud," 2019. [Online]. Available:
Industry Data Security Standards (PCI https://cloud.google.com/security/. [Accessed 2 4 2020].
DSS). With pioneering encryption credit
I. Shabani and A. Dika, "The Benefits of Using Google Cloud
card details, storage and personal
Computing for Developing Distributed Applications," Journal of
information of clients, Google has achieved Mathematics and System Science, vol. 5, pp. 156-164, 2015.
radical security [11].
N. . J. Mitchell and K. Zunnurhain, "Google cloud platform
security," in the 4th ACM/IEEE Symposium, 2019.
5
Google, "Security, compliance and GDPR Google Cloud,"
[Online]. Available: file:///C:/Users/Ena/Downloads/Security,
%20compliance%20and%20GDPR%20and%20Google
%20Cloud%20(2).pdf. [Accessed 2 4 2020].