An Overview of Cloud Computing and Cloud Security

An Overview of Cloud Computing and Cloud Security Model Context Protocol security Post-quantum cryptography AI infrastructure protection
Brandon Woo
Brandon Woo

System Architect

 
January 15, 2026 10 min read

TL;DR

This article covers the fundamental shift from traditional on-premise infrastructure to elastic cloud models while exploring the critical security gaps that emerge in these environments. We dive into the shared responsibility model, common attack vectors like misconfigurations and insecure apis, and the urgent need for post-quantum protections in ai-driven mcp deployments. You'll gain a roadmap for implementing zero-trust architectures and quantum-resistant encryption to safeguard modern ai ecosystems against next-gen threats.

The Evolution of Cloud Computing and Its Core Foundations

Remember when we used to spend months ordering hardware and wiring up server racks just to launch a simple app? Honestly, it feels like a lifetime ago, but that shift from owning physical boxes to renting "elastic" power is exactly what's changed the game for everyone from solo devs to big banks.

The big change wasn't just technical—it was financial. Companies stopped dumping millions into Capital Expenditure (CapEx) for hardware that would be obsolete in three years. Instead, they moved to an Operational Expenditure (OpEx) model. You pay for what you use, sort of like a utility bill.

  • Elasticity and Scalability: This is the real "secret sauce." If a retail app gets a huge spike on Black Friday, the cloud just adds more servers automatically. When the rush ends, it kills them off so you aren't paying for idle air.
  • Resource Pooling: Providers serve multiple customers using the same hardware (multi-tenancy), which keeps costs down for everyone. A finance firm might use this to run heavy risk-simulations that only need to exist for an hour a day on shared infrastructure.
  • Broad Access: Whether you're in healthcare or finance, you can hit your data from anywhere with an internet connection. For example, healthcare clinics use saas for patient records to stay compliant without hiring a huge IT team.

According to a 2024 review in the International Journal of Cloud Computing and Database Management, this "cloud-first" approach is now standard because it lets businesses be agile. But, as the study points out, 45% of data breaches now start in the cloud, so that flexibility comes with a price.

Think of cloud models like a "pizza as a service" analogy.

  1. iaas (Infrastructure): You buy the raw ingredients. You're in charge of the oven, the dough, and the security of the kitchen.
  2. caas (Containers): This is like a pre-assembled pizza kit. You bring your own toppings and kit to a shared professional kitchen where the ovens are already hot.
  3. paas (Platform): You just bring your own toppings. The provider has the dough ready and handles the baking for you.
  4. saas (Software): You just order the pizza and it shows up at your door. You have the least control but zero maintenance.

Diagram 1

It's a lot to manage, especially when you realize that just because it's "in the cloud" doesn't mean it's automatically safe. Next, we'll look at who is actually responsible for keeping all this stuff locked down.

The Fragmented Landscape of Cloud Security Challenges

Ever had that sinking feeling where you realize you left your front door wide open while you're already halfway to the airport? That's basically what a cloud misconfiguration feels like, except instead of a thief taking your TV, they're siphoning your entire company database.

Honestly, the biggest headache in cloud security isn't just the hackers—it's the sheer confusion over who is actually supposed to turn the key in the lock. We call this the Shared Responsibility Model, but in practice, it often ends up being the "I thought you were doing that" model.

The deal is simple on paper: the provider (aws, azure, or gcp) handles the security of the cloud—the physical servers, the cooling, the actual hypervisors. You, the customer, are responsible for security in the cloud. That means your data, your apps, and your access rules are your problem.

According to a preprint study by Stephen Mikah Makoshi (2025), this division of labor is where things fall apart because it's not always consistent across different services. If you're using iaas, you're managing almost everything; if it's saas, the provider does more, but you still own the identity management.

Diagram 2

It's kind of wild that most breaches aren't some "Mission Impossible" style hack. As noted in the breach statistics mentioned earlier, nearly half of all cloud incidents happen because someone left an S3 bucket public or used a default password on a database.

  • Weak MFA: A lot of teams still rely on basic passwords or weak multi-factor authentication that's easily bypassed by session hijacking.
  • Insecure apis: apis are the new "front door." If they aren't coded right, attackers use them to bypass the ui entirely and talk straight to your data.
  • Shadow IT: This is when a dev spins up a test environment in a retail app to try a new feature but forgets to shut it down, leaving an unpatched server just sitting there.

I've seen it happen in finance where a firm had perfect encryption but forgot to restrict who could generate the keys. In healthcare, sometimes a clinic will use a saas tool for patient scheduling but won't audit who still has access after they quit. It's these small, boring gaps that lead to the big, expensive headlines.

The New Frontier: Security for Model Context Protocol (MCP) Deployments

So, we’ve talked about how messy cloud security is, but now things are getting even weirder with the rise of ai. If you haven't heard of the Model Context Protocol (mcp) yet, just know it’s basically the new way we're letting ai models talk to our databases, local files, and apis without writing a mountain of custom code.

It’s super cool for productivity, but honestly, it’s a security nightmare if you just plug it in and hope for the best. We aren't just protecting "data" anymore—we're protecting the "reasoning" process of the ai itself.

  • Tool Poisoning: This is where an attacker messes with the metadata of a tool the ai uses, tricking the model into executing malicious commands instead of helpful ones.
  • Puppet Attacks: If an ai has access to your email via mcp, a hacker could send you a "prompt" that looks like a normal message but actually forces the ai to forward your sensitive docs to an outside server.
  • Context Injection: Since mcp allows models to pull in huge amounts of data from different sources, an attacker can hide "malicious instructions" inside a legitimate-looking text file that the ai reads.

Since the tech is so new, most people are just winging it, but that's where Gopher Security comes in. They've built what is pretty much the first "4D security framework" specifically for mcp deployments. To break it down, the four dimensions they look at are:

  1. Identity: Who (or what bot) is asking?
  2. Intent: What is the ai actually trying to achieve with this request?
  3. Environment: Where is the request coming from and is the system healthy?
  4. Time: Is this request happening at a weird hour or at a suspicious frequency?

Instead of just checking if a user is logged in, it looks at the behavior of the ai agent in real-time. As noted in the breach statistics mentioned earlier, mcp is basically a giant new door for those 45% of cloud-based attacks. If the model suddenly starts asking for resources it never touched before, Gopher's system flags it as a "tool-based anomaly" and shuts it down before the data leaves the building.

Post-Quantum Cryptography and Future-Proofing the Cloud

If you think ai is moving fast, wait until you see what quantum computing is about to do to our passwords. It’s basically the digital equivalent of someone inventing a master key that opens every single lock on the planet at once.

Most of our cloud security today relies on math problems that are just too hard for normal computers to solve, like rsa or ecc. But a quantum computer doesn't play by those rules; it can crunch through that math in seconds.

There is this scary concept called "harvest now, decrypt later." Bad actors are already stealing encrypted cloud data today, even if they can't read it yet. They’re just sitting on it, waiting for quantum tech to catch up.

  • NIST Standards: nist is currently finalizing "post-quantum" algorithms (pqc). They've already approved specific ones like ML-KEM (formerly Kyber) for key encapsulation.
  • Lattice-based Crypto: Instead of factoring numbers, it uses complex geometry that even quantum bits (qubits) find impossible to navigate. Algorithms like Dilithium are the new standard for digital signatures.
  • Crypto-Agility: This is the ability to swap out encryption methods without breaking your whole app—it's going to be a requirement for any cloud architect soon.

In healthcare, imagine a research lab using ai to process genomic data. If they don't use quantum-resistant tunnels now, that patient data could be exposed in 2030 when quantum hardware goes mainstream.

Adaptive Zero-Trust and Context-Aware Access Control

Ever feel like giving someone the keys to your house, but only letting them stay in the kitchen between 2 PM and 4 PM? That’s basically what we’re trying to do with adaptive zero-trust—it's about making sure access isn't just a "yes or no" thing, but a "why, where, and how" conversation.

The old way of doing things, usually called rbac (role-based access control), is kinda falling apart now that we have ai agents running around. In a fluid ai setup, just because someone is a "manager" doesn't mean their bot should have access to the entire database at 3 AM from a random IP in another country.

  • parameter-level restrictions: Instead of just saying "this ai can access the api," you set rules on the specific data it can pull.
  • contextual signals: We look at the user's location, the mfa status, and the risk score of the network before granting even a tiny bit of access.
  • continuous verification: You don't just check the ID at the door; you keep checking it every time the ai tries to move to a new room.

Honestly, the only way to catch a "puppet attack" or prompt injection is to watch how the ai behaves in real-time. If a model that usually just summarizes emails suddenly tries to export your entire customer list, that’s a massive red flag. Next, let's talk about the world of compliance and audits.

Navigating the Maze of Compliance and Audits

If you're working in the cloud, you can't escape the alphabet soup of regulations. Whether it's gdpr for privacy in Europe, hipaa for healthcare data in the US, or soc 2 for general service security, these aren't just suggestions—they're the law (or at least, the requirement to get big customers).

soc 2 is a big one for cloud companies. It’s basically an audit that proves you’re actually doing what you say you’re doing with people's data. It looks at things like how you handle encryption, who has access to your servers, and how you respond to incidents.

To keep the auditors happy, you need tools that provide a "paper trail" for everything.

  • Cloud Custodian: An open-source tool that helps you manage your cloud resources and makes sure they stay compliant with your policies.
  • Vanta or Drata: These platforms automate a lot of the evidence collection for soc 2, so you aren't spending hundreds of hours taking screenshots of your settings.
  • Audit Logs: You need to log everything. If an ai agent accesses a database via mcp, you need a record of exactly what it did, when, and why.

Compliance used to be a once-a-year headache, but in the cloud, it has to be continuous. If you change a setting on Tuesday that breaks a hipaa rule, you need to know about it on Tuesday, not six months later during an audit.

Conclusion: Building a Resilient AI Infrastructure

So, wrapping this all up—building a resilient ai setup isn't just about picking the fastest model. It's about making sure the whole stack doesn't crumble when quantum computers or clever prompt injections show up at your door.

Honestly, you need a multi-layered defense. You can't just rely on one firewall and call it a day. As noted in the breach statistics mentioned earlier, nearly half of all breaches start in the cloud, so your strategy has to be tight.

  • Standardization: Aligning with nist and soc 2 isn't just for the auditors; it gives you a real baseline for things like audit logging and forensic readiness.
  • Automation: Use infrastructure-as-code to keep things consistent. If you're manually clicking buttons in the console, you're going to miss a setting eventually.
  • Specialized ai Security: Platforms like gopher security are becoming a necessity because they actually understand ai intent, which traditional tools just ignore.

Diagram 6

In retail, I've seen this save teams from massive scraping bots. In healthcare, it's the only way to keep patient data safe from "harvest now, decrypt later" tactics.

Anyway, stay skeptical and keep your logs clean. Good luck out there.

Brandon Woo
Brandon Woo

System Architect

 

10-year experience in enterprise application development. Deep background in cybersecurity. Expert in system design and architecture.

Related Articles

Model Context Protocol security

The Four C's of Cloud Security Explained

Learn how the Four C's of Cloud Security apply to Model Context Protocol and post-quantum AI infrastructure. Secure your ai deployments from tool poisoning and more.

By Brandon Woo January 21, 2026 7 min read
common.read_full_article
Model Context Protocol security

Comprehensive Review of Cloud Computing Security

Detailed review of cloud computing security focusing on Model Context Protocol (MCP), post-quantum AI infrastructure, and advanced threat detection strategies.

By Divyansh Ingle January 20, 2026 7 min read
common.read_full_article
Model Context Protocol security

How to Secure Your Load Balancer?

Learn how to secure your load balancer for AI infrastructure. Covers post-quantum cryptography, MCP security, and zero-trust architecture for modern AI models.

By Divyansh Ingle January 19, 2026 7 min read
common.read_full_article
Introduction to Cloud Security

Introduction to Cloud Security

Learn the basics of cloud security with a focus on post-quantum AI infrastructure, MCP deployment protection, and quantum-resistant encryption for modern enterprises.

By Divyansh Ingle January 16, 2026 6 min read
common.read_full_article