Despite of all the benefits of outsourcing data management, it should be emphasized that in such a case clients do not have any direct control over the systems that manage their data. Thus the following questions arises:
Fig. 5.1/1: Example architecture
Designing solutions for the security concerns should take into account that sometimes the client in the cloud architecture might be a small device (e.g. a cell-phone) with limited resources in the field of communication facilities, memory, CPU and battery power. Thus: