Secure Network Solutions for Enterprise Cloud Services
نویسندگان
چکیده
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecure Cloud Computing with a Virtualized Network Infrastructure
Despite the rapid development in the field of cloud computing, security is still one of the major hurdles to cloud computing adoption. Most cloud services (e.g. Amazon EC2) are offered at low cost without much protection to users. At the other end of the spectrum, highly secured cloud services (e.g. Google “government cloud”) are offered at much higher cost by using isolated hardware, facility,...
متن کاملData Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud Computing moves the application software and databases to the large data centers. Data security for such a cloud service includes secure channels, access controls, and encryption. when we consider the security of data in a cloud, we must consider : confidentialit...
متن کاملSICS: Secure In-Cloud Service Function Chaining
There is an increasing trend that enterprises outsource their network functions to the cloud for lower cost and ease of management. However, network function outsourcing brings threats to enterprises’ privacy since the cloud is able to access the traffic and rules of in-cloud network functions. Current tools for secure network function outsourcing either incur large performance overhead or do n...
متن کامل