Securing Cloud Environment

نویسندگان

  • N. Harini
  • C. K. Shyamala
  • T. R. Padmanabhan
چکیده

Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual machines confidential and secured. Challenges that cloud computing currently face, when deployed on a large enterprise scale, include self-healing, multi-tenancy, service-orientation, virtualization, scalability and data management. Undoubtedly, any model which involves data assets residing on equipment not within users’ immediate control needs to address security and privacy. Securing the cloud environment encompasses many different things, including standard enterprise security policies on access control, activity monitoring, patch management, etc. This paper focuses on the approaches to secure the cloud environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Secure Provenance for Cloud Storage

Organizations are increasingly turning to the cloud for data processing and storage. Storing data in the cloud is advantageous for numerous reasons: the elasticity of cloud environments ensures that only storage used is paid for, while tasks such as backup, replication, and geographic diversification of data are effectively outsourced to cloud storage providers. However, unfettered access to th...

متن کامل

Trust based Mechanism for Secure Cloud Computing Environment: A Survey

Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security s...

متن کامل

A Conceptual Architecture for Securing public Cloud: Moving from Trust toward Security

Cloud computing is next generation era of IT enterprise, which provide services like resource pooling, on demand and metered service. It provides the burden free environment for the consumer, to get rid of resource management. It also shifts all digital assets (data and application) to the centralized large datacentre. These datacentre can be onpremise or off-premise cloud service provider, dep...

متن کامل

Secure Network Solutions for Enterprise Cloud Services

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011