Securing Cloud Environment
نویسندگان
چکیده
Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual machines confidential and secured. Challenges that cloud computing currently face, when deployed on a large enterprise scale, include self-healing, multi-tenancy, service-orientation, virtualization, scalability and data management. Undoubtedly, any model which involves data assets residing on equipment not within users’ immediate control needs to address security and privacy. Securing the cloud environment encompasses many different things, including standard enterprise security policies on access control, activity monitoring, patch management, etc. This paper focuses on the approaches to secure the cloud environment.
منابع مشابه
Poster: Secure Provenance for Cloud Storage
Organizations are increasingly turning to the cloud for data processing and storage. Storing data in the cloud is advantageous for numerous reasons: the elasticity of cloud environments ensures that only storage used is paid for, while tasks such as backup, replication, and geographic diversification of data are effectively outsourced to cloud storage providers. However, unfettered access to th...
متن کاملA Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
view of private cloud deployment
متن کاملTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security s...
متن کاملA Conceptual Architecture for Securing public Cloud: Moving from Trust toward Security
Cloud computing is next generation era of IT enterprise, which provide services like resource pooling, on demand and metered service. It provides the burden free environment for the consumer, to get rid of resource management. It also shifts all digital assets (data and application) to the centralized large datacentre. These datacentre can be onpremise or off-premise cloud service provider, dep...
متن کاملSecure Network Solutions for Enterprise Cloud Services
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...
متن کامل