Secure Network Solutions for Enterprise Cloud Services

2015 ◽  
pp. 1464-1486
Author(s):  
Chengcheng Huang ◽  
Phil Smith ◽  
Zhaohao Sun

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today's securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.

Author(s):  
Chengcheng Huang ◽  
Philip Smith ◽  
Zhaohao Sun

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today's securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.


2022 ◽  
Vol 35 (1) ◽  
pp. 0-0

Since companies have increasingly used cloud services for their businesses, security risks are important issues for their business success. The paper presents the understanding of cloud computing and risk management in the cloud. For managing cloud risks, three risk management approaches are introduced.. This paper will give some inferences that companies choose the best cloud network to enhance their businesses and use the appropriate risk management approach to mitigate their risks within the cloud environment.


Wireless technologies such as Ad hoc network and cloud network are popular in the present era, so is the emerging technology ad hoc cloud is gaining popularity. This article implements the ad hoc network that runs the cloud services that is termed as Ad hoc cloud. To implement this concept, five adhoc network protocols used are TORA, DSR, AODV, GRP and OLSR. Performance of the network as well as the applications are monitored and analyzed and based on the results, an optimal solution is proposed. Optimized Network Engineering Tool is used to perform the simulations.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.


Author(s):  
Srinivasa K. G. ◽  
Nishal Ancelette Pereira ◽  
Akshay K. Kallianpur ◽  
Subramanya E. Naligay

CloudStack is an Apache open source software that designed to install and handle large virtual machine (VM) networks, designed by Cloud.com and Citrix. This application is written in Java and was released under the terms of Apache License 2.0. This chapter discusses the easy availability and effortless scalability of CloudStack, which is an Infrastructure-as-a-service (IaaS) cloud computing platform software. We explore how CloudStack can either be used to setup public cloud services, or to provide a private cloud service.


2014 ◽  
Vol 984-985 ◽  
pp. 1309-1317 ◽  
Author(s):  
D. Sudha Devi ◽  
K. Thilagavathy ◽  
S. Vaghula Krishnan ◽  
S. Harish ◽  
R. Srinivasan

Cloud Computing is being intended to deliver information technology services based on internet on demand. The benefits of cloud technology are incomparable which takes the information technology into a new dimension. Organizations already invested for their own infrastructure are likely to set up private clouds to reap the benefits of cloud computing technologies. Cloud services are thriving by the open source software OpenStack. In this paper, we aim to introduce the largest open-source cloud operating system OpenStack with a new authentication mechanism. This paper tries to address the challenge of finding legitimate users by introducing One Time Password (OTP) as an authentication mechanism in OpenStack. Replay attacks can be defeated by using One Time Password. The OTP mechanism provides an extra level of protection which makes it extremely difficult for any potential intruder to abuse the recorded password that was already used to log into cloud service. The integration of OTP mechanism into OpenStack allows users to protect their credentials from unauthorized access. Also One Time Password is used to grant access to legitimate users into the cloud environment and to prevent access to malicious users bot attacks.With secured cloud environment users can enjoy lot many benefits of private cloud service.


Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.


Sign in / Sign up

Export Citation Format

Share Document