Abstract
In this paper, we are focussing on creating a secure cloud environment with the help of the cloud service provides. Nowadays, the demand for the cloud increases and all the business are transferred to the cloud environment. When a greater number of people get involved, security matters a lot. This paper emphases on secured cloud environment by creating a trusted relationship with the cloud service provider and also by comparing the current security mechanisms applied in the real-world businesses. This paper helps the readers to understand the need of security mechanisms in the cloud environment and the need for the SLAs with the trusted Cloud Service Providers.
References
- Cloud Computing a Hands-on Approach by Arshdeep Bahga & Vijay Madisetti published by Universities Press (India) Private Limited 2014.
- Benefits of Cloud Computing: https://www.ibm.com/in-en/cloud/learn/benefits-of-cloud-computing
- Cloud Service Providers: https://www.sdxcentral.com/cloud/definitions/what-are-cloud-service-providers/
- https://blog.turbonomic.com/blog/on-technology/cloud-elasticity-vs-cloud-scalability
- https://en.wikipedia.org/wiki/Cloud_computing_security
- Sophos Firewall: www.sophos.com
- Security Features, IBM: www.ibm.com
- https://www.forcepoint.com/cyber-edu/cloud-security
- https://www.beyondtrust.com/resources/glossary/cloud-security-cloud-computing-security
- https://www.vmware.com/topics/glossary/content/cloud-security
- Drop Box Security Features: https://www.dropbox.com/business/plans-comparison
- Sophos Tech Specs: https://www.sophos.com/en-us/products/cloud-optix/tech-specs.aspx
- Google Cloud Security: https://cloud.google.com/products#security-and-identity
- Amazon AWS Security: https://aws.amazon.com/security/
- Microsoft Azure Security: https://azure.microsoft.com/en-us/overview/security/
- RSA Key Size https://en.wikipedia.org/wiki/Key_size
- AES Standards https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
