Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers
PDF

Keywords

Cloud Security
Cloud Service Providers (CSPs)
Service Level Agreement (SLAs)
Virtualization
Hypervisor
VMware Workstation

How to Cite

Kirubakaran, S. Stewart. 2020. “Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment With the Support of Cloud Service Providers”. Journal of Trends in Computer Science and Smart Technology 2 (3): 148-54. https://doi.org/10.36548/jtcsst.2020.3.004.

Abstract

In this paper, we are focussing on creating a secure cloud environment with the help of the cloud service provides. Nowadays, the demand for the cloud increases and all the business are transferred to the cloud environment. When a greater number of people get involved, security matters a lot. This paper emphases on secured cloud environment by creating a trusted relationship with the cloud service provider and also by comparing the current security mechanisms applied in the real-world businesses. This paper helps the readers to understand the need of security mechanisms in the cloud environment and the need for the SLAs with the trusted Cloud Service Providers.

PDF

References

Cloud Computing a Hands-on Approach by Arshdeep Bahga & Vijay Madisetti published by Universities Press (India) Private Limited 2014.

Benefits of Cloud Computing: https://www.ibm.com/in-en/cloud/learn/benefits-of-cloud-computing

Cloud Service Providers: https://www.sdxcentral.com/cloud/definitions/what-are-cloud-service-providers/

https://blog.turbonomic.com/blog/on-technology/cloud-elasticity-vs-cloud-scalability

https://en.wikipedia.org/wiki/Cloud_computing_security

Sophos Firewall: www.sophos.com

Security Features, IBM: www.ibm.com

https://www.forcepoint.com/cyber-edu/cloud-security

https://www.beyondtrust.com/resources/glossary/cloud-security-cloud-computing-security

https://www.vmware.com/topics/glossary/content/cloud-security

Drop Box Security Features: https://www.dropbox.com/business/plans-comparison

Sophos Tech Specs: https://www.sophos.com/en-us/products/cloud-optix/tech-specs.aspx

Google Cloud Security: https://cloud.google.com/products#security-and-identity

Amazon AWS Security: https://aws.amazon.com/security/

Microsoft Azure Security: https://azure.microsoft.com/en-us/overview/security/

RSA Key Size https://en.wikipedia.org/wiki/Key_size

AES Standards https://en.wikipedia.org/wiki/Advanced_Encryption_Standard