Abstract
In this paper, we are focussing on creating a secure cloud environment with the help of the cloud service provides. Nowadays, the demand for the cloud increases and all the business are transferred to the cloud environment. When a greater number of people get involved, security matters a lot. This paper emphases on secured cloud environment by creating a trusted relationship with the cloud service provider and also by comparing the current security mechanisms applied in the real-world businesses. This paper helps the readers to understand the need of security mechanisms in the cloud environment and the need for the SLAs with the trusted Cloud Service Providers.
References
Cloud Computing a Hands-on Approach by Arshdeep Bahga & Vijay Madisetti published by Universities Press (India) Private Limited 2014.
Benefits of Cloud Computing: https://www.ibm.com/in-en/cloud/learn/benefits-of-cloud-computing
Cloud Service Providers: https://www.sdxcentral.com/cloud/definitions/what-are-cloud-service-providers/
https://blog.turbonomic.com/blog/on-technology/cloud-elasticity-vs-cloud-scalability
https://en.wikipedia.org/wiki/Cloud_computing_security
Sophos Firewall: www.sophos.com
Security Features, IBM: www.ibm.com
https://www.forcepoint.com/cyber-edu/cloud-security
https://www.beyondtrust.com/resources/glossary/cloud-security-cloud-computing-security
https://www.vmware.com/topics/glossary/content/cloud-security
Drop Box Security Features: https://www.dropbox.com/business/plans-comparison
Sophos Tech Specs: https://www.sophos.com/en-us/products/cloud-optix/tech-specs.aspx
Google Cloud Security: https://cloud.google.com/products#security-and-identity
Amazon AWS Security: https://aws.amazon.com/security/
Microsoft Azure Security: https://azure.microsoft.com/en-us/overview/security/
RSA Key Size https://en.wikipedia.org/wiki/Key_size
AES Standards https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
