This report focuses on cloud computing security with VPN, discussing the security issues faced by cloud computing and strategies for mitigating these issues using VPN.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cloud Computing Security with VPN Name of the Student Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract: This report has focused on the cloudcomputingwithVPN.Cloud computing gas been an important part for businessorganizationintherecent market. However, security has been an importantprobleminthecloud computing. Various breaches have been occurred in cloud computing. VPN has beenhelpinginencryptingdatainto packets that provide proper security to data transfer. Keywords: Cloud Computing and VPN I. Introduction Cloud computing has been gaining a lot of interest and competition in the market. The service delivery model of cloud computing has been helping a lot of companies and users in the market. These advances in cloud computing has been helping in maintaining a keenapproachinthedevelopmentof services with users. There have been several benefitsofcloudcomputingalongwith somelimitations.Securityofdataand information has been the major issue in the cloud computing. This report has focused on security issues faced by cloud computing andstrategiesformitigationtheseissues including use of VPN. II. Securities issues for cloud computing Cloud computing has been utilized by most of the business organization in the market. The demand of cloud computing has been increased in the market with its beneficial services provided to clients. Therefore, most of the data and information have been stored over cloud storage [1]. This create security issues and treats of data and information. The security in cloud computing has been maintainedoverseveralplatformsand networks. Data security has been the most importantissuefacedinthecloud computingservices.Hackershavebeen targeting data stored over cloud database over internet. The public cloud has been mostvulnerabletodatasecurityissue. Public cloud refersto a modelof cloud computing that can be accessed by any user over the cloud. Therefore, this model type provideleastsecuritytodataand information stored over cloud storages. III. Virtual Private Network (VPN) Virtual private network (VPN) technology has been providing a way of protection data being transferred over the internet. VPN has been a general term used in communication networkforusinganycombinationof technologies for securing a connection from cyber issues. VPN helps in transmitting data with the help of private connections [6]. Therefore, in case of pubic cloud, it helps in transferring data in a secured and private connectiontunnels.Datausedtobe encryptedinpacketandaddedwitha header.Theheadernodecontainsthe routinginformationthathelpssenderin tracking data packet. VPN uses encryption forprovidingdataconfidentiality.When connection has been established, VPN uses tunnelingmechanismforencapsulating encrypted data and information in a secure tunnel. Packets have been passed over a publicnetworksothatitbecomes unreadable without proper decryption keys [7].Thishelpinsecuringdataand information over the cloud storages.VPN has been providing information in a proper manner.Therehasbeenregularly performing message summary for ensuring data check. VPN does not provide proper uservalidation.Therefore,userhasbeen enteringdirectlyusingprivatekeyfor obtaining entry into the network [4].
Figure 1: VPN (Source: Created by Author) IV. Cloud computing with firewall and VPN Inthiscircumstance,numberof workstationsrelatedwithtwoentries (AccessPoint1,AccessPoint2)which structured two BSS. These ways related by PPP-DS1 to Router S related by PPP-DS1 to IPcloud(Web)relatedbyPPP-DS1to Firewall to Router D related by PPP-DS1 to the Server. In the past circumstance, firewall was used to neutralize any outside access to email of server the wellspring of the traffic. In this circumstance, the VPN entry would be used to allow one of the clients (PCs) from Access Point1 to get the opportunity to Emailfromtheserver AA. Thefirewall won't channel the traffic made by Access Point1inlightofthewaythattheIP packages in the entry will be exemplified inside an IP datagram [8]. All through the latestcoupleofyears,thecreamer/open appropriated processing model has expanded extendedaffirmationintheendeavor businessarrangeasanapproachtogive expedient,lowcost,additionally,versatile organizations. Figure 2: Cloud Computing with VPN (Source: Created by author) TheopennessofSaaS,PaaS,IaaS,and various other variety organizations from the cloudoffersversatilechoicesthatmeet changing business needs. The key driver for cloudchoiceistheabilitytogive "persistently on access to applications" with extendedapplicationavailabilityata tremendousscale,inaquickandsecure structure, and at a by and large lessened cost [2]. Undertaking IT owners by and large use VPNs to meet the system needs of their associationswithsecurity,executionand openness. As these undertaking owners want to pass on cloud-based game plans even moreextensively,theyenvisionan equivalent experience; in a general sense, they arescanning for enormousbusiness gradecomposeorganizationswhile interfacing with the open cloud. Regardless, variousassociationsinterfacewithopen cloudprovidersovertheInternet.Later industryinvestigatedemonstratesthat security, trustworthiness, low dormancy, and obviousexecutionarerequirementsfor undertaking business people as they build private fogs or pass on a cross breed cloud model. OptionsStorage of images of virtual machin es Privac y manag er Interim protectio n system of cloud computi ng Infrastruct ure security YesNoyes Data security Yesyesyes PrivacyYesYesNO Table 1: Properties of VPN services V. Cloud computing without VPN In this situation, the quantity of workstations associated with two passages (Access Point 1, Access Point 2) which are designed two BSS. These passages are associated by PPP- DS1 to Router S associated by PPP-DS1 to IP cloud (Internet) associated by PPP-DS1 to Router D associated by PPP-DS1 to two
Servers(ServerAA,ServerBB)which speaks to two divisions. VI. VPN Security Issue ThemotivationbehindVPNsistogain admittance to normal sources. Considering VPNs from client's perspective, they can be seen as a point to point association among PCsandservers.Anotherencryption convention for information in VPN and an administration key that in this VPN server is a confided in one [9]. In this model VPN server is a confided in one. In this technique, Customer displays his solicitation to VPN server and it appoints a key an incentive for client. Consequently, client starts scrambling informationbyutilizingthiskeyand propelledencryptionstandardAES Furthermore, by RSA encryption calculation can disentangle the coded data once more, sowecansaythistechniquehashigh security. M.C. Nicalescu has displayed IP versatile security in VPNs. At first AH, ESP analyzed the characterized conventions in IKE in IPsec-IETF engineering. In view of theseconventions,assuranceagainst forswearing of infections, sniff and the other dynamicthreatswastalkedabout.This paperbuiltupthisdiscoursetoavast extension called "Web" [3]. In which the utilization of secure burrowing as a primary defensivecomponentwastried.Takea ganderatthehandlingoverheadfrom utilizing Data Encryption Standard (DES) (for secrecy) and Message Digest (MD5) SecureHashCalculation1(SHA-1)(for validationsecurity)incombinationwith IPsec.Extendsthisinvestigationby togetherthinkingabouttheAdvanced Encryption Standard (AES). CategoryIssues Privacy issuesMisuseofcloud computing Malicious insiders Dynamic provision Security issuesAudit Trust Availability Access Table 2: Issues to cloud computing VII. Conclusion It can be concluded that cloud computing has been helping business organization in various ways. Because of the significance of data security issue, this paper has focused on investigationofvariousVPNencryption strategies. Data security has been the most importantissuefacedinthecloud computingservices.Hackershavebeen targeting data stored over cloud database overinternet.Theprinciplethoughtsof some VPN encryption strategies have been presented.Lateron,thecombinationor blendingbetweenaportionsofthese strategies can be connected to show signs of improvement execution. VIII. Future Work This report has focused on cloud computing security with the help of VPN. The future researchmightfocusonotherfactors excluding VPN security. IX. References [1]He J, Dong M, Ota K, Fan M, Wang G. NetSecCC: A scalable and fault- tolerantarchitectureforcloud computingsecurity.Peer-to-Peer Networking and Applications. 2016 Jan 1;9(1):67-81. [2]Almorsy M, Grundy J, Müller I. An analysisofthecloudcomputing securityproblem.arXivpreprint arXiv:1609.01107. 2016 Sep 5. [3]TesfamicaelAD,LiuV,FooE, Caelli W. Modeling for performance andsecuritybalancedtrading communication systems in the cloud. In2017IEEE36thInternational PerformanceComputingand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CommunicationsConference (IPCCC)2017Dec10(pp.1-7). IEEE. [4]Pallas F, Günther J, Bermbach D. Pick your choice in HBase: Security orperformance.In2016IEEE InternationalConferenceonBig Data (Big Data) 2016 Dec 5 (pp. 548-554). IEEE. [5]JimenezJM,DiazJR,LloretJ, RomeroO.MHCP:Multimedia HybridCloudComputingProtocol and Architecture for Mobile Devices. IEEE Network. 2019 Jan;33(1):106- 12. [6]SinghM,KantU,GuptaPK, SrivastavaVM.Cloud-Based PredictiveIntelligenceandIts SecurityModel.InPredictive Intelligence Using Big Data and the Internet of Things 2019 (pp. 128- 143). IGI Global. [7]JyothiKK,ReddyBI.Studyon VirtualPrivateNetwork(VPN), VPN’s Protocols And Security. [8]MasalaGL,RuiuP,GrossoE. Biometricauthenticationanddata securityincloudcomputing. InComputerandNetworkSecurity Essentials2018(pp.337-353). Springer, Cham. [9]HuG,YangY,LiL.Education TechnologyCloudPlatform FrameworkEstablishmentand Security. Journal of Computer and Communications.2016May 19;4(07):7. [10]ShankarR,DuraisamyS. DifferentServiceModelsand DeploymentModelsofCloud Computing: Challenges.