logo

Cloud Computing Security with VPN

   

Added on  2023-02-01

5 Pages1900 Words39 Views
Cloud Computing Security with VPN
Name of the Student
Name of the University
Cloud Computing Security with VPN_1
Abstract: This report has focused on the
cloud computing with VPN. Cloud
computing gas been an important part for
business organization in the recent
market. However, security has been an
important problem in the cloud
computing. Various breaches have been
occurred in cloud computing. VPN has
been helping in encrypting data into
packets that provide proper security to
data transfer.
Keywords: Cloud Computing and VPN
I. Introduction
Cloud computing has been gaining a lot of
interest and competition in the market. The
service delivery model of cloud computing
has been helping a lot of companies and
users in the market. These advances in cloud
computing has been helping in maintaining a
keen approach in the development of
services with users. There have been several
benefits of cloud computing along with
some limitations. Security of data and
information has been the major issue in the
cloud computing. This report has focused on
security issues faced by cloud computing
and strategies for mitigation these issues
including use of VPN.
II. Securities issues for cloud computing
Cloud computing has been utilized by most
of the business organization in the market.
The demand of cloud computing has been
increased in the market with its beneficial
services provided to clients. Therefore, most
of the data and information have been stored
over cloud storage [1]. This create security
issues and treats of data and information.
The security in cloud computing has been
maintained over several platforms and
networks. Data security has been the most
important issue faced in the cloud
computing services. Hackers have been
targeting data stored over cloud database
over internet. The public cloud has been
most vulnerable to data security issue.
Public cloud refers to a model of cloud
computing that can be accessed by any user
over the cloud. Therefore, this model type
provide least security to data and
information stored over cloud storages.
III. Virtual Private Network (VPN)
Virtual private network (VPN) technology
has been providing a way of protection data
being transferred over the internet. VPN has
been a general term used in communication
network for using any combination of
technologies for securing a connection from
cyber issues. VPN helps in transmitting data
with the help of private connections [6].
Therefore, in case of pubic cloud, it helps in
transferring data in a secured and private
connection tunnels. Data used to be
encrypted in packet and added with a
header. The header node contains the
routing information that helps sender in
tracking data packet. VPN uses encryption
for providing data confidentiality. When
connection has been established, VPN uses
tunneling mechanism for encapsulating
encrypted data and information in a secure
tunnel. Packets have been passed over a
public network so that it becomes
unreadable without proper decryption keys
[7]. This help in securing data and
information over the cloud storages. VPN
has been providing information in a proper
manner. There has been regularly
performing message summary for ensuring
data check. VPN does not provide proper
user validation. Therefore, user has been
entering directly using private key for
obtaining entry into the network [4].
Cloud Computing Security with VPN_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Applications and Significance
|8
|1128
|307

VPN Security Issues - CSC332 - Case Study
|8
|3117
|62

Assignment on Virtual Private Network
|9
|2285
|38

Computer and Network Security | CN6107
|14
|4340
|48

Cloud Computing Security with VPN
|7
|569
|42

Security in Cryptography | Assignment
|7
|1502
|13