This presentation discusses the significance of data security in cloud computing and explores the use of Virtual Private Network (VPN) technology for protecting data transfer. It examines various VPN encryption strategies and their role in ensuring data security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cloud Computing Security with VPN
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction Cloud computing has been gaining a lot of interest and competition in the market. The service delivery model of cloud computing has been helping a lot of companies and users in the market.
Securities issues for cloud computing Data security has been the most important issue faced in the cloud computing services. Hackers have been targeting data stored over cloud database over internet.
Virtual Private Network (VPN) Virtual private network (VPN) technology has been providing a way of protection data being transferred over the internet. VPN helps in transmitting data with the help of private connections
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
VPN Security Issue encryption convention for information in VPN and an administration key that in this model VPN server is a confided in one [9]. n this technique, Customer displays his solicitation to VPN server and it appoints a key an incentive for client. Consequently, client starts scrambling information by utilizing this key and propelled encryption standard AES.
Conclusion It can be concluded that cloud computing has been helping business organization in various ways. Because of the significance of data security issue, this paper has focused on investigation of various VPN encryption strategies.
References He J, Dong M, Ota K, Fan M, Wang G. NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. Peer- to-Peer Networking and Applications. 2016 Jan 1;9(1):67-81. Almorsy M, Grundy J, Müller I. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. 2016 Sep 5. Tesfamicael AD, Liu V, Foo E, Caelli W. Modeling for performance and security balanced trading communication systems in the cloud. In2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) 2017 Dec 10 (pp. 1- 7). IEEE. Pallas F, Günther J, Bermbach D. Pick your choice in HBase: Security or performance. In2016 IEEE International Conference on Big Data (Big Data) 2016 Dec 5 (pp. 548-554). IEEE. Jimenez JM, Diaz JR, Lloret J, Romero O. MHCP: Multimedia Hybrid Cloud Computing Protocol and Architecture for Mobile Devices. IEEE Network. 2019 Jan;33(1):106-12. Singh M, Kant U, Gupta PK, Srivastava VM. Cloud-Based Predictive Intelligence and Its Security Model. InPredictive Intelligence Using Big Data and the Internet of Things 2019 (pp. 128-143). IGI Global. Jyothi KK, Reddy BI. Study on Virtual Private Network (VPN), VPN’s Protocols And Security. Masala GL, Ruiu P, Grosso E. Biometric authentication and data security in cloud computing. InComputer and Network Security Essentials 2018 (pp. 337-353). Springer, Cham. Hu G, Yang Y, Li L. Education Technology Cloud Platform Framework Establishment and Security. Journal of Computer and Communications. 2016 May 19;4(07):7. Shankar R, Duraisamy S. Different Service Models and Deployment Models of Cloud Computing: Challenges.