Securing Cloud Databases using Bastion Host and SSH Agent Forwarding

   

Added on  2023-04-22

4 Pages1202 Words138 Views
Running Head: Database Security 0
Security
Database Security
Report
Securing Cloud Databases using Bastion Host and SSH Agent Forwarding_1
Database Security 1
Securing cloud databases using bastion host and SSH agent forwarding
Asanga, . G. D. D., 2017. Public Key and Multi Factor Based Centralized SSH Authentication System for a
Cloud Based Environment Using LDAP. [Online] Available at:
documents.ucsc.lk/jspui/bitstream/123456789/4033/1/2014MIS004.pdf[Accessed 21 February 2019].
Asanga is providing a concept for securing cloud databases from different attack, which
are possible through SQL injection and capabilities of application for data access from
cloud databases. It provides SSH Authentication concept for a system through LDAP
server for securing their cloud based environment as well as database.
Bird, D. A., 2018. Information Security risk considerations for the processing of IoT sourced
data in the Public Cloud.
According to Bird, Public clouds are providing different accesses of cloud databases
though different application. Therefore, it is a risk for whole system. There should a
secure zone for authentication of the applications as well as users to access databases.
Databases are collecting data through IoT sources, such as sensors, electronic, devices,
GPS and RFID.
Blakstad, K. . M. & Andreassen, M., 2016. Security in Cloud Computing: A Security Assessment
of Cloud Computing Providers for an Online Receipt Storage. [Online]
Available at: https://brage.bibsys.no/xmlui/handle/11250/253189
[Accessed 21 February 2019].
Blasted and Andreassen are providing security concepts for cloud computing. Amazon
Web Services are providing many facilities to their vendors. In that report, three vendors
of cloud computing Microsoft Azure, Amazon Web Services and Google AppEngine is
provide security in cloud computing. It also compare virtual machine environment of
Amazon EC2 and Windows Azure.
Gapiński, A., 2014. Strategies for Computer Networks Security. Kwartalnik Nauk o
Przedsiębiorstwie, Volume 3, pp. 59-65.
Gapiński provides strategies for computer network security through creating safe zone.
Firewalls are responsible for securing the network. For approaching cloud databases
network is primary thing. Therefore, securue network from unathenticated users through
creating trusted network for securing the cloud databases.
Kareem, M., 2018. Prevention of SQL Injection Attacks using AWS WAF. [Online]
Available at: https://repository.stcloudstate.edu/msia_etds/47/
[Accessed 21 February 2019].
Kareem reports on prevention of cloud databases from SQL Injection attacks using AWS
WAF concept. AWS WAF is a Web Application Firewall that provides security to the
Securing Cloud Databases using Bastion Host and SSH Agent Forwarding_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SIT113 – Cloud Computing and Virtualisation (2020).
|4
|1023
|23

Desklib: Study Material Library with Solved Assignments & Essays
|15
|2888
|86

Cloud Computing Services Providers Assignment
|19
|2052
|68

Assignment Linux Server Administration
|5
|667
|48

Data Migration in Webb Store: Assignment
|9
|2809
|83

QAC020N254: Cloud Computing | Task Report
|33
|2741
|20