Comprehensive Report: Cloud Security Technologies and Implementation

Verified

Added on  2022/12/23

|4
|516
|1
Report
AI Summary
This report addresses cloud security technologies and their application within a cloud-based network environment, specifically for Drotos Engineering. It begins by outlining the importance of security in cloud environments, emphasizing the shared responsibility between service providers and consumers. The report then details various security technologies, including virtualization to isolate client data, encryption to protect data confidentiality using Attribute-based encryption, and multi-factor authentication to enhance user verification. The report also emphasizes the importance of data security, ensuring data privacy, integrity, and availability. It provides a comprehensive overview of these technologies and their roles in designing and implementing a secure cloud network environment. The report concludes by summarizing the discussed technologies and their relevance to the proposed cloud environment, providing insights into how Drotos Engineering can leverage these technologies to enhance its cloud security posture. The report also includes references to related research papers.
Document Page
Running head: ISSUE 2 PROVISIONING DESCRIPTION
ISSUE 2 PROVISIONING DESCRIPTION
Enter the name of the Student:
Enter the name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ISSUE 2 PROVISIONING DESCRIPTION
Introduction
The paper will describe the security technologies for meeting the requirements of
security also designing for proposed environment of cloud based network. Also the
automated scanning and monitoring methods or the tools to use for cloud based environment
also list all steps for implementing tools.
Discussion
Technologies of Security:
Whenever this is came to the security in cloud-based environment, both the parties
that is cloud service provider also consumer of services must confirm that they apply the
measures of security hence as to avoid the attacks (Corbellini et al., 2018). This is the
accountability of the service provider of cloud for confirming that the infrastructure is safe
also the data and applications of client are secured. This is also the accountability of
consumer that is Drotos Engineering to confirm that the applications are log on after user has
authenticated.
There are many security technologies present in the cloud-based environment which
are as follows:
Virtualization
The virtualization is made of the virtual form of something such as the virtual network
resources, virtual operating system, virtual server and many more (Hyun et al., 2018). The
service providers of cloud are collected data from numerous clients also virtualization can
confirm that any client cannot unintentionally view data of other client.
Encryption
Document Page
2ISSUE 2 PROVISIONING DESCRIPTION
The encryption is the process of encoding any message so as the meaning is not
assumed by the layman. The decryption is reversed any encrypted message to original form
of it. Cloud service provider will use this encryption to confirm security of data and use the
Attribute-based encryption (ABE).
Data security
Cloud service provider will confirm that data is safe also this is private, preserves
integrity and available when required.
Multi-factor authentication
Cloud service provider will deliver multi-factor verification whereby users do not
simply require to deliver a password however they also required to deliver any secret pin
from the special device of hardware also it can see from the software application.
Conclusion
In the above stated report, the proper techniques of the newly proposed security
technologies are discussed and how Drotos Engineering use these to design the cloud based
network environment.
Document Page
3ISSUE 2 PROVISIONING DESCRIPTION
References
Corbellini, S., Di Francia, E., Grassini, S., Iannucci, L., Lombardo, L., & Parvis, M. (2018).
Cloud based sensor network for environmental monitoring. Measurement, 118, 354-
361.
Hyun, S., Kim, J., Kim, H., Jeong, J., Hares, S., Dunbar, L., & Farrel, A. (2018). Interface to
network security functions for cloud-based security services. IEEE Communications
Magazine, 56(1), 171-178.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]