Report on Cloud Security Technologies and Implementation Methods

Verified

Added on  2022/07/27

|4
|516
|14
Report
AI Summary
This report addresses cloud security technologies, focusing on virtualization, encryption, and data security within a cloud-based environment, specifically for Drotos Engineering. It discusses the importance of security measures from both the cloud service provider and the consumer's perspective. The report highlights the use of virtualization to isolate client data, encryption using Attribute-based encryption (ABE) for data protection, and the significance of multi-factor authentication. It concludes by summarizing the application of these technologies in designing a secure cloud network environment, referencing relevant academic sources to support the analysis. The report emphasizes the practical application of these technologies to ensure data integrity, confidentiality, and availability within a cloud computing context.
Document Page
Running head: ISSUE 2 PROVISIONING DESCRIPTION
ISSUE 2 PROVISIONING DESCRIPTION
Enter the name of the Student:
Enter the name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ISSUE 2 PROVISIONING DESCRIPTION
Introduction
The paper will describe the security technologies for meeting the requirements of
security also designing for proposed environment of cloud based network. Also the
automated scanning and monitoring methods or the tools to use for cloud based environment
also list all steps for implementing tools.
Discussion
Technologies of Security:
Whenever this is came to the security in cloud-based environment, both the parties
that is cloud service provider also consumer of services must confirm that they apply the
measures of security hence as to avoid the attacks (Corbellini et al., 2018). This is the
accountability of the service provider of cloud for confirming that the infrastructure is safe
also the data and applications of client are secured. This is also the accountability of
consumer that is Drotos Engineering to confirm that the applications are log on after user has
authenticated.
There are many security technologies present in the cloud-based environment which
are as follows:
Virtualization
The virtualization is made of the virtual form of something such as the virtual network
resources, virtual operating system, virtual server and many more (Hyun et al., 2018). The
service providers of cloud are collected data from numerous clients also virtualization can
confirm that any client cannot unintentionally view data of other client.
Encryption
Document Page
2ISSUE 2 PROVISIONING DESCRIPTION
The encryption is the process of encoding any message so as the meaning is not
assumed by the layman. The decryption is reversed any encrypted message to original form
of it. Cloud service provider will use this encryption to confirm security of data and use the
Attribute-based encryption (ABE).
Data security
Cloud service provider will confirm that data is safe also this is private, preserves
integrity and available when required.
Multi-factor authentication
Cloud service provider will deliver multi-factor verification whereby users do not
simply require to deliver a password however they also required to deliver any secret pin
from the special device of hardware also it can see from the software application.
Conclusion
In the above stated report, the proper techniques of the newly proposed security
technologies are discussed and how Drotos Engineering use these to design the cloud based
network environment.
Document Page
3ISSUE 2 PROVISIONING DESCRIPTION
References
Corbellini, S., Di Francia, E., Grassini, S., Iannucci, L., Lombardo, L., & Parvis, M. (2018).
Cloud based sensor network for environmental monitoring. Measurement, 118, 354-
361.
Hyun, S., Kim, J., Kim, H., Jeong, J., Hares, S., Dunbar, L., & Farrel, A. (2018). Interface to
network security functions for cloud-based security services. IEEE Communications
Magazine, 56(1), 171-178.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]