Assignment 1 - VPN Technologies and Security Issues Report - MN610

Verified

Added on  2023/02/01

|7
|569
|42
Report
AI Summary
This report examines the crucial role of Virtual Private Networks (VPNs) in securing data within cloud computing environments. It begins by highlighting the growing interest in cloud computing and its service delivery models, emphasizing the associated data security challenges, particularly from malicious actors targeting cloud databases. The report then focuses on VPN technology as a primary solution for protecting data transmitted over the internet. It delves into the specifics of VPN security issues, including encryption conventions and the use of a trusted VPN server that assigns encryption keys. The customer then uses this key to encrypt data using advanced encryption standards such as AES. The conclusion underscores the benefits of cloud computing for businesses and the importance of data security, and the report investigates different VPN encryption strategies. The report includes multiple references to support the analysis.
Document Page
Cloud Computing Security
with VPN
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Cloud computing has been gaining a lot of interest and competition in the market.
The service delivery model of cloud computing has been helping a lot of companies
and users in the market.
Document Page
Securities issues for cloud
computing
Data security has been the most
important issue faced in the cloud
computing services.
Hackers have been targeting data
stored over cloud database over
internet.
Document Page
Virtual Private Network (VPN)
Virtual private network (VPN) technology has been providing a way of protection data
being transferred over the internet.
VPN helps in transmitting data with the help of private connections
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VPN Security Issue
encryption convention for
information in VPN and an
administration key that in
this model VPN server is a
confided in one [9].
n this technique, Customer
displays his solicitation to
VPN server and it appoints
a key an incentive for
client. Consequently, client
starts scrambling
information by utilizing this
key and propelled
encryption standard AES.
Document Page
Conclusion
It can be concluded that cloud computing has been helping business organization in
various ways. Because of the significance of data security issue, this paper has
focused on investigation of various VPN encryption strategies.
Document Page
References
He J, Dong M, Ota K, Fan M, Wang G. NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. Peer-
to-Peer Networking and Applications. 2016 Jan 1;9(1):67-81.
Almorsy M, Grundy J, Müller I. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. 2016
Sep 5.
Tesfamicael AD, Liu V, Foo E, Caelli W. Modeling for performance and security balanced trading communication systems in the
cloud. In2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) 2017 Dec 10 (pp. 1-
7). IEEE.
Pallas F, Günther J, Bermbach D. Pick your choice in HBase: Security or performance. In2016 IEEE International Conference on
Big Data (Big Data) 2016 Dec 5 (pp. 548-554). IEEE.
Jimenez JM, Diaz JR, Lloret J, Romero O. MHCP: Multimedia Hybrid Cloud Computing Protocol and Architecture for Mobile
Devices. IEEE Network. 2019 Jan;33(1):106-12.
Singh M, Kant U, Gupta PK, Srivastava VM. Cloud-Based Predictive Intelligence and Its Security Model. InPredictive
Intelligence Using Big Data and the Internet of Things 2019 (pp. 128-143). IGI Global.
Jyothi KK, Reddy BI. Study on Virtual Private Network (VPN), VPN’s Protocols And Security.
Masala GL, Ruiu P, Grosso E. Biometric authentication and data security in cloud computing. InComputer and Network
Security Essentials 2018 (pp. 337-353). Springer, Cham.
Hu G, Yang Y, Li L. Education Technology Cloud Platform Framework Establishment and Security. Journal of Computer and
Communications. 2016 May 19;4(07):7.
Shankar R, Duraisamy S. Different Service Models and Deployment Models of Cloud Computing: Challenges.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]