CHAPTER 5APPLICATION SAFETY AND SERVICE VULNERABILITY IN CLOUD NETWORK
SUDIPTA SAHANA1, DEBABRATA SARDDAR2
1Department of CSE, JIS College of Engineering, Kalyani, Nadia, West Bengal, India
2Department of CSE, University of Kalyani, Nadia, West Bengal, India
Email: ss.jisce@gmail.com
Abstract
Cloud computing gives an in-manufactured stage to clients with simple and upon-request access to various framework level administrations for making virtual machines (VM) with productive use of equipment, computing and system assets. This enables clients to remotely execute a vast number of utilizations crosswise over different areas; for example, human services, utility administrations, e-administration, and so forth. Cloud computing is a standout amongst the present generally engaging innovation zones because of its cost-effectiveness and adaptability. Be that as it may, in spite of noteworthy interests, sending cloud computing in an undertaking framework presents critical security concerns. Effective usage of cloud computing in an endeavor requires legitimate arranging and comprehension of developing risks, threats, vulnerabilities, and conceivable countermeasures. This chapter examines security concerns of the three cloud computing models, specifically, software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It likewise examines cloud-based security tools, cloud data encryption, homomorphic encryption and access control (identity access for ...
Get Security Designs for the Cloud, IoT, and Social Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.