CHAPTER 5APPLICATION SAFETY AND SERVICE VULNERABILITY IN CLOUD NETWORK

SUDIPTA SAHANA1, DEBABRATA SARDDAR2

1Department of CSE, JIS College of Engineering, Kalyani, Nadia, West Bengal, India

2Department of CSE, University of Kalyani, Nadia, West Bengal, India

Abstract

Cloud computing gives an in-manufactured stage to clients with simple and upon-request access to various framework level administrations for making virtual machines (VM) with productive use of equipment, computing and system assets. This enables clients to remotely execute a vast number of utilizations crosswise over different areas; for example, human services, utility administrations, e-administration, and so forth. Cloud computing is a standout amongst the present generally engaging innovation zones because of its cost-effectiveness and adaptability. Be that as it may, in spite of noteworthy interests, sending cloud computing in an undertaking framework presents critical security concerns. Effective usage of cloud computing in an endeavor requires legitimate arranging and comprehension of developing risks, threats, vulnerabilities, and conceivable countermeasures. This chapter examines security concerns of the three cloud computing models, specifically, software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It likewise examines cloud-based security tools, cloud data encryption, homomorphic encryption and access control (identity access for ...

Get Security Designs for the Cloud, IoT, and Social Networking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.