Lecture notes on cloud computing IV b. Tech-1 st semester prepared by


Existing Commercial Cloud Services



Download 1.49 Mb.
View original pdf
Page65/112
Date07.03.2022
Size1.49 Mb.
#58379
1   ...   61   62   63   64   65   66   67   68   ...   112
CC LECTURE NOTES
english grammar pdf 60

Existing Commercial Cloud Services

In normal network-based applications, user authentication, data confidentiality, and data integrity can be solved through IPSec proxy using encryption and digital signature. The key exchanging issues can be solved by
SSL proxy. These methods have been applied to today‘s cloud computing to secure the data on the cloud and also secure the communication of data to and from the cloud. The service providers claim that their services are secure. This section describes three secure methods used in three commercial cloud services and discusses their vulnerabilities.


Download 1.49 Mb.

Share with your friends:
1   ...   61   62   63   64   65   66   67   68   ...   112




The database is protected by copyright ©ininet.org 2024
send message

    Main page