Abstract
The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud's control.
Original language | English |
---|---|
Title of host publication | Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing |
Publisher | IGI Global |
Chapter | 6 |
Pages | 143-163 |
Number of pages | 21 |
ISBN (Print) | 9781466628540 |
DOIs | |
Publication status | Published - 1 Dec 2013 |
Externally published | Yes |