Securing The Perimeter Shared Responsibility Models In Cloud Vs. On-Premises Environments

Main Article Content

Rajashekar Reddy Yasani
Karthik Venkatesh Ratnam

Abstract

A complex infrastructure of many interconnected devices is what makes cloud computing possible and allows it to deliver the services that customers require. The building blocks of cloud computing are several kinds of adaptable distributed systems that can be linked in various ways and utilised for various tasks. Businesses are rushing to switch to cloud networks because of all the advantages, including low costs, scalability, reliability, and flexibility. Cloud networks are vulnerable to many network attacks and privacy problems, despite the fact that cloud computing's primary benefits are encouraging facts. The features of cloud computing, such as multi-tenancy and third-party managed infrastructure, necessitate an identity and access management system. The problem of ensuring secure access to cloud resources has been taken up by numerous experts in both academia and industry. Authentication, access control, security, and cloud services are all covered thoroughly in this essay, along with their respective issues and solutions. Focussing on cloud services, security concerns, and identity and access managemen, this study compares and contrasts current approaches from the viewpoints of cloud service providers and cloud consumers.

Downloads

Download data is not yet available.

Article Details

How to Cite
Rajashekar Reddy Yasani, & Karthik Venkatesh Ratnam. (2019). Securing The Perimeter Shared Responsibility Models In Cloud Vs. On-Premises Environments. Educational Administration: Theory and Practice, 25(4), 782–789. https://doi.org/10.53555/kuey.v25i4.7975
Section
Articles
Author Biographies

Rajashekar Reddy Yasani

Senior Security Engineer Independent Security Researcher Boston, MA Cloud Security, Cloud Computing, Cyber Security 

Karthik Venkatesh Ratnam

Cloud Engineer, Devsecops ( cloud security) Independent Security Researcher Dallas,TX 

Similar Articles

You may also start an advanced similarity search for this article.