Securing The Perimeter Shared Responsibility Models In Cloud Vs. On-Premises Environments
Main Article Content
Abstract
A complex infrastructure of many interconnected devices is what makes cloud computing possible and allows it to deliver the services that customers require. The building blocks of cloud computing are several kinds of adaptable distributed systems that can be linked in various ways and utilised for various tasks. Businesses are rushing to switch to cloud networks because of all the advantages, including low costs, scalability, reliability, and flexibility. Cloud networks are vulnerable to many network attacks and privacy problems, despite the fact that cloud computing's primary benefits are encouraging facts. The features of cloud computing, such as multi-tenancy and third-party managed infrastructure, necessitate an identity and access management system. The problem of ensuring secure access to cloud resources has been taken up by numerous experts in both academia and industry. Authentication, access control, security, and cloud services are all covered thoroughly in this essay, along with their respective issues and solutions. Focussing on cloud services, security concerns, and identity and access managemen, this study compares and contrasts current approaches from the viewpoints of cloud service providers and cloud consumers.