Network Security Framework, Techniques, and Design for Hybrid Cloud
DOI:
https://doi.org/10.18034/ei.v9i2.642Keywords:
Cloud, Security Framework, Hybrid Cloud, Network SecurityAbstract
Network security is a framework that deals with issuing procedures and policies that will be used to establish and maintain security protocols in a particular organization. The functions related to the network security framework are oriented toward insulating the specific organization from external cyber threats and adversaries. On the other hand, a hybrid cloud is a type of cloud whose function is to allow the running and operating of different applications in various and different environments. The primary technique associated with developing hybrid clouds is the conjunctions between private and public clouds that will allow application portability and management for better and more efficient working of the clouds.
Downloads
References
Abimbola, S., Keelan, S., Everett, M., Casburn, K., Mitchell, M., Burchfield, K., & Martiniuk, A. (2019). The medium, the message, and the measure: A theory-driven review on the value of telehealth as a patient-facing digital health innovation. Health Economics Review, 9(1).
Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79-88. https://doi.org/10.18034/ei.v4i2.633
Achar, S. (2018). Security of Accounting Data in Cloud Computing: A Conceptual Review. Asian Accounting and Auditing Advancement, 9(1), 60–72. https://4ajournal.com/article/view/70
Achar, S. (2020). Cloud and HPC Headway for Next-Generation Management of Projects and Technologies. Asian Business Review, 10(3), 187-192. https://doi.org/10.18034/abr.v10i3.637
Achar, S., & Tisuela, N. L. (2020). A Review of Hosting Enterprise SaaS with IaC on Multi-cloud Platforms. International Journal of Reciprocal Symmetry and Physical Sciences, 7, 14–23. Retrieved from https://upright.pub/index.php/ijrsps/article/view/72
Achmadi, D., Suryanto, Y., Ramli, K. (2018). On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center. 2018 International Workshop on Big Data and Information Security (IWBIS), 149-157, https://doi.org/10.1109/IWBIS.2018.8471700
Adeniyi, E. A., Ogundokun, R. O., Awotunde, J. B. (2021). IoMT-Based Wearable Body Sensors Network Healthcare Monitoring System. In: IoT in Healthcare and Ambient Assisted Living. Studies in Computational Intelligence, vol 933. 103-121. https://doi.org/10.1007/978-981-15-9897-5_6
Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. (2017). Alert Management and Anomaly Prevention Techniques. In: Network Traffic Anomaly Detection and Prevention. Computer Communications and Networks. https://doi.org/10.1007/978-3-319-65188-0_5
Bruneliere, H., Al-Shara, Z., Alvares, F., Lejeune, J. and Ledoux, T. (2018). A Model-based Architecture for Autonomic and Heterogeneous Cloud Systems. In Proceedings of the 8th International Conference on Cloud Computing and Services Science - CLOSER, 201-212. https://dx.doi.org/10.5220/0006773002010212
Diamantopoulou, V., Tsohou, A., Karyda, M. (2019). General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of Activities towards Organisations’ Compliance. Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, vol 11711. Springer. https://doi.org/10.1007/978-3-030-27813-7_7
Manavalan, M., & Ganapathy, A. (2014). Reinforcement Learning in Robotics. Engineering International, 2(2), 113-124. https://doi.org/10.18034/ei.v2i2.572
Paasivaara, M., Behm, B., Lassenius, C. and Hallikainen, M. (2014). Towards Rapid Releases in Large-Scale XaaS Development at Ericsson: A Case Study. 2014 IEEE 9th International Conference on Global Software Engineering, 16-25. https://doi.org/10.1109/ICGSE.2014.22
Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Sensing as a service model for smart cities supported by internet of things. Transactions on emerging telecommunications technologies, 25(1), 81-93. https://arxiv.org/abs/1307.8198
Rodrigues, J. J. P. C. et al. (2018). Enabling Technologies for the Internet of Health Things. IEEE Access, 6, 13129-13141. https://doi.org/10.1109/ACCESS.2017.2789329
Usak, M., Kubiatko, M., Shabbir, M. S., Viktorovna Dudnik, O., Jermsittiparsert, K., Rajabion, L. (2020). Health care service delivery based on the Internet of things: A systematic and comprehensive study. Int J Commun Syst., 33(2). https://doi.org/10.1002/dac.4179
--0--
Downloads
Published
Issue
Section
License
Engineering International is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.