Network Security Framework, Techniques, and Design for Hybrid Cloud

Authors

  • Sandesh Achar Director of Cloud Engineering, Workday Inc., Pleasanton, California, USA

DOI:

https://doi.org/10.18034/ei.v9i2.642

Keywords:

Cloud, Security Framework, Hybrid Cloud, Network Security

Abstract

Network security is a framework that deals with issuing procedures and policies that will be used to establish and maintain security protocols in a particular organization. The functions related to the network security framework are oriented toward insulating the specific organization from external cyber threats and adversaries. On the other hand, a hybrid cloud is a type of cloud whose function is to allow the running and operating of different applications in various and different environments. The primary technique associated with developing hybrid clouds is the conjunctions between private and public clouds that will allow application portability and management for better and more efficient working of the clouds.

 

Downloads

Download data is not yet available.

References

Abimbola, S., Keelan, S., Everett, M., Casburn, K., Mitchell, M., Burchfield, K., & Martiniuk, A. (2019). The medium, the message, and the measure: A theory-driven review on the value of telehealth as a patient-facing digital health innovation. Health Economics Review, 9(1).

Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79-88. https://doi.org/10.18034/ei.v4i2.633

Achar, S. (2018). Security of Accounting Data in Cloud Computing: A Conceptual Review. Asian Accounting and Auditing Advancement, 9(1), 60–72. https://4ajournal.com/article/view/70

Achar, S. (2020). Cloud and HPC Headway for Next-Generation Management of Projects and Technologies. Asian Business Review, 10(3), 187-192. https://doi.org/10.18034/abr.v10i3.637

Achar, S., & Tisuela, N. L. (2020). A Review of Hosting Enterprise SaaS with IaC on Multi-cloud Platforms. International Journal of Reciprocal Symmetry and Physical Sciences, 7, 14–23. Retrieved from https://upright.pub/index.php/ijrsps/article/view/72

Achmadi, D., Suryanto, Y., Ramli, K. (2018). On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center. 2018 International Workshop on Big Data and Information Security (IWBIS), 149-157, https://doi.org/10.1109/IWBIS.2018.8471700

Adeniyi, E. A., Ogundokun, R. O., Awotunde, J. B. (2021). IoMT-Based Wearable Body Sensors Network Healthcare Monitoring System. In: IoT in Healthcare and Ambient Assisted Living. Studies in Computational Intelligence, vol 933. 103-121. https://doi.org/10.1007/978-981-15-9897-5_6

Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. (2017). Alert Management and Anomaly Prevention Techniques. In: Network Traffic Anomaly Detection and Prevention. Computer Communications and Networks. https://doi.org/10.1007/978-3-319-65188-0_5

Bruneliere, H., Al-Shara, Z., Alvares, F., Lejeune, J. and Ledoux, T. (2018). A Model-based Architecture for Autonomic and Heterogeneous Cloud Systems. In Proceedings of the 8th International Conference on Cloud Computing and Services Science - CLOSER, 201-212. https://dx.doi.org/10.5220/0006773002010212

Diamantopoulou, V., Tsohou, A., Karyda, M. (2019). General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of Activities towards Organisations’ Compliance. Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, vol 11711. Springer. https://doi.org/10.1007/978-3-030-27813-7_7

Manavalan, M., & Ganapathy, A. (2014). Reinforcement Learning in Robotics. Engineering International, 2(2), 113-124. https://doi.org/10.18034/ei.v2i2.572

Paasivaara, M., Behm, B., Lassenius, C. and Hallikainen, M. (2014). Towards Rapid Releases in Large-Scale XaaS Development at Ericsson: A Case Study. 2014 IEEE 9th International Conference on Global Software Engineering, 16-25. https://doi.org/10.1109/ICGSE.2014.22

Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Sensing as a service model for smart cities supported by internet of things. Transactions on emerging telecommunications technologies, 25(1), 81-93. https://arxiv.org/abs/1307.8198

Rodrigues, J. J. P. C. et al. (2018). Enabling Technologies for the Internet of Health Things. IEEE Access, 6, 13129-13141. https://doi.org/10.1109/ACCESS.2017.2789329

Usak, M., Kubiatko, M., Shabbir, M. S., Viktorovna Dudnik, O., Jermsittiparsert, K., Rajabion, L. (2020). Health care service delivery based on the Internet of things: A systematic and comprehensive study. Int J Commun Syst., 33(2). https://doi.org/10.1002/dac.4179

--0--

Downloads

Published

2021-12-31

Issue

Section

Peer Reviewed Articles

How to Cite

Network Security Framework, Techniques, and Design for Hybrid Cloud. (2021). Engineering International, 9(2), 141-152. https://doi.org/10.18034/ei.v9i2.642

Similar Articles

1-10 of 45

You may also start an advanced similarity search for this article.