10.0 Introduction To Cloud Security Mechanisms in Cloud Computing

Chapter10. Cloud Security Mechanisms

This chapter establishes a set of fundamental cloudsecuritymechanisms , several of which can be used to counter the security threats described in Chapter6.
10.1 Encryption :- The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data.

10.2 Hashing :- The hashing mechanism is used when a one-way, non-reversible form of data protection is required.
10.3 DigitalSignature :- The digital signature mechanism is a means of providing data authenticity and integrity through authentication and non_repudiation.
10.4 Public Key Infrastructure ( PKI) :- A common approach for managing the issuance of asymmetric keys is based on the public key infrastructure (PKI) mechanism, which exists as a system of protocols, dataformats, rules, and practices that enable large-scale systems to securely use public key cryptography.
10.5 Identity and Access Management ( IAM) :- The identity and access management (IAM) mechanism encompasses the components and policies necessary to control and track user identities and access privileges for IT resources, environments, and systems.
10.6 Single Sign-On ( SSO) :- The single sign-on (SSO) mechanism enables one cloud service consumer to be authenticated by a securitybroker, which establishes a security context that is persisted while the cloud service consumer accesses other cloud services or cloud-based IT resources.
10.7 Cloud-Based Security Groups :- Cloud resource segmentation is a process by which separate physical and virtual IT environments are created for different users and groups.
10.8 Hardened Virtual Server Images :- A hardened virtual server image is a template for virtual service instance creation that has been subjected to a hardening process

Cloud computing concept Book Link
CLOUDCOMPUTING THEORY PLAYLIST
CLOUD COMPUTING PRACTICAL PLAYLIST
Subscribe the Channel Link
IF any Query or Doubt DM on Instagram :- bansode_ajay_2102
bansode_tech_solution

Comments

Popular posts from this blog

Load Data From Excel To Grid View in Asp.net C#

Advance Web Programming | TYIT | Mumbai University | Practical 1A | Product of 4 Value

10.5. Identity and Access Management (IAM) in Cloud Computing