Damilola Yusuph
0817125
University of Bedfordshire
Department Of Computer Science and Technology.
Luton, United Kingdom
Damilola.yusuph@study.beds.ac.uk
I.
INTRODUCTION
SECURTITY THREATS
3.
3.
4.
5.
C. Communication Threats
It is paramount to secure all network communication between
virtual machines and distribution of virtual infrastructures as it
can potentially be exposed to malicious users and network
traffic. Due to the integration and combined access to physical
and virtual network infrastructure, new attacks arise and will
need to be handled. One significant challenge is to define rules
that manage the cloud networking access to the physical
infrastructure, network properties and also enforcing these
rules will prove difficult due to the complexities of these
environments.
In addition, policy based control should be distributed to
virtual infrastructures moving within the virtual environment.
3.
4.
5.
CONCLUSION
Cloud networking surpasses traditional networks to redefine
scalability of resources, management processes and
administration. It promises to provide a flexible network
infrastructure, guaranteed delivery, reduced latency, selfhealing resilience and extensible management. Although the
benefits associated with cloud networking are numerous, it
still struggles in gaining recognition for its merits due to the
security deficiencies that exists. Organizations will not only
need to have an accurate understanding of cloud computing
and cloud networking security risks but also understand the
applicable rules, practices, laws and regulations governing the
cloud environment to ensure that they choose a suitable cloud
service provider in order to effectively safeguard security of
customers information.
The cloud environment abounds with sensitive information
therefore cloud service providers and organizations both have
a role to play in the security responsibilities in cloud
networking as responsibility for the delivery of security
service cannot be entirely outsourced to the cloud provider
alone. As cloud networking becomes more complex, dynamic
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]