Cloud Computing is buzzword in market now days. It has been developed to reduce the overall expenses as it provides the on demand services at any time on pay-per-use pattern. Internet is the medium for deploying cloud computing services for users to access the required application and services .It allows the users to access the services which are actually not reside in their own data centers. It provides an efficient and very flexible way for the services, applications to meet business needs. Its infrastructure consist three layers-IAAS, PAAS and SAAS. Cloud computing deploy its services through:-Private, Public and Hybrid Cloud. As the Cloud Computing is still on its initial stage of development and can say in its growing phase, so it suffers from various threats, attacks and vulnerabilities that sometime prevent the user, customers from trusting on it. User's sensitive data resides on Cloud, but due to its lack of security control the confidential data of the clients are comes under the risk of malicious activities or the unauthorized access from illegal users. So it needs an efficient method for ensuring security. In this paper it is recommend to use of Firewalls and VPN_Firewall (virtual private network) in cloud networks for its security. There is a performance evaluation of OSPF, IGRP and EIGRP protocols under two scenarios-with Firewall, and VPN_Firewall.
KeywordsFirewall, VPN, EIGRP, OSPF, IGRP, Cloud Computing.
1.INTRODUCTIONThe traditional Computing uses hardware, software and storage resources to getting the desired computational services whereas Cloud Computing has separating the number of applications, services from the underlined hardware and from resources ( Networks, Servers, Storage ) users, customers are no longer bother to purchase the Hardware, Software, Storages. They have to pay on the consumption basis only [1]. Architecture of Cloud Computing includes -Infrastructure as a service which provides the virtual infrastructure for users to deploy their services. Platform as a service provides the platforms or environments for deploying the application and services and with Software as a service you can access the software online on your desktops without any installation. Before starting the journey to cloud the customers, organizations must keep in mind the various attacks, threats and vulnerabilities which can intrude their confidential data [11]. Cloud Computing Technology is not trustworthy as it can easily effect by the threats and attacks, the data can be loss and misused by unauthorized access. In order to create awareness and to protect the users of cloud from malicious activities there must be an powerful and trustworthy security policies, measures or techniques which can protect or secure the user's data on Cloud. In this paper Firewall and Virtual Private Networks are discussed for the purpose of Security in Cloud Computing. This paper uses three services Database, Remote login and FTP. This paper evaluates the performance of dynamic routing protocols using Firewall, VPN_firew...