Secure Network Solutions for Enterprise Cloud Services

Secure Network Solutions for Enterprise Cloud Services

Chengcheng Huang, Philip Smith, Zhaohao Sun
ISBN13: 9781466658844|ISBN10: 1466658843|EISBN13: 9781466658851
DOI: 10.4018/978-1-4666-5884-4.ch010
Cite Chapter Cite Chapter

MLA

Huang, Chengcheng, et al. "Secure Network Solutions for Enterprise Cloud Services." Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, edited by Zhaohao Sun and John Yearwood, IGI Global, 2014, pp. 222-244. https://doi.org/10.4018/978-1-4666-5884-4.ch010

APA

Huang, C., Smith, P., & Sun, Z. (2014). Secure Network Solutions for Enterprise Cloud Services. In Z. Sun & J. Yearwood (Eds.), Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications (pp. 222-244). IGI Global. https://doi.org/10.4018/978-1-4666-5884-4.ch010

Chicago

Huang, Chengcheng, Philip Smith, and Zhaohao Sun. "Secure Network Solutions for Enterprise Cloud Services." In Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, edited by Zhaohao Sun and John Yearwood, 222-244. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5884-4.ch010

Export Reference

Mendeley
Favorite

Abstract

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today's securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.