Enhanced Data Security Architecture in Enterprise Networks

被引:0
|
作者
Shree, V. Rashmi [1 ]
Antony, Zachariah C. F. [1 ]
Jayapandian, N. [1 ]
机构
[1] CHRIST Deemed Univ, Dept Comp Sci & Engn, Bangalore, Karnataka, India
关键词
Cloud computing; Data security; Enterprise network; Encryption; Data cleaning; Distributed computing; Hadoop file system; Noisy data;
D O I
10.1007/978-3-030-24643-3_100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption and storing important information is one of the risky and most challenging tasks. It is the need of the hour in today's fast growing technological transformations that the world is undergoing. A simple Enterprise network is the communication backbone of any organization. It mostly provides better information storage and efficient retrieval, which helps the organization to function smoothly, without having to think twice about their crucial data's security aspects. The information technology paradigm, cloud computing is used to help the organization to focus on its core business. In cloud computing is dealing with many services. That service is used for provide Platform service with infrastructure and software service. This paper, promotes the idea of combining various security and encryption algorithms to connect different enterprise networks using cloud computing, security layer concepts and giving no room for hackers to intrude into the confidential system of data.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 50 条
  • [1] A Security Enhanced Network Architecture for Future Networks
    Ren, Jing
    Wang, Sheng
    Zhao, Yangming
    Xu, Shizhong
    Li, Lemin
    [J]. PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 199 - 202
  • [2] Hybrid Security Architecture for Data Center Networks
    Lam, Ho-Yu
    Zhao, Song
    Xi, Kang
    Chao, H. Jonathan
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [3] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 153 - 158
  • [4] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    [J]. Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 153 - 158
  • [5] A roadmap to the enterprise security architecture
    Kim, Young-Gab
    Kang, Seung-Seok
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 47 - 48
  • [6] A Virtual Cloud Storage Architecture for Enhanced Data Security
    Kumar, M. Antony Joans
    Columbus, C. Christopher
    Ben George, E.
    Raj, T. Ajith Bosco
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1735 - 1747
  • [7] Security Audit of Data Flows across Enterprise Systems and Networks
    Joukov, Nikolai
    Shorokhov, Vladislav
    Tantsuyev, Dmytro
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 240 - 247
  • [8] Effective Security Architecture for Virtualized Data Center Networks
    Chidiebele, Udeze C.
    Kennedy, Okafor C.
    Inyiama, H. C.
    Okezie, C. C.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (01) : 196 - 200
  • [9] Aviation data networks: Security issues and network architecture
    Thanthry, N
    Pendse, R
    [J]. 38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 77 - 81
  • [10] Aviation data networks: Security issues and network architecture
    Thanthry, N
    Pendse, R
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2005, 20 (06) : 3 - 8