SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2110
“Cloud based Datacenter in Virtual Private Network”
Vishal Vethekar1, Akash Yadav2, Shivshankar Vighne3
Prof.KavitaJoshi4, Dept.ofElectronicsandTelecommunicationEngineering,GHRaisonicollegeofEngineering and
Management Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud based VPN(virtual Private Network) is help
to operate servers, database securely. It is available to users
over a internet network. It is used store the file and access
remote location via internet. Now days word troubling by
corona virus so in IT industry all employ are working from
home. So all employ required secure network access for
security and data loss reason. This paper describeshowsecure
connectivity to public cloud networks with VPN.
Key Words: Cloud Computing, VPN, Security.
1. INTRODUCTION
The cloud computing is latest developments of computing
models. models. Its version can be considered much
upgrading than that of distributed computing. A virtual
private network (VPN) is a private network across a public
network, and provides option users to send and obtain
information across public networks. VPN is technology to
make remote connectionswithcloudbysecureconnection.A
company requirement private network beyond its
geographic area but issuewithwhen employWork inremote
location. The requirement will increase heavily because of
the cloud flexibility and its architected. So the security of
data much important and access of data to user is also
important that time role of VPN is started. User made his
virtual private network and accesses the data. So it’s much
flexible, easy and secure.
2.1 LITERATURE SURVEY
The reason will attempt to provide secure transfer of data in
cloud. It is advance technology is the Virtual PrivateNetwork
(VPN). With VPN private and secured. Also sub networks is
constructed. This principlehavebeenwidelyappliedinwired
local-area Network. remote access networks and can be also
applied to wireless local-area network VPN usually describe
with the aid of IP security (IPSec). This can be considered as
the standard way for VPN implementation. The IPsec much
important for acceptable data confidentiality,authentication,
and access.
2.2 Elastic Compute Cloud
Elastic Compute Cloud ( EC2) provides scalable computing
capacity in the Web Services (AWS) cloud. Using EC2
eliminates your need to invest in hardware up front, so you
can develop and deploy applications faster. You can use EC2
to launch as many or as few virtual servers as you need,
configure securityand networking,and manage storage.EC2
enables you to scale up or down to handle changes in
requirements or spikes in popularity, reducing your need to
forecast traffic.
2.3 Amazon EC2 provides the following features:
 Virtual computing environments, known as
instances
 Preconfigured templates for your instances, known
as MachineImages (AMIs), that package thebitsyou
need for yourserver(includingtheoperatingsystem
and additional software)
 Various configurationsofCPU,memory,storage,and
networking capacity for your instances, known as
instance types Secure login information for your
instances using key pairs (stores the publickey,and
you store the private key in a secure place)
 Storage volumes for temporary data that's deleted
when you stop or terminateyourinstance,knownas
instance store volumes
 Persistent storage volumes for your data using
Elastic Block Store ( EBS), known as Amazon EBS
volumes
 Multiple physical locations for your resources, such
as instances and Amazon EBS volumes, known as
Regions and Availability Zones
 A firewall that enables you to specify the protocols,
ports, and source IP ranges that can reach your
instances using security groups.
3. System Development.
Fig.1 Block Diagram.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2111
3.1 Identity and Access Management
AWS Identity and Access Management(IAM)isa webservice
that helps you securely control access toAWSresources.You
use IAM to control who is authenticated (signed in) and
authorized (has permissions) to use resources. When you
first create an AWS account, you begin with a single sign-in
identity that has complete access to all AWS services and
resources in the account. This identity is called the AWS
account root user and is accessed by signing in with the
email address and password that you used to create the
account. We strongly recommend that you do not use the
root user for your everyday tasks, even the administrative
ones. Instead, adhere to the best practice of using the root
user only to create your first IAM user. Then securely lock
away the root user credentials and use themtoperformonly
a few account and service management tasks.
3.2 Working Block diagram
Fig.2 Working Block diagram
3.3 Advantages of Cloud computing.
1) Cloud technology is saving organizations money.
2) It is much flexible means you can use as per yourdemand.
3) It is able to access data at remote location.
4) No longer do IT personnel need to worry
About keeping software up to date.
4. CONCLUSION
The theme of working is user login in cloud by
authentication by VPN with his/herusernameandpassword
and access EC2 machine and its database.it is secure login
and secure network for working also view data security.
Admin can able to change authentication optionandprovide
access.
REFERENCES
 Cloud Computing Security with VPN M. Judith
Bellar.
 Firewall and VPN Investigation on CloudComputing
Performance Siddeeq Y. Ameen1, Shayma Wail
Nourildean2.
 Study on Virtual Private Network (VPN), VPN’s
Protocols And SecurityK. Karuna Jyothi*, Dr. B.
Indira Reddy.
 “CLOUD COMPUTING-INFRASTRUCTURE AS
SERVICEAMAZONEC2”Gurudatt Kulkarni1,Ramesh
Sutar 2 Jayant Gambhir 3
 Firewall and VPN InvestigationonCloudComputing
Performance by iddeeq Yousif Ameen on 29 July
2015.
 VPN research (Term Paper)Saugat Bhattarai on 03
January 2016.
 www.dslreports.com/faq/5313
 whatismyipaddress.com/vpn-
comparison?gclid=CI7S-e2bir8CFQ0ojgod94UAlQ
 www.computer.howstuffworks.com/vpn.htm
 www.plathome.com/support/packetix/manual/10-
1.htm
 www.netforbeginners.about.com/od/readerpicks/t
p/The-Best-VPN-Service-Providers.htm
 www.pcworld.com/article/2030763/how-and-
why-to-set-up-a-vpn-today.html
 www.webopedia.com/TERM/V/VPN.html
 www,computer.howstuffworks.com/vpn.htm
 www,searchenterprisewan.techtarget.com/definitio
n/virtual-private-network
 en.wikipedia.org/wiki/Virtual_private_network
 Maneesha Sharma, Himani Bansal, Amit Kumar
Sharma, “Cloud Computing: Different Approach
&Security Challenge”, International Journal of Soft
Computing and Engineering (IJSCE) ISSN: 2231-
2307, Volume-2, Issue-1, pp. 421-424, March 2012.

More Related Content

PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
G033030035
PDF
PDF
Advance security in cloud computing for military weapons
PDF
IRJET- Improving Data Storage Security and Performance in Cloud Environment
PDF
Sensor Cloud
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
G033030035
Advance security in cloud computing for military weapons
IRJET- Improving Data Storage Security and Performance in Cloud Environment
Sensor Cloud

What's hot (18)

PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
PDF
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
PDF
Security and Privacy Enhancing Multicloud Architecture
PDF
A Study of SAAS Model for Security System
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Ijarcet vol-2-issue-7-2232-2235
PDF
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
PDF
SecRBAC: Secure data in the Clouds
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
50120140504005
PDF
The Security and Privacy Threats to Cloud Computing
PDF
Security Issues’ in Cloud Computing and its Solutions.
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
Protecting Dynamic Datacenters From the Latest Threats
PDF
Ijarcet vol-2-issue-4-1405-1409
PPT
PPTX
Data storage security in cloud computing
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Security and Privacy Enhancing Multicloud Architecture
A Study of SAAS Model for Security System
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Ijarcet vol-2-issue-7-2232-2235
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
SecRBAC: Secure data in the Clouds
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
50120140504005
The Security and Privacy Threats to Cloud Computing
Security Issues’ in Cloud Computing and its Solutions.
Fog computing a new concept to minimize the attacks and to provide security i...
Protecting Dynamic Datacenters From the Latest Threats
Ijarcet vol-2-issue-4-1405-1409
Data storage security in cloud computing
Ad

Similar to IRJET - Cloud based Datacenter in Virtual Private Network (20)

PPTX
Public Cloud Security DIY @ IGT 2013
PPTX
PPTX
Cloud computing and Cloud security fundamentals
PPTX
Aws principle services: IAM,VPC, EC2, Cloudwatch
PDF
Aws Architecture Fundamentals
PDF
AWS Summit Berlin 2013 - Keynote Steve Schmidt
PDF
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
PDF
AWS Architecture Fundamentals - Houston
PDF
AWS Virtual Private Cloud
PDF
Firewall and vpn investigation on cloud computing performance
PPTX
BSC IT cloud subject ppt from Centurion University
PDF
Cloud On-Ramp Project Briefing
PDF
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
PDF
IRJET- A Survey of Working on Virtual Private Networks
PPTX
Amazon Virtual Private Cloud (VPC)
PPTX
Introduction to AWS VPC, Guidelines, and Best Practices
PDF
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
PPTX
AWS Security Architecture - Overview
PPTX
Hack proof your aws cloud cloudcheckr_040416
Public Cloud Security DIY @ IGT 2013
Cloud computing and Cloud security fundamentals
Aws principle services: IAM,VPC, EC2, Cloudwatch
Aws Architecture Fundamentals
AWS Summit Berlin 2013 - Keynote Steve Schmidt
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
AWS Architecture Fundamentals - Houston
AWS Virtual Private Cloud
Firewall and vpn investigation on cloud computing performance
BSC IT cloud subject ppt from Centurion University
Cloud On-Ramp Project Briefing
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
IRJET- A Survey of Working on Virtual Private Networks
Amazon Virtual Private Cloud (VPC)
Introduction to AWS VPC, Guidelines, and Best Practices
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
AWS Security Architecture - Overview
Hack proof your aws cloud cloudcheckr_040416
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Artificial Intelligence
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Project quality management in manufacturing
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
web development for engineering and engineering
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
PPT on Performance Review to get promotions
PPTX
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
additive manufacturing of ss316l using mig welding
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
OOP with Java - Java Introduction (Basics)
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Artificial Intelligence
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Project quality management in manufacturing
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
R24 SURVEYING LAB MANUAL for civil enggi
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
web development for engineering and engineering
III.4.1.2_The_Space_Environment.p pdffdf
PPT on Performance Review to get promotions
Internet of Things (IOT) - A guide to understanding

IRJET - Cloud based Datacenter in Virtual Private Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2110 “Cloud based Datacenter in Virtual Private Network” Vishal Vethekar1, Akash Yadav2, Shivshankar Vighne3 Prof.KavitaJoshi4, Dept.ofElectronicsandTelecommunicationEngineering,GHRaisonicollegeofEngineering and Management Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud based VPN(virtual Private Network) is help to operate servers, database securely. It is available to users over a internet network. It is used store the file and access remote location via internet. Now days word troubling by corona virus so in IT industry all employ are working from home. So all employ required secure network access for security and data loss reason. This paper describeshowsecure connectivity to public cloud networks with VPN. Key Words: Cloud Computing, VPN, Security. 1. INTRODUCTION The cloud computing is latest developments of computing models. models. Its version can be considered much upgrading than that of distributed computing. A virtual private network (VPN) is a private network across a public network, and provides option users to send and obtain information across public networks. VPN is technology to make remote connectionswithcloudbysecureconnection.A company requirement private network beyond its geographic area but issuewithwhen employWork inremote location. The requirement will increase heavily because of the cloud flexibility and its architected. So the security of data much important and access of data to user is also important that time role of VPN is started. User made his virtual private network and accesses the data. So it’s much flexible, easy and secure. 2.1 LITERATURE SURVEY The reason will attempt to provide secure transfer of data in cloud. It is advance technology is the Virtual PrivateNetwork (VPN). With VPN private and secured. Also sub networks is constructed. This principlehavebeenwidelyappliedinwired local-area Network. remote access networks and can be also applied to wireless local-area network VPN usually describe with the aid of IP security (IPSec). This can be considered as the standard way for VPN implementation. The IPsec much important for acceptable data confidentiality,authentication, and access. 2.2 Elastic Compute Cloud Elastic Compute Cloud ( EC2) provides scalable computing capacity in the Web Services (AWS) cloud. Using EC2 eliminates your need to invest in hardware up front, so you can develop and deploy applications faster. You can use EC2 to launch as many or as few virtual servers as you need, configure securityand networking,and manage storage.EC2 enables you to scale up or down to handle changes in requirements or spikes in popularity, reducing your need to forecast traffic. 2.3 Amazon EC2 provides the following features:  Virtual computing environments, known as instances  Preconfigured templates for your instances, known as MachineImages (AMIs), that package thebitsyou need for yourserver(includingtheoperatingsystem and additional software)  Various configurationsofCPU,memory,storage,and networking capacity for your instances, known as instance types Secure login information for your instances using key pairs (stores the publickey,and you store the private key in a secure place)  Storage volumes for temporary data that's deleted when you stop or terminateyourinstance,knownas instance store volumes  Persistent storage volumes for your data using Elastic Block Store ( EBS), known as Amazon EBS volumes  Multiple physical locations for your resources, such as instances and Amazon EBS volumes, known as Regions and Availability Zones  A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups. 3. System Development. Fig.1 Block Diagram.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2111 3.1 Identity and Access Management AWS Identity and Access Management(IAM)isa webservice that helps you securely control access toAWSresources.You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources. When you first create an AWS account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account. We strongly recommend that you do not use the root user for your everyday tasks, even the administrative ones. Instead, adhere to the best practice of using the root user only to create your first IAM user. Then securely lock away the root user credentials and use themtoperformonly a few account and service management tasks. 3.2 Working Block diagram Fig.2 Working Block diagram 3.3 Advantages of Cloud computing. 1) Cloud technology is saving organizations money. 2) It is much flexible means you can use as per yourdemand. 3) It is able to access data at remote location. 4) No longer do IT personnel need to worry About keeping software up to date. 4. CONCLUSION The theme of working is user login in cloud by authentication by VPN with his/herusernameandpassword and access EC2 machine and its database.it is secure login and secure network for working also view data security. Admin can able to change authentication optionandprovide access. REFERENCES  Cloud Computing Security with VPN M. Judith Bellar.  Firewall and VPN Investigation on CloudComputing Performance Siddeeq Y. Ameen1, Shayma Wail Nourildean2.  Study on Virtual Private Network (VPN), VPN’s Protocols And SecurityK. Karuna Jyothi*, Dr. B. Indira Reddy.  “CLOUD COMPUTING-INFRASTRUCTURE AS SERVICEAMAZONEC2”Gurudatt Kulkarni1,Ramesh Sutar 2 Jayant Gambhir 3  Firewall and VPN InvestigationonCloudComputing Performance by iddeeq Yousif Ameen on 29 July 2015.  VPN research (Term Paper)Saugat Bhattarai on 03 January 2016.  www.dslreports.com/faq/5313  whatismyipaddress.com/vpn- comparison?gclid=CI7S-e2bir8CFQ0ojgod94UAlQ  www.computer.howstuffworks.com/vpn.htm  www.plathome.com/support/packetix/manual/10- 1.htm  www.netforbeginners.about.com/od/readerpicks/t p/The-Best-VPN-Service-Providers.htm  www.pcworld.com/article/2030763/how-and- why-to-set-up-a-vpn-today.html  www.webopedia.com/TERM/V/VPN.html  www,computer.howstuffworks.com/vpn.htm  www,searchenterprisewan.techtarget.com/definitio n/virtual-private-network  en.wikipedia.org/wiki/Virtual_private_network  Maneesha Sharma, Himani Bansal, Amit Kumar Sharma, “Cloud Computing: Different Approach &Security Challenge”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-1, pp. 421-424, March 2012.