CFP last date
20 May 2024
Reseach Article

Disaster Avoidance in Google Cloud Implementations

by Rukayat Damilola Alimi, Olusola Gbenga Olufemi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 31
Year of Publication: 2020
Authors: Rukayat Damilola Alimi, Olusola Gbenga Olufemi
10.5120/ijca2020920857

Rukayat Damilola Alimi, Olusola Gbenga Olufemi . Disaster Avoidance in Google Cloud Implementations. International Journal of Computer Applications. 175, 31 ( Nov 2020), 22-27. DOI=10.5120/ijca2020920857

@article{ 10.5120/ijca2020920857,
author = { Rukayat Damilola Alimi, Olusola Gbenga Olufemi },
title = { Disaster Avoidance in Google Cloud Implementations },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2020 },
volume = { 175 },
number = { 31 },
month = { Nov },
year = { 2020 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number31/31649-2020920857/ },
doi = { 10.5120/ijca2020920857 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:39:58.937447+05:30
%A Rukayat Damilola Alimi
%A Olusola Gbenga Olufemi
%T Disaster Avoidance in Google Cloud Implementations
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 31
%P 22-27
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the great benefits of cloud-based services is its ability to provide easy deployment [8]. Then, the right security mindsets and awareness for proper cloud administration will pay off more, to securely utilize these services. However, as all cloud providers will always say – the security of the cloud is their responsibility, the security in the cloud lies with the client users. This saying invariably makes the study of what the users of these cloud services need to know and act on so much important. The focus in this study will be on Google cloud, a user-friendly and cost-saving cloud, which offers good ROI and peace of mind for business users. Google Cloud Platform (GCP) and G Suite (now Google Workspace), are the distinct Google entities that get cloud customers set up completely for the journey to Google Cloud services’ adoption [6].

References
  1. Xiaowei Yan et al. 2012. Research and Design of Cloud Computing Security Framework. Available from: https://www.researchgate.net/publication/259764167. [accessed Oct 06, 2020].
  2. Chinta ChandraSekhar et al. 2014. Secure Network Connectivity in the Cloud Computing Environment. International Journal of Innovative Research in Computer and Communication Engineering. Vol. 2, Issue 3, March 2014 [accessed Oct 01, 2020]
  3. VPC Firewalls Rules Overview, https://cloud.google.com/vpc/docs/firewalls [accessed Oct 02, 2020]
  4. M Husni et al. 2020. Security Audit In Cloud-Based Server by Using Encrypted Data AES-256 and SHA-256, IOP Conference. Series: Materials Science and Engineering 830 (2020) 032015 [accessed Oct 03, 2020]
  5. How it Protects, https://www.google.com/landing/2step/index.html#tab=how-it-protects, [accessed Oct 07 2020]
  6. https://support.google.com/a/answer/7284269?hl=en, [accessed Oct 06, 2020]
  7. Securing GCP: Top ten Mistakes to avoid, https://resources.netskope.com/cloud-security-solution-white-papers/securing-gcp-top-ten-mistakes-to-avoid, [accessed Oct 09, 2020]
  8. Google Cloud Security Foundations Guide, https://services.google.com/fh/files/misc/wp_take_command_of_your_security_in_the_cloud_rgb_v15c.pdfhttps://services.google.com/fh/files/misc/google-cloud-security-foundations-guide.pdf, [accessed Oct 01, 2020]
  9. Hardening You Cluster, https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster. [accessed Oct 08, 2020]
  10. https://cloud.google.com/kubernetes-engine/docs/concepts/security-overview#node_security
  11. https://cloud.google.com/iam/docs/overview, [accessed Oct 11, 2020]
  12. Using IAM Securely, https://cloud.google.com/iam/docs/using-iam-securely, [accessed Oct 09, 2020]
  13. https://cloud.google.com/iam/docs/recommender-overview, [accessed Oct 07, 2020]
  14. Configuring Secure Remote Access for Compute Engine VMs, https://cloud.google.com/blog/products/identity-security/configuring-secure-remote-access-for-compute-engine-vms, [accessed Oct 09, 2020]
  15. https://ldapwiki.com/wiki/Google%20Cloud%20Securit, [accessed Oct 07, 2020]
  16. Enabling and Disabling Services, https://cloud.google.com/service-usage/docs/enable-disable, [accessed Oct 02 2020]
  17. Improving the security of Google APIs with SSL, http://googlecode.blogspot.com/2011/03/improving-security-of-google-apis-with.html [accessed Oct 01, 2020]
  18. O. G. Olufemi, R. D. Alimi. 2020. Authenticating Device Users via Keyboard Strokes, IJCA - International Journal of Computer Applications, Foundation of Computer Science (FCS), NY, USA, Vol. 175, Issue 17, https://www.ijcaonline.org/archives/volume175/number17/31542-2020920673.
Index Terms

Computer Science
Information Sciences

Keywords

GCP G Suite Workspace 2SV GKE Kubernetes Roles Compute Engine IAM Misconfiguration Cluster Remote Access SSH API.