Author : Manpreet Kaur, Sarpreet Singh
Date of Publication :25th July 2024
Abstract:The utilization and management of compute resources have been significantly transformed by cloud computing, specifically in Infrastructure as a Service (IaaS) environments. Nevertheless, in light of the exponential growth of cloud services, security and load balancing concerns have assumed critical importance. By leveraging Secure Sockets Layer (SSL) technology, this paper presents a method for complementing load balancing and security in IaaS environments. The implementation of load balancing is essential for cloud environments to achieve optimal resource utilization and performance. Conventional load-balancing strategies frequently fail to adequately manage fluctuating duties and safeguard data confidentiality. Through the incorporation of SSL into the load-balancing mechanism, this investigation endeavours to establish a secure channel of communication between virtual machines and clients, thus reducing the likelihood of security breaches including data tampering and espionage. Furthermore, the implementation of SSL encryption for the data exchanged between clients and virtual machines serves to bolster security measures, guaranteeing both confidentiality and integrity. By implementing this strategy, the IaaS environment's overall security posture is not only strengthened but regulatory compliance requirements regarding data protection are also met. In addition, experimental evaluations of the suggested SSL-based load-balancing technique are performed in a simulated cloud environment. The findings illustrate enhanced performance concerning resource utilization, response time, and throughput when compared to traditional load- balancing techniques. Furthermore, the security analysis validates the efficacy of SSL in safeguarding confidential information against unauthorized intrusion and manipulation. By incorporating SSL into the load-balancing mechanism, IaaS environments can effectively tackle security and load-balancing challenges simultaneously. This investigation contributes substantially to the advancement of knowledge and implementation regarding cloud computing architectures that are both secure and efficient. The security and dependability of cloud-based services consequently improve.
Reference :