Security and Safety in Amazon EC2 Service – A Research on EC2 Service AMIs
K. Ravi Chythanya1, G. Sunil2, K. Sudheer Kumar3, Seena Naik Korra4, A. Harshavardhan5
1K. Ravi Chythanya, Assistant Professor, S R Engineering College, Telangana, India.
2G. Sunil, K. Ravi Chythanya, Assistant Professor, S R Engineering College. Telangana, India.
3K. Sudheer Kumar, K. Ravi Chythanya, Assistant Professor, S R Engineering College. Telangana, India.
4Dr. Seena Naik Korra, K. Ravi Chythanya, Assistant Professor, S R Engineering College. Telangana, India.
5A. Harshavardhan, K. Ravi Chythanya, Assistant Professor, S R Engineering College. Telangana, India.
Manuscript received on 10 April 2019 | Revised Manuscript received on 17 April 2019 | Manuscript Published on 26 July 2019 | PP: 736-738 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F11490486S419/19©BEIESP | DOI: 10.35940/ijitee.F1149.0486S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: There are some multinational companies available in the market to provide cloud services such as Amazon Web Services, Microsoft Azure, and IBM Smart Cloud and so on. Nowadays an organization need to work on different technologies, it need not to install the technologies, it can simply acquire the technology available in online as a service.It is the best practice in the cloud based services that it allows the users to make their own exceptional unprecedented virtual images and share them to with various customers in a comparative cloud. Close to these customer shared virtual pictures, the cloud service providers will in like manner give the virtual pictures that have been preconfigured with open source database and web server to orchestrate our stray pieces. In this paper, we had made an examination to check the general security risks related with the usage of virtual machine pictures from the uninhibitedly available inventories of cloud master affiliations. In adjusted, we had managed the open standard virtual pictures that are existed on the Amazon EC2 association. We analyzed the security issues of the virtual pictures which are available on the Amazon EC2 Cluster as the open AMI (Amazon Machine Images).
Keywords: Cloud Service, Virtual Image, AMI, EC2.
Scope of the Article: Information and Data Security