Research Article

An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures

Volume: 13 Number: 3 September 30, 2024
EN

An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures

Abstract

The digital transformation is a dynamic process that unfolds within the data and information cycle, aimed at maximizing the efficiency businesses derive from data and information. For the structuring and sustenance of this process require information processing resources, typically sourced from cloud computing infrastructures. In this context, the aim of this study is to scrutinize the cyber security measures provided by both public and private IaaS infrastructures, aiding businesses in their selection process for digital transformation. To address the objectives of this research, a mixed-methods approach was adopted, integrating both qualitative and quantitative research techniques. The study is structured around two primary research questions. The first research question (RQ1) seeks to delineate the cyber security measures in Amazon AWS EC2, Google Cloud CE, and Proxmox VE IaaS (Internet as a Service) infrastructures. The second research question (RQ2) aims to identify the similarities and differences in cyber security measures across these infrastructures. Additionally, to verify the findings derived from (RQ1) ensure the credibility of the study, and to experimentally examine cyber security measures within these infrastructures, the study adopts an experimental research method from quantitative analysis techniques and the hypothesis (H0) " The findings obtained as a result of RQ1 are confirmed in AWS EC2 and Google Cloud CE IaaS infrastructures" is tested. As a result of the experimental research, hypothesis H0 was accepted. A review of existing literature, there has been encountered no research that concurrently examines, compares, and experimentally verifies the cybersecurity measures across both public and private IaaS infrastructures. Therefore, this study can be considered to make an original contribution to the existing body of knowledge by addressing an important gap in the literature on the comparative and experimental evaluation of cyber security practices in public and private IaaS infrastructures.

Keywords

References

  1. G. Elia, G. Solazzo, A. Lerro, F. Pigni, and C. L. Tucci, “The digital transformation canvas: A conceptual framework for leading the digital transformation process,” Business Horizons. vol. 67, no. 4, pp. 381-398, 2024.
  2. W. S. Admass, Y. Y. Munaye, and A. A. Diro, “Cyber security: State of the art, challenges and future directions,” Cyber Security and Applications, vol. 2, pp. 100031, 2023.
  3. A. Zimba and V. Chama, “Cyber attacks in cloud computing: Modelling multi-stage attacks using probability density curves,” International Journal of Computer Network and Information Security, vol. 10, no. 3 pp. 25-36, 2018.
  4. K. D. Bushay, ”Infrastructure as a Service/Platform as a Service,” in Encyclopedia of Libraries, Librarianship, and Information Science, USA: Elsevier, 2024, pp. 1-15.
  5. R. Khatake and S. Karande, “Different iaas security attributes and comparison of different cloud providers,” Internation Journal on Advanced Computer Theory and Engineering, vol. 3, no. 1, pp. 13-19, 2014.
  6. L. Kate Tomchik, “Comparison of the iaas security available from the top three cloud providers,” in Advances in Parallel & Distributed Processing, and Applications (H. R. Arabnia, L. Deligiannidis, M. R. Grimaila, D. D. Hodson, K. Joe, M. Sekijima, and F. G. Tinetti, eds.), Springer International Publishing, 2021, pp. 307-323.
  7. Gartner. “Gartner says worldwide iaas public cloud services revenue grew 30% in 2022,” Accessed January 25, 2024 [Online]. Available: https://www.gartner.com/en/newsroom/pr ess-releases/2023-07-18-gartner-says-worldwide-iaas-public-c loud-services-revenue-grew-30-percent-in-2022-exceeding-1 00-billion-for-the-first-time
  8. NIST. ”Nist cloud computing program” Accessed Apr. 23, 2024 [Online]. Available: https://www.nist.gov/programs-projects/ni st-cloud-computing-program-nccp

Details

Primary Language

English

Subjects

Cloud Computing Security

Journal Section

Research Article

Publication Date

September 30, 2024

Submission Date

April 29, 2024

Acceptance Date

August 26, 2024

Published in Issue

Year 2024 Volume: 13 Number: 3

APA
Yoşumaz, İ. (2024). An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures. International Journal of Information Security Science, 13(3), 1-29. https://doi.org/10.55859/ijiss.1475423
AMA
1.Yoşumaz İ. An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures. IJISS. 2024;13(3):1-29. doi:10.55859/ijiss.1475423
Chicago
Yoşumaz, İsmail. 2024. “An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures”. International Journal of Information Security Science 13 (3): 1-29. https://doi.org/10.55859/ijiss.1475423.
EndNote
Yoşumaz İ (September 1, 2024) An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures. International Journal of Information Security Science 13 3 1–29.
IEEE
[1]İ. Yoşumaz, “An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures”, IJISS, vol. 13, no. 3, pp. 1–29, Sept. 2024, doi: 10.55859/ijiss.1475423.
ISNAD
Yoşumaz, İsmail. “An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures”. International Journal of Information Security Science 13/3 (September 1, 2024): 1-29. https://doi.org/10.55859/ijiss.1475423.
JAMA
1.Yoşumaz İ. An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures. IJISS. 2024;13:1–29.
MLA
Yoşumaz, İsmail. “An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures”. International Journal of Information Security Science, vol. 13, no. 3, Sept. 2024, pp. 1-29, doi:10.55859/ijiss.1475423.
Vancouver
1.İsmail Yoşumaz. An Examination of Cyber Security Solutions in Public and Private IaaS Infrastructures. IJISS. 2024 Sep. 1;13(3):1-29. doi:10.55859/ijiss.1475423

Cited By