An Effective Utilization of Bastion Host Services in Cloud Environment
G. Vijayababu1, D. Haritha2, R. Satya Prasad3

1G. Vijayababu, Department of CSE, JNTUK, Kakinada (Andhra Pradesh), India.
2Dr. D.Hariha, Department of CSE, SRKIT, Vijayawada (Andhra Pradesh), India.
3Dr. R.Satya Prasad, Department of CSE, Acharya Nagarjuna University, Guntur (Andhra Pradesh), India.

Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 2215-2220 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5670058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Now a days the cloud computing offers huge benefits, security issues are major concerns that setback from enjoying the full range of advantages it offers. Bastion Host is specifically designed for network security that is placed on the network perimeter which provides protection in the form of patches, authentication, encryption, and eliminates unnecessary software and services and is a well-known concept. This paper discusses Bastion Host services, types and bastion host in a cloud environment AWS. The Priority Queue method for effective utilization of services is proposed and the results are promising in terms of improving throughput and resource utilization.
Keyword: AWS, Bastion Host, DMZ, VPC.
Scope of the Article: Innovative Sensing Cloud and Systems.