We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Architecting the Network for the Cloud using Security Guidelines

by K. Krishna Chaitanya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 8
Year of Publication: 2013
Authors: K. Krishna Chaitanya
10.5120/14035-2186

K. Krishna Chaitanya . Architecting the Network for the Cloud using Security Guidelines. International Journal of Computer Applications. 81, 8 ( November 2013), 34-38. DOI=10.5120/14035-2186

@article{ 10.5120/14035-2186,
author = { K. Krishna Chaitanya },
title = { Architecting the Network for the Cloud using Security Guidelines },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 8 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number8/14035-2186/ },
doi = { 10.5120/14035-2186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:34.457653+05:30
%A K. Krishna Chaitanya
%T Architecting the Network for the Cloud using Security Guidelines
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 8
%P 34-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the latest emerging technology which offers reduced capital expenditure, complexity, operational risks, maintenance, and increased scalability while providing the services at different abstraction levels, namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). A new approach called cloud networking that enables and adds the networking functions and resources to cloud computing and provide the means of dynamic and flexible placement of virtual resources that crossing over provider borders. It also allows various kinds of functionalities and optimization techniques, e. g. , reducing network load. This approach brings out and enables new security challenges. This paper presents a new security architecture, which enables the user of cloud networking to illustrate the security requirements and apply them in the cloud networking infrastructure.

References
  1. Volker Fusenig and Ayush Sharma (2012) "Security Architecture for Cloud Networking" International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium 978-1-4673-0009-4/12.
  2. Lucinda Borovick and Rohit Mehra, IDC White paper "Architecting the Network for the Cloud," Cisco Systems, January 2011.
  3. "ISO/IEC 27001:500 - Information security management systems - Requirements," July 2011. [Online]. Available: http://www. iso. org/iso/ catalogue detail?csnumber=42103
  4. G. P. Koslovski and P. V. -B. Primet, "Vxdl: Virtual resources and interconnection networks description language," Engineering, pp. 138–154, 2009. [Online]. Available:http://www. springerlink. com/index/N131016226414516. pdf
  5. A. Streitberger, W. Ruppel, "Cloud computing security – protection goals, taxonomy, market review," Institute for Secure Information TechnologySIT, Tech. Rep. , 2010.
  6. S. D. C. d. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati, "Encryption-based policy enforcement for cloud storage," in Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, ser. ICDCSW '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 42–51. [Online]. Available: http://dx. doi. org/10. 1109/ICDCSW. 2010. 35
  7. "VMware," July 2011. [Online]. Available: http://www. vmware. com
  8. P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, and D. Zeghlache, "Challenges for cloud networking security," in Mobile Networks and Management, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2010.
  9. "CloudAudit: A6 - The Automated Audit, Assertion, Assessment, and Assurance API ," July 2011. [Online]. Available: http://cloudaudit. org
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Service Consumer Cloud Service Provider Virtual Infrastructure Provider Cloud Service Creator Virtual Resources.