Security Architecture based on Defense in Depth for Cloud Computing Environment

被引:0
作者
Mavroeidakos, Theodoros [1 ]
Michalas, Angelos [2 ]
Vergados, Dimitrios D. [1 ]
机构
[1] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
[2] Technol Educ Inst Western Macedonia, Dept Informat & Comp Technol, Kastoria 52100, Greece
来源
2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) | 2016年
关键词
Cloud Computing; Defense in depth; Security architecture; Intrusion detection system (IDS); Honeypots; Firewalls; Big data applications;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Review of Security and Privacy Techniques in Cloud Computing Environment
    Mote, Rutuja
    Pawar, Ambika
    Dani, Ajay
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 543 - 551
  • [42] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [43] Reproducible Scientific Computing Environment with Overlay Cloud Architecture
    Yokoyama, Shigetoshi
    Masatani, Yoshinobu
    Ohta, Tazro
    Ogasawara, Osamu
    Yoshioka, Nobukazu
    Liu, Kai
    Aida, Kento
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 774 - 781
  • [44] A New Trust Management Architecture for Cloud Computing Environment
    Muchahari, Monoj Kumar
    Sinha, Smriti Kumar
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 136 - 140
  • [45] Security Outlook for Cloud Computing: A Proposed Architectural-Based Security Classification for Cloud Computing
    Khari, Manju
    Gupta, Sana
    Kumar, Manoj
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2153 - 2158
  • [46] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [47] A Nucleic Filter to Enhance the Security in Cloud Computing Environment
    Singh, Oinam David
    Asthana, Amit
    Kushwaha, Yogesh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3762 - 3765
  • [48] Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment
    Iyengar, N. Ch. S. N.
    Ganapathy, Gopinath
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) : 119 - 140
  • [49] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [50] CyberGuarder: A virtualization security assurance architecture for green cloud computing
    Li, Jianxin
    Li, Bo
    Wo, Tianyu
    Hu, Chunming
    Huai, Jinpeng
    Liu, Lu
    Lam, K. P.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (02): : 379 - 390