Security Architecture based on Defense in Depth for Cloud Computing Environment

被引:0
|
作者
Mavroeidakos, Theodoros [1 ]
Michalas, Angelos [2 ]
Vergados, Dimitrios D. [1 ]
机构
[1] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
[2] Technol Educ Inst Western Macedonia, Dept Informat & Comp Technol, Kastoria 52100, Greece
关键词
Cloud Computing; Defense in depth; Security architecture; Intrusion detection system (IDS); Honeypots; Firewalls; Big data applications;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] IP Based Security Architecture of Virtual Network in Cloud Computing System
    Yang, Jong-Sung
    Choi, Hyoung-Kee
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 709 - 715
  • [22] Cloud-based VCLE: a Virtual Collaborative Learning Environment Based on a Cloud Computing Architecture
    El Mhouti, Abderrahim
    Nasseh, Azeddine
    Erradi, Mohamed
    Marfa Vasquez, Jose
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P86 - P91
  • [23] DESIGN OF DEFENSE-IN-DEPTH ARCHITECTURE OF WEB SYSTEM SECURITY BASED ON SEAM
    Ming, Zeng Jian
    Li, Song Xiao
    Li, Fu
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 237 - 241
  • [24] Joint defense mechanism of malicious code based on cloud and client computing architecture
    Xu X.
    Xiong J.
    Cheng C.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2011, 41 (02): : 220 - 226
  • [25] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [26] Elements of Application Security In the Cloud Computing Environment
    Mathew, George
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 174 - 179
  • [27] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [28] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [29] A Trust Reputation Architecture for Cloud Computing Environment
    Bilecki, Luis Felipe
    Fiorese, Adriano
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 614 - 621
  • [30] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212