Security Architecture based on Defense in Depth for Cloud Computing Environment

被引:0
|
作者
Mavroeidakos, Theodoros [1 ]
Michalas, Angelos [2 ]
Vergados, Dimitrios D. [1 ]
机构
[1] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
[2] Technol Educ Inst Western Macedonia, Dept Informat & Comp Technol, Kastoria 52100, Greece
关键词
Cloud Computing; Defense in depth; Security architecture; Intrusion detection system (IDS); Honeypots; Firewalls; Big data applications;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Mobile Cloud Computing: Architecture, Advantages and Security Issues
    Fellah, Hadjer
    Mezioud, Chaker
    Batouche, Mohamed Chaouki
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [32] Enterprise Architecture Modeling Based on Cloud Computing Security Ontology as a Reference Model
    Janulevicius, Justinas
    Marozas, Leonardas
    Cenys, Antanas
    Goranin, Nikolaj
    Ramanauskaite, Simona
    2017 OPEN CONFERENCE OF ELECTRICAL, ELECTRONIC AND INFORMATION SCIENCES (ESTREAM), 2017,
  • [33] End To End Cloud Computing Architecture Based On A Novel Classification Of Security Issues
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    Kamoun, Farouk
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 303 - 310
  • [34] THE RESEARCH OF A RESOURCE-AWARE CLOUD COMPUTING ARCHITECTURE BASED ON WEB SECURITY
    Wang, Xiaoni
    Gao, Xuedong
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 440 - 443
  • [35] MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing
    Manogaran, Gunasekaran
    Thota, Chandu
    Kumar, M. Vijay
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 128 - 133
  • [36] Cloud Computing Security Architecture and Key Technologies Research
    Wu, Xianglong
    Wu, Shaobo
    INFORMATION, COMMUNICATION AND EDUCATION APPLICATION, VOL 11, 2013, 11 : 65 - 69
  • [37] The Design of Power Security Defense System Based on Resource Pool Cloud Computing Technology
    Nan, Dang
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2020, 11 (01) : 1 - 11
  • [38] Research on the active defense security system based on cloud computing of wisdom campus network
    Chen, Yuanyuan
    Yao, Wang
    Luo, Jianghua
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 1292 - 1297
  • [39] State-of-the-art Cloud Computing Security Taxonomies - A classification of security challenges in the present cloud computing environment
    Srinivasan, Madhan Kumar
    Sarukesi, K.
    Rodrigues, Paul
    Manoj, Sai M.
    Revathy, P.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 470 - 476
  • [40] Security Analysis of Cloud Computing in the Mobile Internet Environment
    Luo Mingwan
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1699 - 1705