Security Architecture based on Defense in Depth for Cloud Computing Environment

被引:0
|
作者
Mavroeidakos, Theodoros [1 ]
Michalas, Angelos [2 ]
Vergados, Dimitrios D. [1 ]
机构
[1] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
[2] Technol Educ Inst Western Macedonia, Dept Informat & Comp Technol, Kastoria 52100, Greece
关键词
Cloud Computing; Defense in depth; Security architecture; Intrusion detection system (IDS); Honeypots; Firewalls; Big data applications;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [42] Providing data security using DNA computing in the cloud computing environment
    Kumar, Tarun
    Namasudra, Suyel
    Kumar, Prabhat
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (04) : 463 - 486
  • [43] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [44] A Nucleic Filter to Enhance the Security in Cloud Computing Environment
    Singh, Oinam David
    Asthana, Amit
    Kushwaha, Yogesh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3762 - 3765
  • [45] Review of Security and Privacy Techniques in Cloud Computing Environment
    Mote, Rutuja
    Pawar, Ambika
    Dani, Ajay
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 543 - 551
  • [46] An Approach to Security-SLA in Cloud Computing Environment
    da Silva, Carlos Alberto
    de Geus, Paulo Licio
    2014 IEEE LATIN-AMERICA CONFERENCE ON COMMUNICATIONS (LATINCOM), 2014,
  • [47] A Study on the Security of Patch Management in a Cloud Computing Environment
    Hu, Yong-Xiang
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 278 - 282
  • [48] Modeling Security Risk Factors in a Cloud Computing Environment
    Ahmed, Nada
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2013, 8 (06): : 279 - 289
  • [49] SECURITY ISSUES OF SCADA SYSTEMS IN CLOUD COMPUTING ENVIRONMENT
    Alakbarov, R. G.
    Hashimov, M. A.
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, : 65 - 67
  • [50] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744