The Migration of the University IT Infrastructure toward a Secure IaaS Cloud

被引:0
|
作者
Mohamed, Id-Hammad [1 ]
Karim, Afdel [1 ]
Ahmed, Asimi [1 ]
机构
[1] Ibn Zohr Univ, LabSiv Lab, Agadir, Morocco
关键词
Cloud Computing Platforms; Cloud Computing Security; Isolation; Firewalling;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The appealing features of Cloud computing have been fueling its integration in many sectors; economy, industry and education. Thus, it become widely used for personal services and for entertainment. Since the arrivals of this paradigm and the providing of services through Internet, information technology live a radical shift in its adoption. The financial benefits and the informatics features of Cloud Computing makes it a necessity to maintain the development of many sectors, as well as education. However, its security weaknesses are the major barrier for its adoption. Over the years, the IT and financial needs of the university keep speedily growing with the increasing number of students. To overcome its requirements, university is called to adopt the Cloud Computing technologies. We propose in this paper a design of a private IaaS Cloud adopted for the university IT infrastructure. Also we propose two solutions to improve its security; especially the isolation of data in the IaaS Cloud, and the isolation of networks within the university by adopting the Tree-Rule Firewall approach.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [1] TVPDc: A Model for Secure Managing Virtual Infrastructure in IaaS Cloud
    Wan, Xin
    Zhang, XinFang
    Chen, Liang
    Jin, Hao
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 136 - 141
  • [2] Trusted Virtual Private Datacenter: A Model Toward Secure IaaS Cloud
    Wan, Xin
    Xiao, ZhiTing
    Ren, Yi
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 55 - 58
  • [3] IaaS type Cloud infrastructure assessment and monitoring
    Kozlovszky, M.
    Toerocsik, M.
    Schubert, T.
    Poserne, V.
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 249 - 252
  • [4] Runtime Infrastructure Optimisation in Cloud IaaS Structures
    Chatziprimou, Kleopatra
    Lano, Kevin
    Zschaler, Steffen
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 687 - 692
  • [5] Secure Storage Service for IaaS Cloud Users
    Seol, Jinho
    Jin, Seongwook
    Maeng, Seungryoul
    [J]. PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 190 - 191
  • [6] MODEL OF CLOUD COMPUTING REALISATION ON THE BASE OF INFRASTRUCTURE IAAS
    Peniak, Peter
    Franekova, Maria
    Zolotova, Iveta
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2016, 14 (02) : 122 - 128
  • [7] Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure
    Almutairi, Badr
    [J]. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2021, 8 (07): : 7 - 13
  • [8] Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
    Manvi, Sunilkurnar S.
    Shyam, Gopal Krishna
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 424 - 440
  • [9] Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
    Abu Saed, Kamariah
    Aziz, Norshakirah
    Abdulkadir, Said Jadid
    Aziz, Izzatdin A.
    Hassan, Noor Hafizah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (10) : 297 - 306
  • [10] G-Cloud: A Highly Reliable and Secure IaaS Platform
    Liu, Tiantian
    Ji, Tongkai
    Yue, Qiang
    Tang, Zhenchu
    [J]. 2015 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2015, : 309 - 313