The Migration of the University IT Infrastructure toward a Secure IaaS Cloud

被引:0
|
作者
Mohamed, Id-Hammad [1 ]
Karim, Afdel [1 ]
Ahmed, Asimi [1 ]
机构
[1] Ibn Zohr Univ, LabSiv Lab, Agadir, Morocco
关键词
Cloud Computing Platforms; Cloud Computing Security; Isolation; Firewalling;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The appealing features of Cloud computing have been fueling its integration in many sectors; economy, industry and education. Thus, it become widely used for personal services and for entertainment. Since the arrivals of this paradigm and the providing of services through Internet, information technology live a radical shift in its adoption. The financial benefits and the informatics features of Cloud Computing makes it a necessity to maintain the development of many sectors, as well as education. However, its security weaknesses are the major barrier for its adoption. Over the years, the IT and financial needs of the university keep speedily growing with the increasing number of students. To overcome its requirements, university is called to adopt the Cloud Computing technologies. We propose in this paper a design of a private IaaS Cloud adopted for the university IT infrastructure. Also we propose two solutions to improve its security; especially the isolation of data in the IaaS Cloud, and the isolation of networks within the university by adopting the Tree-Rule Firewall approach.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [21] Towards Secure Instance Migration in the Cloud
    Syed, Toqeer Ali
    Musa, Shahrulniza
    Rahman, Abdur
    Jan, Salman
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 277 - 282
  • [22] Secure Inter Cloud Data Migration
    Khalil, Issa
    Hababeh, Ismail
    Khreishah, Abdallah
    [J]. 2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2016, : 62 - 67
  • [23] Cloud-Trust-a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
    Gonzales, Dan
    Kaplan, Jeremy M.
    Saltzman, Evan
    Winkelman, Zev
    Woods, Dulani
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 523 - 536
  • [24] Toward designing a secure biosurveillance cloud
    Tai-hoon Kim
    Sabah Mohammed
    [J]. The Journal of Supercomputing, 2013, 65 : 61 - 70
  • [25] Toward designing a secure biosurveillance cloud
    Kim, Tai-hoon
    Mohammed, Sabah
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 61 - 70
  • [26] Toward a Unified Intercloud Interoperability Conceptual Model for IaaS Cloud Service
    Nodehi, Tahereh
    Ghimire, Sudeep
    Jardim-Goncalves, Ricardo
    [J]. PROCEEDINGS OF THE 2014 2ND INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2014), 2014, : 673 - 681
  • [27] Toward role-based provisioning and access control for infrastructure as a service (IaaS)
    Shin, Dongwan
    Akkan, Hakan
    Claycomb, William
    Kim, Kwanjoong
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2011, 2 : 243 - 255
  • [28] Toward a Secure VM Migration Control Mechanism Using Blockchain Technique for Cloud Computing Environment
    Uchibayashi, Toshihiro
    Apduhan, Bernady
    Suganuma, Takuo
    Hiji, Masahiro
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT III, 2018, 10962 : 177 - 186
  • [29] Secure Log Storage Using Blockchain and Cloud Infrastructure
    Kumar, Manish
    Singh, Ashish Kumar
    Kumar, T. V. Suresh
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [30] Secure Virtual Machine Placement in Infrastructure Cloud Services
    Natu, Varun
    Ta Nguyen Binh Duong
    [J]. 2017 IEEE 10TH CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2017, : 26 - 33