Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing

نویسندگان

  • Zhen Chen
  • Wenyu Dong
  • Hang Li
  • Junwei Cao
  • Peng Zhang
  • Xinming Chen
چکیده

Data center is the infrastructure of supporting Internet service. Cloud computing is rapidly changing the face of Web Internet service infrastructure, enabling even small organizations to quickly create Web and mobile applications for millions of users by taking advantage of the scale and flexibility of the shared physical infrastructures provided by cloud providers. In this scenario, multiple tenants saved their data and applications in the same data centers making the network boundaries between each tenant become blurred. Also different tenants have different security requirements, it needs to create different security policies for them. Network virtualization is to "compile" a diverse set of tenant-specific requirements into a single configuration of the underlying physical cloud network, enabling multi-tenant datacenters to automatically address a large and diverse set of tenants’ requirements. In this paper, we propose architecture, mechanism design and system implementation of vCNSMS, a collaborative network security prototype system in multiple tenant’s data center network. We demonstrates vCNSMS with a centralized collaborative scheme and deep packet security check in peer-UTMs among vCNSMS with open source peer-UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security level has different packet inspection scheme and enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for intelligence flow processing to defense possible network attack inside data center network. 1

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Jobber: Automating Inter-Tenant Trust in the Cloud

Today, a growing number of users are opting to move their systems and services from self-hosted data centers to cloud-hosted IaaS offerings. These users wish to both benefit from the efficiencies that shared multitenant hosting can offer while still retaining or improving the kinds of security and control afforded by self-hosted solutions. In this paper, we present Jobber: a highly autonomous m...

متن کامل

Multi Tenancy Access Control Using Cloud Service in MVC

Cloud Computing is the next generation Internet service and data center, and it is also used for public utilities and on-demand computing. Cloud computing is not a totally new technology, but rather a derived concept of application and service innovation in which, multi-tenancy is one of the important issues among the core technologies of cloud computing applications. Many tenants can access th...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014