메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Santosh Kumar Majhi (VSS University of Technology) Sunil Kumar Dhal (Sri Sri University)
저널정보
한국산학기술학회 SmartCR Smart Computing Review 제5권 제5호
발행연도
2015.10
수록면
408 - 416 (9page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
The extensive use of cloud services and newly-evolved security threats have made most cloud service providers deploy a variety of security devices such as firewalls, Internet Protocol Security, and intrusion detection systems to control resource access based on the security requirements of the data center. Therefore, security requirements are becoming more fine-grained where the control of access depends on heterogeneous partition levels like filtering network traffic, Internet Protocol Security encryption-based traffic forwarding, and payload inspection. However, today, cloud service providers are looking to systematically harden security by incorporating multiple security devices in the network in a cost-effective way. This requires evaluating several alternative security architectures to satisfy both organizational security requirements and business constraints. In this paper, we present an automated framework to synthesize data center security configurations by exploring various security design alternatives to provide better in-depth defense for the cloud infrastructure. The main design alternatives use different patterns of isolation for different segments of the cloud infrastructure. In this work, we take a dummy data center topology, cloud service provider security (connectivity and isolation) requirements and business constraints (usability and cost) as input ,and synthesize a correct and optimal data center security strategy by way of determining the optimal placement of different security devices in the data center.

목차

Abstract
Introduction
Partition
Placement of Security Devices
Implementation and Evaluation
Related Work
Conclusion
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0