Documentos de Académico
Documentos de Profesional
Documentos de Cultura
PADMA.G
V.VIJAYALAKSHMI
kavipadhu@gmail.com
vijivenkatesh4@gmail.com
Panchetti
Panchetti
ABSTRACT
Cloud computing is sharing of resources on
a scale which is cost effective and location
independent. Resources on the cloud can be
deployed by the vendor, and used by the
client. Massive computing resources,
deployed among virtual data centres,
dynamically allocated to specific users and
tasks and accessed service via an user
interface(UI), such as a web browser. The
physical cloud resources may reside in a
number of locations, the detail of which is not
typically known to the services users. The
major concept of implementing a cloud is
Virtualization. Cloud computing enables
INTRODUCTION:
RELATED WORK
PROPOSED WORK
A virtual security
architecture
According
to
the
analysis
of
vulnerabilities existed in the virtual network
above, we leverage the characteristics of
route and bridge modes and combine
them to propose a novel virtual network
model to make the communication among
VMs more secure. . This model is composed
of three layers: routing layer, firewall and
shared network, as shown in following figure
Routing layer
This layer has the same functions with the
traditional route mode. It is this layers
responsibility to connect the physical network
and create a logical dedicated channel for the
communication between the virtual network
RESULT:
Future Work
However, future work could look into that,
using the same cloud infrastructure and the
same evaluation methodologies but evaluating
different virtual firewalls. One of the
solutions aiming at securing virtual network
traffic is to route the entire virtualized
network traffic out of the virtual network and
onto the physical network using VLANs,
where a physical firewall can inspect the
traffic before routing it back onto the virtual
network. Even if this technique is known for
introducing latency and performance
degradation, future work could evaluate the
physical firewall in this kind of infrastructure
so its performances could be compared to the
virtual firewall ones found during this project.
Summary
of
Secure
Architecture Protection
Virtual
virtualized
controls.
environments
and
traditional
REFERENCES:
[1] Z. Pervez, Sungyoung Lee, Young-Koo
Lee.
Multi-Tenant,
Secure,
Load
Disseminated
SaaS
Architecture.
In
proceedings
of
the
12th
Advanced
Communication
Technology
(ICACT)
International Conference. Phoenix, USA,
2010, pp. 214 219.
[2] M. P. Rad, A. S. Badashian, G.
Meydanipour, M. A. Delcheh, M.
Alipour, and H. Afzali, "A Survey of Cloud
Platforms and Their
Future," in Lecture Notes in Computer
Science, 2009, pp. 788-796.
[3] Sun Microsystems, Inc. Introduction to
Cloud Computing Architecture.
White Paper, 1st edition, June 2009.
[4] G. Gruman and E. Knorr. What cloud
computing really means.
InfoWorld, April 2008. Electronic Magazine,
available at
http://www.infoworld.com/article/08/04/07/15
FE-cloud-computingreality
1.html.
[5]
Cloud
Computing,
http://www.ibm.com/ibm/cloud/.
[6] M. Armbrust, A. Fox, R. Griffith, Anthony
D. Joseph,et al. Above the
Clouds: A Berkeley View of Cloud
Computing. 2009, EECS
Department, University of California,
Berkeley.
[7] L. M. Vaquero, L. Rodero-Merino, J.
Caceres, and M. Lindner, "A
break in the clouds: towards a cloud
definition," SIGCOMM Comput.
Commun. Rev., vol. 39, pp. 50--55, 2009.
[8] J. Geelan. Twenty one experts define
cloud computing. Virtualization,
August 2008. Electronic Magazine, article
available at
http://virtualization.syscon.com/node/612375.