全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Realize a Secure Overlay Network through Cloud Computing

DOI: 10.11591/socnetvircom.v1i2.2196

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cloud computing is mainly based on virtualization which enables multi-tenancy and scalable shared resources used on an On-demand basis by all tenants. Since overlay networks are also based on virtualized nodes for implementing network services, this fact allows combining both techniques to reap the benefits of each other together. This is particularly useful for the deployment of new transparent network security services over the current networks in order to enhance their protection. The primary contribution of this paper proposes and analyzes a cloud-based security overlay network that can be used to offer an integrated set of several security services. Cloud Computing and Overlay Networks have newly received a lot of attention in computing and networking areas. These technologies are being demoralized and implemented in the design of large network infrastructures. They are being widely deployed by organizations, and research interests keep growing. We explore the use of Cloud computing in implementing a security overlay network. In particular, we propose and analyze a general cloud-based security overlay network that can be used as a transparent overlay network to provide security services such as Intrusion Detection System (IDS), Anti-Virus software, Anti-Spam software and Denial of Service (DOS). Each of these in-cloud security services is analyzed in terms of its effectiveness, performance, flexibility, control, and cost.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413