Author : Manjunath D R 1
Date of Publication :29th August 2018
Abstract: The Cloud Computing calculate the duty to distribute on the resource pool which the massive computers constitute, enables each kind of application system according to need to gain the computation strength, the storage space and all kinds of software service. Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-aService (PaaS), and Infrastructure-as-a-Service (IaaS). However, when networking aspects for distributed clouds are considered, there is little support and the effort is often underestimated. A new approach called cloud networking adds networking functionalities to cloud computing and enables dynamic and flexible placement of virtual resources crossing provider borders. This allows various kinds of optimization, e.g., reducing latency or network load. However, this approach introduces new security challenges. Cloud networking aims at providing on-demand elastic network services to connect existing data centre based cloud infrastructures across wide area networks. This paper presents new the cloud networking Architecture and presents a security architecture that enables a user of cloud networking to define security requirements and enforce them in the cloud networking infrastructure
- “Google Docs,” July 2011. [Online]. Available: http://http: //docs. google .com
- “Google App Engine, “July 2011. [Online]. Available: http://code.google.com/appengine/
- “Amazon Virtual Private Cloud,” July 2011. [Online]. Available: http://http :// aws. amazon. com ec2 /
- The SAIL project web site. http://www.sailproject.eu/.
- Volker Fusenig and Ayush Sharma. Security architecture for cloud networking. In Computing,Networking and Communications (ICNC), 2012 International Conference on, pages 45-49, 30 2012-feb. 2 2012.
- G. P. Koslovski and P. V.-B. Primet, “Vxdl: Virtual resources and interconnection networks description language,” Engineering, pp.138–154, 2009. [Online]. Available: http:// www. springerlink. com/index/N131016226414516.pdf
- A. Streitberger, W. Ruppel, “Cloud computing security protection goals, taxonomy, market review,” Institute for Secure Information Technology SIT, Tech. Rep., 2010.