By Topic

IP based security architecture of virtual network in cloud computing system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jong-Sung Yang ; Dept. of Mobile Syst. Eng., Sungkyunkwan Univ., Suwon, South Korea ; Hyoung-Kee Choi

Advantages of a cloud computing sharing IT resources can also be vulnerable from the security perspective. Because users could be allocated in the same virtual network with adversary users, the traffic generated by adversary users causes a decline in the performance of the virtual machine of others users. This leads to the problem of erroneous billing. Proposed architecture minimizes the influence of malicious traffic using the classification of traffic and encryption based on an IP routing table. The analysis shows additional resources required to the proposed architecture in a cloud computing system through performance evaluation using real dataset gathered from a company. Further we suggest effective method to apply proposed architecture in a cloud computing system.

Published in:

Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International

Date of Conference:

27-31 Aug. 2012