메뉴 건너뛰기




Volumn 9, Issue 1, 2016, Pages 67-81

NetSecCC: A scalable and fault-tolerant architecture for cloud computing security

Author keywords

Fault tolerance; On demand service; Scalability; security group; Security inspection chain

Indexed keywords

CLOUD COMPUTING; FAULT TOLERANCE; NETWORK ARCHITECTURE; SCALABILITY;

EID: 84953364314     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-014-0314-y     Document Type: Article
Times cited : (28)

References (42)
  • 1
    • 85065163256 scopus 로고    scopus 로고
    • Cully B, Lefebvre G, Meyer D, Feeley M, Hutchinson N, Remus A W (2008) High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp 161–174. San Francisco
    • Cully B, Lefebvre G, Meyer D, Feeley M, Hutchinson N, Remus A W (2008) High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp 161–174. San Francisco
  • 2
    • 85099527867 scopus 로고    scopus 로고
    • Rendezvous: towards fast event detecting in wireless sensor and actor networks
    • Dong M, Ota K, He L, Suguo D, Zhu H, Guo S (2013) Rendezvous: towards fast event detecting in wireless sensor and actor networks. Computing:1–16
    • (2013) Computing , pp. 1-16
    • Dong, M.1    Ota, K.2    He, L.3    Suguo, D.4    Zhu, H.5    Guo, S.6
  • 4
    • 84868152765 scopus 로고    scopus 로고
    • Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp 857–862. IEEE
    • Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp 857–862. IEEE
  • 5
    • 84953357852 scopus 로고    scopus 로고
    • BIG-IP Configuring High Availability F5 Networks Inc
    • BIG-IP Configuring High Availability F5 Networks Inc. http://support.f5.com/kb/enus/products/big-ip_ltm/manuals/product/tmos_management_guide_10_0_0/tmos_high_avail.html
  • 7
    • 84953347434 scopus 로고    scopus 로고
    • IPFire
    • IPFire. http://www.ipfire.org/
  • 8
    • 52949097299 scopus 로고    scopus 로고
    • Modeling middleboxes
    • Joseph D, Stoica I (2008) Modeling middleboxes. Network, IEEE 22 (5):20–25
    • (2008) Network, IEEE , vol.22 , Issue.5 , pp. 20-25
    • Joseph, D.1    Stoica, I.2
  • 9
    • 84899825694 scopus 로고    scopus 로고
    • Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
    • Li H, Lin X, Yang H, X Liang, Lu R, Shen X (2013) Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst:1
    • (2013) IEEE Trans Parallel Distrib Syst , pp. 1
    • Li, H.1    Lin, X.2    Yang, H.3    Liang, X.4    Lu, R.5    Shen, X.6
  • 10
    • 84902287084 scopus 로고    scopus 로고
    • An efficient merkle-tree-based authentication scheme for smart grid
    • Li H, Rongxing L, Zhou L, Bo Y, Shen X (2013) An efficient merkle-tree-based authentication scheme for smart grid. Syst J IEEE:655–663
    • (2013) Syst J IEEE , pp. 655-663
    • Li, H.1    Rongxing, L.2    Zhou, L.3    Bo, Y.4    Shen, X.5
  • 12
    • 84861307113 scopus 로고    scopus 로고
    • The nist definition of cloud computing (draft)
    • Mell P, Grance T (2011) The nist definition of cloud computing (draft). NIST Spec Publ 800 (145):7
    • (2011) NIST Spec Publ , vol.800 , Issue.145 , pp. 7
    • Mell, P.1    Grance, T.2
  • 13
    • 84953358520 scopus 로고    scopus 로고
    • ModSecurity
    • ModSecurity. http://www.modsecurity.org/
  • 15
    • 84953347051 scopus 로고    scopus 로고
    • NVD
    • NVD. http://nvd.nist.gov/
  • 16
    • 84953355813 scopus 로고    scopus 로고
    • AWS [Online]
    • AWS [Online]. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
  • 17
    • 84953345503 scopus 로고    scopus 로고
    • HackBar [Online]
    • HackBar [Online]. https://addons.mozilla.org/en-us/firefox/addon/hackbar/
  • 18
    • 84953353926 scopus 로고    scopus 로고
    • IXIA [Online]
    • IXIA [Online]. http://www.ixiacom.com/
  • 19
    • 84953356942 scopus 로고    scopus 로고
    • Nikto [Online]
    • Nikto [Online]. http://www.netsecurity.com
  • 20
    • 84953354596 scopus 로고    scopus 로고
    • OpenSSL [Online]
    • OpenSSL [Online]. http://www.openssl.org/
  • 21
    • 84953362478 scopus 로고    scopus 로고
    • SecaaS [Online]
    • SecaaS [Online]. https://cloudsecurityalliance.org/research/secaas/
  • 22
    • 84953366641 scopus 로고    scopus 로고
    • SQL Inject [Online]
    • SQL Inject [Online]. https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/
  • 23
    • 84953369889 scopus 로고    scopus 로고
    • Tamper Data [Online]
    • Tamper Data [Online]. https://addons.mozilla.org/en-us/firefox/addon/tamper-data/
  • 24
    • 84953355041 scopus 로고    scopus 로고
    • VMware [Online]
    • VMware [Online]. http://www.vmware.com/
  • 25
    • 84953355491 scopus 로고    scopus 로고
    • Zap [Online]
    • Zap [Online]. https://code.google.com/p/zaproxy/
  • 26
    • 84953346156 scopus 로고    scopus 로고
    • Apache HTTP Server Project
    • Apache HTTP Server Project[Online]. http://httpd.apache.org/
  • 27
    • 84953355084 scopus 로고    scopus 로고
    • McAfee SaaS Email Protection and Web Protection
    • McAfee SaaS Email Protection and Web Protection. http://www.mcafee.com/us/products/security-as-a-service/index.aspx
  • 28
    • 84883284152 scopus 로고    scopus 로고
    • Qazi ZA, Cheng-Chun T, Chiang L, Miao R, Sekar V, Minlan Y (2013) Simple-fying middlebox policy enforcement using sdn. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 27–38, ACM
    • Qazi ZA, Cheng-Chun T, Chiang L, Miao R, Sekar V, Minlan Y (2013) Simple-fying middlebox policy enforcement using sdn. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 27–38, ACM
  • 29
    • 84893281460 scopus 로고    scopus 로고
    • Rajagopalan S, Williams D, Jamjoom H (2013) Pico replication: a high availability framework for middleboxes. In Proceedings of the 4th annual Symposium on Cloud Computing, pp 1, ACM
    • Rajagopalan S, Williams D, Jamjoom H (2013) Pico replication: a high availability framework for middleboxes. In Proceedings of the 4th annual Symposium on Cloud Computing, pp 1, ACM
  • 30
    • 85076716117 scopus 로고    scopus 로고
    • Rajagopalan S, Williams D, Jamjoom H, Andrew W (2013) Split/merge: System support for elastic execution in virtual middleboxes. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, pp 227–240, USENIX Association
    • Rajagopalan S, Williams D, Jamjoom H, Andrew W (2013) Split/merge: System support for elastic execution in virtual middleboxes. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, pp 227–240, USENIX Association
  • 32
    • 84996432988 scopus 로고    scopus 로고
    • Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G (2012) Design and implementation of a consolidated middlebox architecture. In Proceedings NSDI
    • Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G (2012) Design and implementation of a consolidated middlebox architecture. In Proceedings NSDI
  • 33
    • 84888450226 scopus 로고    scopus 로고
    • Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G (2011) The middlebox manifesto: enabling innovation in middlebox deployment. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp 21, ACM
    • Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G (2011) The middlebox manifesto: enabling innovation in middlebox deployment. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp 21, ACM
  • 35
    • 84953364386 scopus 로고    scopus 로고
    • SpamAssassin
    • SpamAssassin. http://spamassassin.apache.org/
  • 36
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34 (1):1–11
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 37
    • 84889713681 scopus 로고    scopus 로고
    • Topilski N, Albrecht JR, Vahdat A (2008) Improving scalability and fault tolerance in an application management infrastructure. In LASCO
    • Topilski N, Albrecht JR, Vahdat A (2008) Improving scalability and fault tolerance in an application management infrastructure. In LASCO
  • 38
    • 84953358543 scopus 로고    scopus 로고
    • High Availability Reference Guide Vyatta Inc
    • High Availability Reference Guide Vyatta Inc. http://www.vyatta.com/downloads/documentation/VC6.5/Vyatta-HA_6.5R1_v01.pdf
  • 40
    • 79952671882 scopus 로고    scopus 로고
    • Hanqian W, Yi D, Winer C, Li Y (2010) Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp 18–21. IEEE
    • Hanqian W, Yi D, Winer C, Li Y (2010) Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp 18–21. IEEE
  • 41
    • 78751506007 scopus 로고    scopus 로고
    • Yue Wu, Noonan JP, Agaian S (2010) Binary data encryption using the sudoku block cipher. In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, pp 3915–3921. IEEE
    • Yue Wu, Noonan JP, Agaian S (2010) Binary data encryption using the sudoku block cipher. In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, pp 3915–3921. IEEE
  • 42
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592
    • (2012) Futur Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.