Panneerselvam et al., 2012 - Google Patents
An investigation of the effect of cloud computing on network managementPanneerselvam et al., 2012
View PDF- Document ID
- 3665820219173298566
- Author
- Panneerselvam J
- Liu L
- Hill R
- Zhan Y
- Liu W
- Publication year
- Publication venue
- 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems
External Links
Snippet
Cloud computing is one of the fascinating advancements in the computing technology. With its fashionable features, cloud deployment is well spread in a wide range of applications. Managing the cloud environment is a complex process because of the virtual nature of the …
- 230000000694 effects 0 title abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhat et al. | Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities | |
US11438421B2 (en) | Accessing resources in a remote access or cloud-based network environment | |
US10331882B2 (en) | Tracking and managing virtual desktops using signed tokens | |
EP3669514A1 (en) | Tenant management method and system in a cloud computing environment | |
CN111164571A (en) | Secure processing based control plane function virtualization in cloud systems | |
Raza et al. | Cloud and fog computing: A survey to the concept and challenges | |
US10243959B1 (en) | Secure cloud computing framework | |
Singh et al. | Overview of security issues in cloud computing | |
Ullrich et al. | Network-based secret communication in clouds: A survey | |
CN111818081B (en) | Virtual encryption machine management method, device, computer equipment and storage medium | |
Panneerselvam et al. | An investigation of the effect of cloud computing on network management | |
CN113923023A (en) | Authority configuration and data processing method, device, electronic equipment and medium | |
Sharma et al. | Cloud computing—security, issues, and solutions | |
Mohanty et al. | CIA Triad for Achieving Accountability in Cloud Computing Environment | |
Rahman et al. | Blockchain-enabled SLA compliance for crowdsourced edge-based network function virtualization | |
Mladenov et al. | Studying the effect of internal DOS attacks over SDN controller during switch registration process | |
Devi et al. | Study of architecture and issues in services of cloud computing | |
CN113849558B (en) | Method and device for deploying data sharing service | |
Abdellaoui et al. | A security scheme for mobile cloud using multi-agents system | |
Waqas et al. | ReSA: Architecture for resources sharing between clouds | |
Karim et al. | Securing the fog using software-defined networking: A study of challenges, approaches, and open problems | |
Kim et al. | Mobile-based dos attack security agent in sensor networking | |
Singh et al. | Security and Privacy Aspects of Authorized and Secure Communications in Dew-Assisted IoT Systems | |
Kumar et al. | Cloud security based on IaaS model prospective | |
Thakur et al. | A Review Paper on Cloud Computing & Security Issue |