An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls

2021 ◽  
pp. 1-12
Author(s):  
Muhammad Iftikhar Hussain ◽  
Jingsha He ◽  
Nafei Zhu ◽  
Zulfiqar Ali Zardari ◽  
Fahad Razque ◽  
...  

Cloud computing on-demand dynamicity in nature of end-user that leads towards a hybrid cloud model deployment is called a multi-cloud. Multi-cloud is a multi-tenant and multi-vendor heterogeneous cloud platform in terms of services and security under a defined SLA (service level agreement). The diverse deployment of the multi-cloud model leads to rise in security risks. In this paper, we define a multi-cloud model with hybridization of vendor and security to increase the end-user experience. The proposed model has a heterogeneous cloud paradigm with a combination of firewall tracts to overcome rising security issues. The proposed work consists of three steps, firstly, all incoming traffic from the consumer end into five major groups called ambient. Secondly, design a next-generation firewall (NGFW) topology with a mixture of tree-based and demilitarized zone (DMZ) implications. Test implementation of designed topology performed by using a simple DMZ technique in case of vendor-specific model and NGFW on hybrid vendor based multi-cloud model. Furthermore, it also defines some advantages of NGFW to overcome these concerns. The proposed work is helpful for the new consumer to define their dynamic secure cloud services under a single SLA before adopting a multi-cloud platform. Finally, results are compared in terms of throughput and CPU utilization in both cases.

2021 ◽  
Vol 11 (7) ◽  
pp. 3012
Author(s):  
Muhammad Iftikhar Hussain ◽  
Jingsha He ◽  
Nafei Zhu ◽  
Fahad Sabah ◽  
Zulfiqar Ali Zardari ◽  
...  

In the modern digital era, everyone is partially or fully integrated with cloud computing to access numerous cloud models, services, and applications. Multi-cloud is a blend of a well-known cloud model under a single umbrella to accomplish all the distinct nature and realm requirements under one service level agreement (SLA). In current era of cloud paradigm as the flood of services, applications, and data access rise over the Internet, the lack of confidentiality of the end user’s credentials is rising to an alarming level. Users typically need to authenticate multiple times to get authority and access the desired services or applications. In this research, we have proposed a completely secure scheme to mitigate multiple authentications usually required from a particular user. In the proposed model, a federated trust is created between two different domains: consumer and provider. All traffic coming towards the service provider is further divided into three phases based on the concerned user’s data risks. Single sign-on (SSO) and multifactor authentication (MFA) are deployed to get authentication, authorization, accountability, and availability (AAAA) to ensure the security and confidentiality of the end user’s credentials. The proposed solution exploits the finding that MFA achieves a better AAAA pattern as compared to SSO.


2017 ◽  
Vol 4 (3) ◽  
pp. 83-95
Author(s):  
T. A. Chavan ◽  
P. Saras

Wireless communication technology is progressing very vastly. With this change in technology customer services for multimedia and non-multimedia are increasing day by day. But due to limited resources of the wireless network, we need to design an efficient CAC algorithm to enhance QoS levels for end users. The Quality of service (QoS) enhancement in the wireless network is related to making an efficient use of current network resources and the optimization of the users. Call acceptance in CAC is one of the challenge in mobile cellular networks to ensure that the acceptance of a new call into a resource limited wireless network should not deviate the service level Agreement (SLAs) at the time of conversations. In the next generation wireless network, CAC has the direct impact on QoS for user calls & overall system performance. To handle handoff calls and new calls in cellular network channel reservation scheme have been already proposed to reserve system bandwidth for higher priority call for CAC. This earlier proposed scheme is not as per the required level of satisfaction because the available reversed bandwidth is not allocated properly in case of least handoff rate. In this, the authors like to present a new channel borrowing scheme where new non real time (NRT) calls can make use of reserved channels. It can borrow this reserved channel on a temporary basis and after this immediately if any handoff call enters the current cell and no any other channels are available, then it will pre-empt the channel from an earlier borrowed NRT user if exists. This pre-empted NRT call is kept in the priority queue to consider its service when any channel becomes free. The number of NRT calls in the queue should not be large to avoid delayed service. The fundamental objective of the proposed scheme to design of the system for evaluating the results and comparing with the results of the existing system. From the results of current research work, it is observed that proposed scheme decreases call dropping probability which increase slightly in call blocking rate over high-density handoff call rate.


Author(s):  
A.C. Leonard

End users have expectations regarding services and support, and the quality thereof, provided by the supplier. They compare their expectations to the received service to assess the service quality (Coye, 2004). In order to ensure that the service supplied by the service provider meets the expectations of end users, a successful service level agreement (SLA) is required. Quality SLA’s clearly define, amongst many other elements, the commitments and responsibilities of the IT service provider and end users within the service delivery processes (Larson, 1998). One method of measuring the success of SLA’s is by using service metrics with regard to the availability, reliability, serviceability, response, and user satisfaction of the SLA (Larson, 1998). Therefore, the success of the SLA depends on a clear, common understanding of the services and service quality between the service provider and end users. Furthermore commitment, trust, and cooperation between all parties is necessary to achieve success with SLA’s (Hiles, 1994). However, in this paper it is argued that all these soft issues can only form a basis when sound relationships are established and maintained between the IT service provider and end users (Leonard, 2002). This paper aims to determine how the establishment of a sound IT-end user relationship can add value to the SLA for both the IT service provider and the end users, and increase the success of SLA’s.


Author(s):  
Tapati Bandopadhyay ◽  
Pradeep Kumar

The concept of presence was initially associated with an instant messaging service, allowing an end user to recognize the presence of a peer online to send or receive messages. Now the technology has grown up to include various services like monitoring performance of any type of end user device, and services are accessible from anywhere, any time. The need for enhanced value remains the driving force behind these services, for example, Voice over Internet Protocol (VoIP) services, which is drawing tremendous research interest in services performance evaluation, measurement, benchmarking, and monitoring. Monitoring service level parameters happens to be one of the most interesting application-oriented research issues because various service consumers at the customer companies/end users’ level are finding it very difficult to design and monitor an effective SLA (Service Level Agreement) with the presence-enabled service providers. This chapter focuses on to these specific issues and presents a new approach of SLA monitoring through Data Envelopment Analysis (DEA). This extreme point approach actually can work much better in the context of SLA monitoring than general central-tendency-based statistical tools, a fact which has been corroborated by similar application examples of DEA presented in this chapter and has therefore it acts as the primary motivation to propose this new approach. Towards this end, this chapter first builds up the context of presence-enabled services (Day, Rosenburg, & Sugano, 2000), its SLA and SLA parameters, and the monitoring requirements. Then it explains the basics of DEA and its application in various other engineering and services context. Ultimately, a DEA application framework for monitoring an SLA of presence-enabled services is proposed which can serve as a clear guideline for the customers of presence-enabled services, not only for SLA monitoring but also at various other stages of implementing presence-enabled services frameworks. This approach exploits the definitive suitability of the application of DEA methods to presence-enabled service monitoring problems, and can be easily implemented by the industry practitioners.


2020 ◽  
Vol 10 (12) ◽  
pp. 4110
Author(s):  
Qian Huang ◽  
Weichuan Yin ◽  
Jiuyu An ◽  
Yuanxiang Zhou

This paper describes the development and plans for the implementation of a cloud-based logistics platform to enable and optimize cross-border shipping, using the China Railway Express (CR Express) in the context of China’s recent One Belt and One Road (OBOR) initiative as an example of an extremely complex system that is running at suboptimal efficiency. We design a cross-border logistics information cloud platform (CLICP) and its architecture. The proposed CLICP comprises a hybrid cloud model with three layers of cloud services. We also examine the CLICP’s operation and the design of the platform’s functions, including core business and value-added service functions, such as real-time bidding, freight information push, and carrier one-stop service management functions. Finally, we propose a model for deploying our CLICP. Our study makes a significant contribution to the literature because of its hybrid cloud model architecture and for the completeness of its functionality. The study also has a good application prospect for the operation of CR Express and will play a better supporting role in cross-border logistics.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


Author(s):  
Bahar Asgari ◽  
Mostafa Ghobaei Arani ◽  
Sam Jabbehdari

<p>Cloud services have become more popular among users these days. Automatic resource provisioning for cloud services is one of the important challenges in cloud environments. In the cloud computing environment, resource providers shall offer required resources to users automatically without any limitations. It means whenever a user needs more resources, the required resources should be dedicated to the users without any problems. On the other hand, if resources are more than user’s needs extra resources should be turn off temporarily and turn back on whenever they needed. In this paper, we propose an automatic resource provisioning approach based on reinforcement learning for auto-scaling resources according to Markov Decision Process (MDP). Simulation Results show that the rate of Service Level Agreement (SLA) violation and stability that the proposed approach better performance compared to the similar approaches.</p>


Author(s):  
Govindaraj Ramya ◽  
Govindaraj Priya ◽  
Chowdhury Subrata ◽  
Dohyeun Kim ◽  
Duc Tan Tran ◽  
...  

<p class="0abstract">The extremely vibrant, scattered, and non–transparent nature of cloud computing formulate trust management a significant challenge. According to scholars the trust and security are the two issues that are in the topmost obstacles for adopting cloud computing. Also, SLA (Service Level Agreement) alone is not necessary to build trust between cloud because of vague and unpredictable clauses. Getting feedback from the consumers is the best way to know the trustworthiness of the cloud services, which will help them improve in the future. Several researchers have stated the necessity of building a robust management system and suggested many ideas to manage trust based on consumers' feedback. This paper has reviewed various reputation-based trust management systems, including trust management in cloud computing, peer-to-peer system, and Adhoc system. </p>


Author(s):  
Samir Tata ◽  
Mohamed Mohamed ◽  
Takashi Sakairi ◽  
Nagapramod Mandagere ◽  
Obinna Anya ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document