SlideShare a Scribd company logo
Collaborative network security in multi-tenant 
data center for cloud computing 
A data center is an infrastructure that supports Internet service. Cloud computing is rapidly changing the 
face of the Internet service infrastructure, enabling even small organizations to quickly build Web and 
mobile applications for millions of users by taking advantage of the scale and flexibility of shared 
physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data 
and applications in shared data centers, blurring the network boundaries between each tenant in the 
cloud. In addition, different tenants have different security requirements, while different security 
policies are necessary for different tenants. Network virtualization is used to meet a diverse set of 
tenant-specific requirements with the underlying physical network, enabling multi-tenant datacenters to 
automatically address a large and diverse set of tenants requirements. In this paper, we propose the 
system implementation of vCNSMS, a collaborative network security prototype system used in a multi-tenant 
data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet 
inspection with an open source UTM system. A security level based protection policy is proposed for 
simplifying the security rule management for vCNSMS. Different security levels have different packet 
inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is 
also integrated into vCNSMS for intelligence flow processing to protect from possible network attacks 
inside a data center network.

More Related Content

PPTX
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
DOC
Integrity for join queries in the cloud
ODP
Week13
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
Mona secure multi owner data sharing for dynamic groups in the cloud
Integrity for join queries in the cloud
Week13
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
A highly scalable key pre distribution scheme for wireless sensor networks

What's hot (19)

DOCX
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
DOCX
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
PDF
Psdot 12 a secure erasure code-based cloud storage
PPT
Introducción a la Arquitectura de OpenLaszlo
DOCX
Providing user security guarantees in public infrastructure clouds
DOCX
Secure cloud storage with data dynamic using secure network coding technique
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
Comparison: VNS3 vs Vyatta
ODP
Week13
DOCX
Toward secure and dependable
PDF
EU H2020 PRISMACLOUD Project Overview
PPTX
Secure sensitive data sharing on a big data platform
PDF
Comments on “public integrity auditing for dynamic data sharing with multiuse...
DOCX
Tutorial 4th
PDF
Providing user security guarantees in public infrastructure clouds
PDF
Secure sensitive data sharing on a big data platform
PDF
Week13
PDF
Cloud gateways for regulatory compliance
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage S...
Psdot 12 a secure erasure code-based cloud storage
Introducción a la Arquitectura de OpenLaszlo
Providing user security guarantees in public infrastructure clouds
Secure cloud storage with data dynamic using secure network coding technique
A highly scalable key pre distribution scheme for wireless sensor networks
Comparison: VNS3 vs Vyatta
Week13
Toward secure and dependable
EU H2020 PRISMACLOUD Project Overview
Secure sensitive data sharing on a big data platform
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Tutorial 4th
Providing user security guarantees in public infrastructure clouds
Secure sensitive data sharing on a big data platform
Week13
Cloud gateways for regulatory compliance
Ad

Similar to Collaborative network security in multi tenant data center for cloud computing (20)

DOCX
Providing user security guarantees in public infrastructure clouds
DOCX
Cloude computing notes for Rgpv 7th sem student
PDF
E0952731
PPTX
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PDF
Providing user security guarantees
PDF
Providing user security guarantees
PDF
As03302670271
PPT
CLOUD COMPUTING AND STORAGE
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
50620130101004
PDF
Paper id 27201448
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
DOCX
A Trusted IaaS Environment with Hardware Security Module
DOCX
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
DOCX
A trusted iaa s environment
DOCX
A Trusted IaaS Environment with Hardware Security Module
PDF
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
PDF
Understanding the cloud computing stack
Providing user security guarantees in public infrastructure clouds
Cloude computing notes for Rgpv 7th sem student
E0952731
Enhancing Data Storage Security in Cloud Computing Through Steganography
Providing user security guarantees
Providing user security guarantees
As03302670271
CLOUD COMPUTING AND STORAGE
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
50620130101004
Paper id 27201448
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
A Trusted IaaS Environment with Hardware Security Module
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
A trusted iaa s environment
A Trusted IaaS Environment with Hardware Security Module
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Understanding the cloud computing stack
Ad

More from ieeepondy (20)

PDF
Demand aware network function placement
PDF
Service description in the nfv revolution trends, challenges and a way forward
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Spatial related traffic sign inspection for inventory purposes using mobile l...
PDF
Standards for hybrid clouds
PDF
Rfhoc a random forest approach to auto-tuning hadoop's configuration
PDF
Resource and instance hour minimization for deadline constrained dag applicat...
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PDF
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
PDF
Scalable cloud–sensor architecture for the internet of things
PDF
Scalable algorithms for nearest neighbor joins on big trajectory data
PDF
Robust workload and energy management for sustainable data centers
PDF
Privacy preserving deep computation model on cloud for big data feature learning
PDF
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
PDF
Protection of big data privacy
PDF
Power optimization with bler constraint for wireless fronthauls in c ran
PDF
Performance aware cloud resource allocation via fitness-enabled auction
PDF
Performance limitations of a text search application running in cloud instances
PDF
Performance analysis and optimal cooperative cluster size for randomly distri...
PDF
Predictive control for energy aware consolidation in cloud datacenters
Demand aware network function placement
Service description in the nfv revolution trends, challenges and a way forward
Secure optimization computation outsourcing in cloud computing a case study o...
Spatial related traffic sign inspection for inventory purposes using mobile l...
Standards for hybrid clouds
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Resource and instance hour minimization for deadline constrained dag applicat...
Reliable and confidential cloud storage with efficient data forwarding functi...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Scalable cloud–sensor architecture for the internet of things
Scalable algorithms for nearest neighbor joins on big trajectory data
Robust workload and energy management for sustainable data centers
Privacy preserving deep computation model on cloud for big data feature learning
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Protection of big data privacy
Power optimization with bler constraint for wireless fronthauls in c ran
Performance aware cloud resource allocation via fitness-enabled auction
Performance limitations of a text search application running in cloud instances
Performance analysis and optimal cooperative cluster size for randomly distri...
Predictive control for energy aware consolidation in cloud datacenters

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
Computing-Curriculum for Schools in Ghana
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharma ospi slides which help in ospi learning
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Sports Quiz easy sports quiz sports quiz
Cell Structure & Organelles in detailed.
Computing-Curriculum for Schools in Ghana
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
VCE English Exam - Section C Student Revision Booklet
STATICS OF THE RIGID BODIES Hibbelers.pdf
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
01-Introduction-to-Information-Management.pdf
Classroom Observation Tools for Teachers
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Sports Quiz easy sports quiz sports quiz

Collaborative network security in multi tenant data center for cloud computing

  • 1. Collaborative network security in multi-tenant data center for cloud computing A data center is an infrastructure that supports Internet service. Cloud computing is rapidly changing the face of the Internet service infrastructure, enabling even small organizations to quickly build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network, enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used in a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet inspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for intelligence flow processing to protect from possible network attacks inside a data center network.