Research on a security enhancement system for cloud service of cloud computing environment

ISSN: 22783075
0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Lately, a DDoS attack paralyze Internet systems with access attacks and conquer the network itself. We need a solution to build a security enhancement system for cloud computing service.The proposed method uses the desktop PCs to enhance the information security for cloud service through two network separation to defend against cyber attacks. One is physical network separation using 2 PCs using hypervisor architecture, select the network using KVM(Keyboard, Video monitor, Mouse) switched controller to select the network. The other is logical network partition using one PC with two kind of OSs, but network is divided through virtualization. Though a DDoS attack occurs on the HOST PC2 of the external network, the CPU and memory for the internal HOST PC1 are not affected by DDoS attack. It is confirmed that the CPU and memory for the internal network and the external network are processed independently of each other. The results of HOST CPU usage and PC1 memory usage measured during DDoS attack on HOST's PC2 were measured low because they were not executed in normal network environment. The HOST PC2 malicious code infection caused HOST PC1 CPU usage and memory usage to be measured with low performance and HOST PC1 performance will not change. It can be seen that the CPU usage of PC2 increases rapidly when it is infected with malicious code of HOST PC2. It is confirmed that the internal and external network for the HOST PC operate independently of each other through CPU and memory overload test. The proposal system using network separation is a security enhancement system that can provide security information about cloud service of cloud computing environment for cyber attack.

Cite

CITATION STYLE

APA

Cho, Y. S., & Na, W. (2019). Research on a security enhancement system for cloud service of cloud computing environment. International Journal of Innovative Technology and Exploring Engineering, 8(8), 926–933.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free