dc.contributor.author |
Liyanage, G |
|
dc.contributor.author |
Fernando, S |
|
dc.date.accessioned |
2014-06-23T11:48:37Z |
|
dc.date.available |
2014-06-23T11:48:37Z |
|
dc.date.issued |
2014-06-23 |
|
dc.identifier.uri |
http://dl.lib.mrt.ac.lk/handle/123/10065 |
|
dc.description.abstract |
Cloud computing is becoming increasingly popular in the business world due to the advantages that it offers by eliminating the need to have infrastructure within business premises and dedicated staff to maintain infrastructure. Apart from the advantages the cloud offers, it can also bring in some potential security threats to the organization by not having organization specific firewalls, monitoring mechanisms and physical security. This limits the chances that companies move onto the cloud, which could have otherwise become an extremely attractive alternative for the businesses. The need is to make cloud services more reliable and trustworthy for the businesses by providing a proper security mechanism that addresses the existing drawbacks in cloud computing. The key is a firewall model that constitutes a centralized Cloud Firewall Management Server and Firewall Clients that communicate with the Cloud Firewall Management Server. This enables the organizations to maintain their own control over the firewall and firewall policies. This model does not share any information with the cloud service provider thereby providing a fully trusted solution for the businesses and additionally caters for the audit needs of the businesses by making all the information available at the central Cloud Firewall Management Server. |
en_US |
dc.language.iso |
en |
en_US |
dc.source.uri |
http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31010 |
en_US |
dc.title |
Firewall model for cloud computing |
en_US |
dc.type |
Conference-Abstract |
en_US |
dc.identifier.department |
Department of Computer Science and Engineering, |
en_US |
dc.identifier.year |
2013 |
en_US |
dc.identifier.conference |
IEEE 8th International Conference on Industrial and Information Systems, ICIIS 2013 |
en_US |
dc.identifier.place |
Peradeniya |
en_US |
dc.identifier.pgnos |
pp. 86-91 |
en_US |