Skip to main content

Security Strategy of Campus Network Data Center in Cloud Environment

  • Conference paper
  • First Online:
  • 2300 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Abstract

In the campus network security strategy, the traditional university data center only considers traffic safety as the consideration factor, in the cloud computing environment, the security model of the virtualization data center is transformed from 2d to 3d. This paper proposes four security strategies and designs the security and equipment deployment of campus network data center under the cloud environment, thus improving the security of campus network data center in the cloud environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cook, G., Horn, J.V.: How dirty is your data? A look at the energy choices that power cloud computing. Greenpeace International Technology report, April 2015

    Google Scholar 

  2. Qureshi, A.: Power-demand routing in massive geo-distributed systems. Ph.D. dissertation. Massachusetts Institute of Technology (2016)

    Google Scholar 

  3. Gao, P.X., Curtis, A.P., Wong, B., Keshav, S.: It’s not easy being green. In: Proceeding of the ACM SIGCOMM 2012, Helsinki, Finland, pp. 211–222 (2012)

    Google Scholar 

  4. The theory and practice of the new generation of network construction. Electronic Industry Press, Beijing, October 2015

    Google Scholar 

  5. Xu, X., Lei, H.: Discussion on the technology of virtualization technology in the construction of university informatization. J. Southwest Univ. Natl. Nat. Sci. Ed. 34(4), 818–822 (2014). Chengdu

    Google Scholar 

  6. Joysula, V., Orr, M., Page, G., Jun, Z.: Automation of cloud computing and data center. People’s Post and Telecommunications Press, Beijing, July 2016

    Google Scholar 

  7. Xue, L., Xu, K.: The utility maximization model of cloud virtual machine resource allocation. J. Comput. Sci. (2), 252–262 (2015)

    Google Scholar 

  8. Qin, X., Zhang, W., Wei, J., et al.: Status and challenges of distributed cache technology under cloud computing environment. J. Softw. 24(1), 50–66 (2017)

    Article  Google Scholar 

  9. Zhang, T.: Management of cloud management from data center. IP Pilot. (4), 121–123 (2016)

    Google Scholar 

  10. Yu, S., Lu, Y., Wang, F.: Research and design of data deletion architecture based on cloud storage. Comput. Syst. Appl. 22(1), 208–211 (2015)

    Google Scholar 

  11. Liu, X., Yang, S., Guo, L.: Snowflake structure: a new data center network structure. J. Comput. Sci. (1), 76–86 (2014)

    Google Scholar 

  12. Deng, W., Liu, F., Jin, H.: New energy application in cloud computing data center: research status and trends. J. Comput. Sci. (3), 582–588 (2013)

    Google Scholar 

  13. Ye, K., Wu, Z., Jiang, X., He, Q.: Energy consumption management of virtualization cloud computing platform. J. Comput. Sci. (6), 1262–1285 (2016)

    Google Scholar 

  14. Feng, Zhang, M., Zhang, Y., et al.: Research on cloud computing security. J. Softw. 22(1), 71–83 (2015)

    Google Scholar 

Download references

Acknowledgements

I want to take this chance to thanks to Wang Bin and Wan Quan. In the process of composing this paper, they give me many academic and constructive advices and help me to correct my paper.

At the same time, I would like to appreciate my research team for the approved fund project, ShanDong University Science and Technology Project (J16LN54) and Qingdao University of Technology Project (2016JY007/2017KY008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ge Suhui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suhui, G., Quan, W., Wenhui, S. (2018). Security Strategy of Campus Network Data Center in Cloud Environment. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics