Abstract
In the campus network security strategy, the traditional university data center only considers traffic safety as the consideration factor, in the cloud computing environment, the security model of the virtualization data center is transformed from 2d to 3d. This paper proposes four security strategies and designs the security and equipment deployment of campus network data center under the cloud environment, thus improving the security of campus network data center in the cloud environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cook, G., Horn, J.V.: How dirty is your data? A look at the energy choices that power cloud computing. Greenpeace International Technology report, April 2015
Qureshi, A.: Power-demand routing in massive geo-distributed systems. Ph.D. dissertation. Massachusetts Institute of Technology (2016)
Gao, P.X., Curtis, A.P., Wong, B., Keshav, S.: It’s not easy being green. In: Proceeding of the ACM SIGCOMM 2012, Helsinki, Finland, pp. 211–222 (2012)
The theory and practice of the new generation of network construction. Electronic Industry Press, Beijing, October 2015
Xu, X., Lei, H.: Discussion on the technology of virtualization technology in the construction of university informatization. J. Southwest Univ. Natl. Nat. Sci. Ed. 34(4), 818–822 (2014). Chengdu
Joysula, V., Orr, M., Page, G., Jun, Z.: Automation of cloud computing and data center. People’s Post and Telecommunications Press, Beijing, July 2016
Xue, L., Xu, K.: The utility maximization model of cloud virtual machine resource allocation. J. Comput. Sci. (2), 252–262 (2015)
Qin, X., Zhang, W., Wei, J., et al.: Status and challenges of distributed cache technology under cloud computing environment. J. Softw. 24(1), 50–66 (2017)
Zhang, T.: Management of cloud management from data center. IP Pilot. (4), 121–123 (2016)
Yu, S., Lu, Y., Wang, F.: Research and design of data deletion architecture based on cloud storage. Comput. Syst. Appl. 22(1), 208–211 (2015)
Liu, X., Yang, S., Guo, L.: Snowflake structure: a new data center network structure. J. Comput. Sci. (1), 76–86 (2014)
Deng, W., Liu, F., Jin, H.: New energy application in cloud computing data center: research status and trends. J. Comput. Sci. (3), 582–588 (2013)
Ye, K., Wu, Z., Jiang, X., He, Q.: Energy consumption management of virtualization cloud computing platform. J. Comput. Sci. (6), 1262–1285 (2016)
Feng, Zhang, M., Zhang, Y., et al.: Research on cloud computing security. J. Softw. 22(1), 71–83 (2015)
Acknowledgements
I want to take this chance to thanks to Wang Bin and Wan Quan. In the process of composing this paper, they give me many academic and constructive advices and help me to correct my paper.
At the same time, I would like to appreciate my research team for the approved fund project, ShanDong University Science and Technology Project (J16LN54) and Qingdao University of Technology Project (2016JY007/2017KY008).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Suhui, G., Quan, W., Wenhui, S. (2018). Security Strategy of Campus Network Data Center in Cloud Environment. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)