出版社:International Association for Computer Information Systems
摘要:The l iterature indicates that c loud computing is an exciting and advantageous architecture , well suited to support global business due to its scalability needs , but it also involves new and substantial security risks . Thi s paper provide s an overview of a configuration of a cloud that was implemented in the authors' laboratory and was broken into three layers: the cloud, zone , and virtual machine. S ecurity mechanisms that were used in the study, including multi - level firewalling, are described . A series of actual port security defin itions within each firewall are included so that the interaction among the three firewalls can be illustrated and analyzed . Finally, we conclude by discuss ing the importance of starting with a sound security policy before configuring the firewall s .