Research on a Security Enhancement System for Cloud Service of Cloud Computing Environment
Young-Sung Cho1,Wonshik Na2

1Young-Sung Cho, Professor, Department of Computer Engineering Education, NeoIn Tec Research Institute, Yeok-Jun Ro, Siheung-City, Kyonggi-do, Republic of Korea, East Asian.

2Wonshik Na Corresponding Author, Professor, Department of Computer Science, Namseoul University, Daehak-Ro, Seonghwan-Eup, Seobuk-Gu, Cheonan, Chungcheongnam-do,  Republic of Korea, East Asian.

Manuscript received on 10 June 2019 | Revised Manuscript received on 17 June 2019 | Manuscript Published on 22 June 2019 | PP: 926-933 | Volume-8 Issue-8S2 June 2019 | Retrieval Number: H11570688S219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Lately, a DDoS attack paralyze Internet systems with access attacks and conquer the network itself. We need a solution to build a security enhancement system for cloud computing service. The proposed method uses the desktop PCs to enhance the information security for cloud service through two network separation to defend against cyber attacks. One is physical network separation using 2 PCs using hypervisor architecture, select the network using KVM(Keyboard, Video monitor, Mouse) switched controller to select the network. The other is logical network partition using one PC with two kind of OSs, but network is divided through virtualization. Though a DDoS attack occurs on the HOST PC2 of the external network, the CPU and memory for the internal HOST PC1 are not affected by DDoS attack. It is confirmed that the CPU and memory for the internal network and the external network are processed independently of each other. The results of HOST CPU usage and PC1 memory usage measured during DDoS attack on HOST’s PC2 were measured low because they were not executed in normal network environment. The HOST PC2 malicious code infection caused HOST PC1 CPU usage and memory usage to be measured with low performance and HOST PC1 performance will not change. It can be seen that the CPU usage of PC2 increases rapidly when it is infected with malicious code of HOST PC2. It is confirmed that the internal and external network for the HOST PC operate independently of each other through CPU and memory overload test. The proposal system using network separation is a security enhancement system that can provide security information about cloud service of cloud computing environment for cyber attack.

Keywords: DDoS, Cloud Computing, Cloud Service, Visualization, Network Separation.
Scope of the Article: Data Visualization using IoT