Elastic Virtualized Network Security Based on Multi-Tenant using Progressive Route Scheduling in a Cloud Data Center
Udhayakumar U.1, Murugaboopathi G.2

1Udhayakumar U.*, PhD Scholar, Department of Computer Science, Bharathiar University, Coimbatore, India.
2Murugaboopathi G., Associate Professor, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Tamilnadu, India.
Manuscript received on January 26, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 2507-2512 | Volume-9 Issue-3, February 2020. | Retrieval Number: C5777029320/2020©BEIESP | DOI: 10.35940/ijeat.C5777.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Information security in the cloud has become a serious problem on the Internet. There are safety standards created by the resource in traditional computing. The public cloud providers, secure transfer, and the use of public resources due to the availability of the Internet is the cloud facing distributed data centers. Providing the required level of security, approaching adopting various security components such as security watchdog, IDS / IPS system, security framework, access control framework, security management and so on. In this proposed system to improve the data transmission security to introduce proposed algorithm Elastic virtualized network security (eVNS) for extended security service which utilizes the progressive route scheduling (PRS) and promotes the security consumption for Inbound rule based on the virtualized security load balancer. We have presented a virtual cloud for a network that is secure and robust security group protocols by any compromised or faulty node in the network. In contrast to the traditional snapshot aggregation approach in data centers, the eVNS-PRS proposed algorithm resembles the unicasting it’s sensed information to create a new target security group based on the routing table. This makes the system more fault-tolerant and increases the availability of information in the network. Simulations performed with the proposed algorithm have demonstrated its effectiveness.
Keywords: Cloud computing routing, data center, network security, security groups, target group, virtual load balancer