ABSTRACT
Cloud computing and virtualization are the novel deployments of large-scale computing systems over the Internet. Customers get their computation and storage from the cloud computing providers and can pay for the service on demand. However, the security of communication between a client and cloud is highly concerned and increasingly becoming important. Virtual private network (VPN) is the mostly used technology to ensure the security of network communications. However, there are many factors which results in VPN failure, e.g., poor network, software/hardware problem of VPN gateway. In either case, users will loss a connection and stream communication from the cloud although there are a backup VPN gateway and a backup cloud server. Especially, when users use transmission control protocol (TCP) applications, all the TCP connections will be broken. This paper proposes an improved virtual private network (iVPN) which can continuously serve users who would like to use TCP applications on a cloud site. The users do not have to modify their existing applications or operating systems in order to use iVPN over an existing VPN communication. Moreover, the existing VPN gateway and cloud server can still operate as before.
- Khazaei, H., Misic, J., and Misic, V. B. 2013. Performance of an IaaS cloud with live migration of virtual machines. In Proceedings of the IEEE Global Communications Conference (Atlanta, GA, December 9-13, 2013). 2289--2293.Google Scholar
- Surhone, L. M., Timpledon, M. T., and Marseken, S. F. 2010. OpenVPN: Virtual Private Network, Pre-Shared Key, Certificate Authority, NetBSD, FreeBSD, OpenBSD, Linux, Solaris (Operating System), Transport Layer Security. Betascript Publishing.Google Scholar
- Han, J., Malan, G., Jahanian, F. 2002. Fault-tolerant virtual private networks within an autonomous system. In Proceedings of the IEEE International Symposium on Reliable Distributed Systems (Osaka, Japan, October 13-16, 2002). 41--50. Google ScholarDigital Library
- Brustoloni, J. C. 2005. Automatic VPN client recovery from IPsec pass-through failures. In Proceedings of the IEEE Conference on Local Computer Networks (Sydney, Australia, November 17, 2005). 756--763. Google ScholarDigital Library
- Hinden, R. 2004. Virtual Router Redundancy Protocol. RFC 3768. Google ScholarDigital Library
- Di Santo, M., Ranaldo, N., Zimeo, E. 2003. Kernel implementations of locality-aware dispatching techniques for web server clusters. In Proceedings of the IEEE International Conference on Cluster Computing. (Indianapolis, IN, September 23-27, 2003).Google ScholarCross Ref
- Brassil, J., et al. 2008. Improving VPN performance over multiple access links. In Proceedings of the International Conference on Broadband Communications, Networks and Systems (London, UK, September 2008). 649--656.Google ScholarCross Ref
- Matsuhashi, Y., et al. 2012. Transparent VPN failure recovery with virtualization. Future Generation Computer Systems. 28, 1 (January 2012), 78--84. Google ScholarDigital Library
- Marwah, M., Mishra, S., Fetzer, C. 2003. TCP server fault tolerance using connection migration to a backup server. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (San Francisco, CA, June 22-25, 2003). 373--382.Google Scholar
- Koch, R. R., Hortikar, S., Moser, L. E., Melliar-Smith, P. M. 2003. Transparent TCP connection failover. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (San Francisco, CA, June 22-25, 2003). 383--392.Google ScholarCross Ref
- Yabandeh, M., Zarifzadeh, S., Yazdani, N. 2007. Improving performance of transport protocols in multipath transferring schemes. Computer Communications. 30, 17 (November 2007), 3270--3284. Google ScholarDigital Library
- Hasegawa, Y., et al. 2007. Deployable multipath communication scheme with sufficient performance data distribution method. Computer Communications. 30, 17 (November 2007), 3285--3292. Google ScholarDigital Library
- Li, M., Lukyanenko, A., Cui, Y. 2012. Network coding based multipath TCP. In Proceedings of the IEEE Conference on Computer Communications (Orlando, FL, March 25-30, 2012). 25--30.Google Scholar
- He, J., et al. 2008. DaVinci: dynamically adaptive virtual networks for a customized internet. In Proceedings of the International Conference on Emerging Networking Experiments and Technologies (Madrid, Spain, December 10-12, 2008). Google ScholarDigital Library
- Zhang, M. et al. 2004. A transport layer approach for improving end-to-end performance and robustness using redundant paths. In Proceedings of the USENIX Annual Technical Conference (Boston, MA, June 27-July 2, 2004). 99--112. Google ScholarDigital Library
- Murase, T., et al. 2006. Overlay network technology QoS control. IEICE Transactions on Communications. E89-B, 9 (September 2006), 2280--2291.Google Scholar
- Wipusitwarakun, K., Chimmanee, S. 2009. Application oriented flow routing algorithm for VOIP overlay networks. IEICE Transactions on communications, E92-B, 6 (June 2009), 2054--2064.Google Scholar
- Mysore, R. N., et al. 2009. Portland: a scalable, fault tolerant layer 2 data center network fabric. In Proceedings of the ACM SIGCOMM (Barcelona, Spain, August 17-21, 2009). 39--50. Google ScholarDigital Library
- Stallings, W. 2007. Data and Computer Communications. Pentice Hall, Upper Saddle River, NJ.Google Scholar
- 2005. Network Protocol Handbook. Javvin Technology Inc., Saratoga, CA.Google Scholar
Index Terms
- Reliable Virtual Channels over VPN for Cloud
Recommendations
Seamless integration of cloud and fog networks
A way to merge cloud computing infrastructures with traditional or legacy network deployments, leveraging the best in both worlds and enabling a logically centralized control. A solution is proposed to extend existing cloud computing software stacks so ...
A Dynamic VPN Architecture for Private Cloud Computing
UCC '11: Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud ComputingThe classification of cloud computing includes public cloud, private cloud and hybrid cloud. Private cloud provides enterprise a secure environment to run business process, so many companies are planning to implement private clouds. Virtual private ...
Cloud service engineering
ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2Building on compute and storage virtualization, Cloud Computing provides scalable, network-centric, abstracted IT infrastructure, platforms, and applications as on-demand services that are billed by consumption. Cloud Service Engineering is the ...
Comments