skip to main content
10.1145/2790798.2790821acmotherconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
short-paper

Reliable Virtual Channels over VPN for Cloud

Authors Info & Claims
Published:13 July 2015Publication History

ABSTRACT

Cloud computing and virtualization are the novel deployments of large-scale computing systems over the Internet. Customers get their computation and storage from the cloud computing providers and can pay for the service on demand. However, the security of communication between a client and cloud is highly concerned and increasingly becoming important. Virtual private network (VPN) is the mostly used technology to ensure the security of network communications. However, there are many factors which results in VPN failure, e.g., poor network, software/hardware problem of VPN gateway. In either case, users will loss a connection and stream communication from the cloud although there are a backup VPN gateway and a backup cloud server. Especially, when users use transmission control protocol (TCP) applications, all the TCP connections will be broken. This paper proposes an improved virtual private network (iVPN) which can continuously serve users who would like to use TCP applications on a cloud site. The users do not have to modify their existing applications or operating systems in order to use iVPN over an existing VPN communication. Moreover, the existing VPN gateway and cloud server can still operate as before.

References

  1. Khazaei, H., Misic, J., and Misic, V. B. 2013. Performance of an IaaS cloud with live migration of virtual machines. In Proceedings of the IEEE Global Communications Conference (Atlanta, GA, December 9-13, 2013). 2289--2293.Google ScholarGoogle Scholar
  2. Surhone, L. M., Timpledon, M. T., and Marseken, S. F. 2010. OpenVPN: Virtual Private Network, Pre-Shared Key, Certificate Authority, NetBSD, FreeBSD, OpenBSD, Linux, Solaris (Operating System), Transport Layer Security. Betascript Publishing.Google ScholarGoogle Scholar
  3. Han, J., Malan, G., Jahanian, F. 2002. Fault-tolerant virtual private networks within an autonomous system. In Proceedings of the IEEE International Symposium on Reliable Distributed Systems (Osaka, Japan, October 13-16, 2002). 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brustoloni, J. C. 2005. Automatic VPN client recovery from IPsec pass-through failures. In Proceedings of the IEEE Conference on Local Computer Networks (Sydney, Australia, November 17, 2005). 756--763. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hinden, R. 2004. Virtual Router Redundancy Protocol. RFC 3768. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Di Santo, M., Ranaldo, N., Zimeo, E. 2003. Kernel implementations of locality-aware dispatching techniques for web server clusters. In Proceedings of the IEEE International Conference on Cluster Computing. (Indianapolis, IN, September 23-27, 2003).Google ScholarGoogle ScholarCross RefCross Ref
  7. Brassil, J., et al. 2008. Improving VPN performance over multiple access links. In Proceedings of the International Conference on Broadband Communications, Networks and Systems (London, UK, September 2008). 649--656.Google ScholarGoogle ScholarCross RefCross Ref
  8. Matsuhashi, Y., et al. 2012. Transparent VPN failure recovery with virtualization. Future Generation Computer Systems. 28, 1 (January 2012), 78--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marwah, M., Mishra, S., Fetzer, C. 2003. TCP server fault tolerance using connection migration to a backup server. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (San Francisco, CA, June 22-25, 2003). 373--382.Google ScholarGoogle Scholar
  10. Koch, R. R., Hortikar, S., Moser, L. E., Melliar-Smith, P. M. 2003. Transparent TCP connection failover. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (San Francisco, CA, June 22-25, 2003). 383--392.Google ScholarGoogle ScholarCross RefCross Ref
  11. Yabandeh, M., Zarifzadeh, S., Yazdani, N. 2007. Improving performance of transport protocols in multipath transferring schemes. Computer Communications. 30, 17 (November 2007), 3270--3284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hasegawa, Y., et al. 2007. Deployable multipath communication scheme with sufficient performance data distribution method. Computer Communications. 30, 17 (November 2007), 3285--3292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Li, M., Lukyanenko, A., Cui, Y. 2012. Network coding based multipath TCP. In Proceedings of the IEEE Conference on Computer Communications (Orlando, FL, March 25-30, 2012). 25--30.Google ScholarGoogle Scholar
  14. He, J., et al. 2008. DaVinci: dynamically adaptive virtual networks for a customized internet. In Proceedings of the International Conference on Emerging Networking Experiments and Technologies (Madrid, Spain, December 10-12, 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhang, M. et al. 2004. A transport layer approach for improving end-to-end performance and robustness using redundant paths. In Proceedings of the USENIX Annual Technical Conference (Boston, MA, June 27-July 2, 2004). 99--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Murase, T., et al. 2006. Overlay network technology QoS control. IEICE Transactions on Communications. E89-B, 9 (September 2006), 2280--2291.Google ScholarGoogle Scholar
  17. Wipusitwarakun, K., Chimmanee, S. 2009. Application oriented flow routing algorithm for VOIP overlay networks. IEICE Transactions on communications, E92-B, 6 (June 2009), 2054--2064.Google ScholarGoogle Scholar
  18. Mysore, R. N., et al. 2009. Portland: a scalable, fault tolerant layer 2 data center network fabric. In Proceedings of the ACM SIGCOMM (Barcelona, Spain, August 17-21, 2009). 39--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Stallings, W. 2007. Data and Computer Communications. Pentice Hall, Upper Saddle River, NJ.Google ScholarGoogle Scholar
  20. 2005. Network Protocol Handbook. Javvin Technology Inc., Saratoga, CA.Google ScholarGoogle Scholar

Index Terms

  1. Reliable Virtual Channels over VPN for Cloud

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            C3S2E '15: Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering
            July 2015
            166 pages
            ISBN:9781450334198
            DOI:10.1145/2790798

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 July 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate12of42submissions,29%
          • Article Metrics

            • Downloads (Last 12 months)4
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader