With cloud computing becoming more and more popular among businesses, there has become a higher demand for security in the cloud. K-12 school systems have a lack of IT resources and support to securely store and share data, thus making cloud services an attractive option. Additionally there is increasing pressure on school systems to provide information for students and parents that require access to the information stored on school networks. Therefore, cloud services is a viable option for K-12 school systems to alleviate the administrative overhead and to provide access to necessary information for students and parents. This applied research project is an an experimental design for addressing the issues that the K-12 school systems face. The secure cloud project uses three nodes; a compute node; a controller node; and a networking node to run the cloud. The controller node is the first to be used by verifying identity of the user. It then travels through the management network to the compute node that operates the virtualized network. Traffic between will be monitored by the network node to assign DHCP to each session. The process will be monitored by the security node which runs Kali to analyze for malicious activity. They each run databases that help with image, identity, and networking services. It uses Ubuntu 14.04 LTS on all the servers to run OpenStack Juno. The network that was used by the virtual machines is ext-net. A virtual network was that consisted of a virtual router that would pass the data through the cloud. The virtual network consisted of four databases, keystone, glance, nova, and the neutron database. Salt-minion and Suricata would be was used for the security server. A dashboard was created for the secure cloud. Networks, gateways, routers, and interfaces could be edited from this interface. Future work to the secure cloud include: a security node to filter through the traffic to alert when an issue arises; and another server to allow for more space to be allocated for virtual machines. These improvements will enhance performance by segmenting information on a different secure network.
Are you a researcher? Would you like to cite this paper?
Visit the ASEE document repository at
for more tools and easy citations.