Yuxiang Dong’s research while affiliated with China Mobile Group Design Institute Co. Ltd. and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


The Security Challenges and Opportunities of New Network Under the Hybrid Cloud Environment
  • Chapter

May 2017

·

22 Reads

Advances in Intelligent Systems and Computing

Yuxiang Dong

·

Huijun Zhang

·

Linong Zhao

A hybrid cloud becomes the preferred solution when enterprises deploy cloud service. Using new technology such as software-defined network (SDN) and network virtualization to form a network will be the trend of the future. This paper introduces the new safety protection opportunities brought by new network technologies, and analyzes the challenges and risks of hybrid cloud system using these technologies. Finally, it puts forward the corresponding solution.


Research and Implementing of Software Defined Border Protection in Hybrid Cloud

April 2017

·

8 Reads

DEStech Transactions on Engineering and Technology Research

Yuxiang Dong

·

·

Linong Zhao

·

[...]

·

Kun Wang

Hybrid cloud is composed of enterprise private cloud and public cloud tenant network. It has effectively reduced construction cost, improved enterprise IT construction efficiency and expansibility of private cloud, and brought security risk such as fuzzy boundary at the same time. This thesis studies the common access control means used in current hybrid cloud and has proposed a unified strategy control mechanism to address hybrid cloud. By applying software-defined network and network function virtualization, the mechanism has succeeded in multi-granularity of flow in east-west direction and in north-south direction of virtual network, realized internally unified access strategy, and improved the efficiency and flexibility of access control.