Asee peer logo

Secure Cloud Computing Infrastructure for K-12 Education

Download Paper |


2017 ASEE Annual Conference & Exposition


Columbus, Ohio

Publication Date

June 24, 2017

Start Date

June 24, 2017

End Date

June 28, 2017

Conference Session


Tagged Division

Computing & Information Technology

Page Count




Permanent URL

Download Count


Request a correction

Paper Authors


Connie Justice Indiana University Purdue University, Indianapolis

visit author page

Dr. Connie Justice is a Clinical Associate Professor in Computer and Information Technology (CIT) at the Purdue School of Engineering and Technology at Indiana University Purdue University Indianapolis (IUPUI) and a faculty member of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. Professor Justice has over 20 years experience in the computer and systems engineering field. Professor Justice is a Certified Information Systems Security Professional, CISSP. She created the networking option and security option for CIT majors and a Network Security Certificate Program. She has also designed and modified many courses in networking and networking security. Professor Justice is noted for her creation of the Living Lab, an experiential learning environment where students gain real world experience running an IT business.

Dr. Justice takes extreme pride and is a great innovator in the area of experiential learning and service. Experiential learning and service contributes to the integration of theory and application by creating an environment where the students learn by doing or apply their theory in service learning projects, practica, internships, games, and simulations. The Living Lab for CIT was created out of the need to provide a business environment for students to give them a taste of a “real” IT environment. A secondary purpose is to provide service to internal and external clients. The Living Lab has served many internal and external clients.

Dr. Justice has consulted for and managed IT departments in small and medium sized businesses. Her areas of research include: experiential and service learning, information and security risk assessment, risk management, digital forensics, network security, network and systems engineering, network and systems administration, and networking and security course development.

visit author page


Nichole McFarland Indiana University Purdue University, Indianapolis

visit author page

I am a student at IUPUI perusing my Masters degree in Information Security.

visit author page

Download Paper |


With cloud computing becoming more and more popular among businesses, there has become a higher demand for security in the cloud. K-12 school systems have a lack of IT resources and support to securely store and share data, thus making cloud services an attractive option. Additionally there is increasing pressure on school systems to provide information for students and parents that require access to the information stored on school networks. Therefore, cloud services is a viable option for K-12 school systems to alleviate the administrative overhead and to provide access to necessary information for students and parents. This applied research project is an an experimental design for addressing the issues that the K-12 school systems face. The secure cloud project uses three nodes; a compute node; a controller node; and a networking node to run the cloud. The controller node is the first to be used by verifying identity of the user. It then travels through the management network to the compute node that operates the virtualized network. Traffic between will be monitored by the network node to assign DHCP to each session. The process will be monitored by the security node which runs Kali to analyze for malicious activity. They each run databases that help with image, identity, and networking services. It uses Ubuntu 14.04 LTS on all the servers to run OpenStack Juno. The network that was used by the virtual machines is ext-net. A virtual network was that consisted of a virtual router that would pass the data through the cloud. The virtual network consisted of four databases, keystone, glance, nova, and the neutron database. Salt-minion and Suricata would be was used for the security server. A dashboard was created for the secure cloud. Networks, gateways, routers, and interfaces could be edited from this interface. Future work to the secure cloud include: a security node to filter through the traffic to alert when an issue arises; and another server to allow for more space to be allocated for virtual machines. These improvements will enhance performance by segmenting information on a different secure network.

Justice, C., & McFarland, N. (2017, June), Secure Cloud Computing Infrastructure for K-12 Education Paper presented at 2017 ASEE Annual Conference & Exposition, Columbus, Ohio. 10.18260/1-2--28813

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2017 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015