Secure Hyperconverged Infrastructure for Government-Scale Digital Transformation: A Technical Blueprint
Keywords:
Hyperconverged Infrastructure (HCI), Government IT Modernization, PowerFlex Storage, Virtual Machine SecurityAbstract
This paper is a technical proposal to deploy the secure hyperconverged infrastructure (HCI) to transform the way the statewide government operates as well as safeguard sensitive information against cyberattacks. The case study concentrates on storage with PowerFlex, virtual machines that deal with compliance, network isolation, NTP / DNS integrity, and migration of a multi-petabyte of data. The City of Oklahoma 4 million resident in-service digital-first modernization demonstrated low latency (2.4 ms), high throughput (92 Gbps), 1,250,000 IOPS and almost constant uptime (99.98%). Migration of multi-petabytes data at a rate of 92-96 TB/hour with complete data integrity. The security testing was blocking 93-100% of the simulated attacks such as ransomware, DoS, and VM escapes. The results suggest that a well-developed HCI can guarantee high performance, scale, and super security, and lower the management overhead and operational expenses. The article underscores the fact that the author developed and proved these systems, offering a nationwide applicable architecture of federal and state-based digital resiliency in the government IT infrastructure.
Downloads
References
Syed, A. a. M. (2023). Hyperconverged Infrastructure (HCI) for Enterprise data centers: Performance and scalability analysis. International Journal of AI BigData Computational and Management Studies, 4, 29–38. https://doi.org/10.63282/3050-9416.ijaibdcms-v4i4p104
Azeem, S. A., & Sharma, S. K. (2017). Study of Converged Infrastructure & Hyper Converge Infrastructre as Future of Data Centre. www.ijarcs.info. https://doi.org/10.26483/ijarcs.v8i5.3476
Davu, R. V. S. R. (2022). Security considerations in hyper-converged environments: vulnerabilities, attacks, and mitigation strategies [Research Article]. Journal of Scientific and Engineering Research, 5–5, 135–143. https://jsaer.com/download/vol-9-iss-5-2022/JSAER2022-9-5-135-143.pdf
Ibrahim, A., Valli, C., McAteer, I., & Chaudhry, J. (2018). A security review of local government using NIST CSF: a case study. The Journal of Supercomputing, 74(10), 5171–5186. https://doi.org/10.1007/s11227-018-2479-2
Benaddi, H., Laaz, N., Bouhlal, A., & Kettani, E. E. (2022). Data storage architecture for e-government interoperability: Morocco case. Indonesian Journal of Electrical Engineering and Computer Science, 29(3), 1678. https://doi.org/10.11591/ijeecs.v29.i3.pp1678-1686
Veiga, A. P. (2017). Hyper converged infrastructures: Beyond virtualization. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1711.09747
Petrenko, S. A., Vorobieva, D. E., Petrenko, A. S., Saint-Petersburg Electrotechnical University «lETI», & Innopolis University. (2021). Secure Software-Defined storage. In BIT-2021: XI International Scientific and Technical Conference on Secure Information Technologies (pp. 143–144). https://ceur-ws.org/Vol-3035/paper16.pdf
Munodawafa, F., & Awad, A. I. (2018). Security risk assessment within hybrid data centers: A case study of delay sensitive applications. Journal of Information Security and Applications, 43, 61–72. https://doi.org/10.1016/j.jisa.2018.10.008
Reyes, A., Rodriguez, C., & Esenarro, D. (2019). Hyper Converged Systems Applied (HSA) methodology to optimize the process of technological renewal in data centers. International Journal of Recent Technology and Engineering (IJRTE), 8(2S11), 4052–4056. https://doi.org/10.35940/ijrte.b1592.0982s1119
S, H., Meghna, S., Rayasam, S., M, R., Department of Computer Science and Engineering, R V College of Engineering, Bengaluru,India, N, D., & Department of Computer Science and Engineering, R V College of Engineering, Bengaluru,India. (2021). A Detailed Survey on the Relationship between Virtualisation, Hyperconvergence and Big Data. Journal of Emerging Technologies and Innovative Research, 8(6). https://www.jetir.org/papers/JETIR2106747.pdf
Arango, C., Dernat, R., & Sanabria, J. (2017, September 28). Performance evaluation of container-based virtualization for high performance computing environments. arXiv.org. https://arxiv.org/abs/1709.10140
Kandiraju, G., Franke, H., Williams, M. D., Steinder, M., & Black, S. M. (2014). Software defined infrastructures. IBM Journal of Research and Development, 58(2/3), 2:1-2:13. https://doi.org/10.1147/jrd.2014.2298133
Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016, December 29). Emerging security challenges of cloud virtual infrastructure. arXiv.org. https://arxiv.org/abs/1612.09059
Blenk, A., Basta, A., Reisslein, M., & Kellerer, W. (2015). Survey on Network Virtualization Hypervisors for Software Defined Networking. IEEE Communications Surveys & Tutorials, 18(1), 655–685. https://doi.org/10.1109/comst.2015.2489183
Bonfim, M. S., Dias, K. L., & Fernandes, S. F. L. (2018). Integrated NFV/SDN Architectures: A Systematic Literature Review. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1801.01516
Ahmadian, S., Mutlu, O., & Asadi, H. (2018). ECI-Cache. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2(1), 1–34. https://doi.org/10.1145/3179412
Alaluna, M., Ferrolho, L., Figueira, J. R., Neves, N., & Ramos, F. M., V. (2017, March 3). Secure Multi-Cloud Virtual Network embedding. arXiv.org. https://arxiv.org/abs/1703.01313
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


