DocumentCode :
2627597
Title :
Circular chain VM protection in AdjointVM
Author :
Oktay, Ucman ; Aydin, Muhammed Ali ; Sahingoz, Ozgur Koray
Author_Institution :
Comput. Eng. Dept., Turkish Air Force Acad., Istanbul, Turkey
fYear :
2013
fDate :
9-11 May 2013
Firstpage :
93
Lastpage :
97
Abstract :
Cloud computing is a demanding subject and its fans are increasing day by day in the private or corporate areas. Confidentiality is the most important point of information security with respect to integrity and availability in cloud computing especially in financial, governmental and military usage. An Intrusion Detection System (IDS) service increases the cloud´s security level. In this paper, a hybrid approach is introduced that can be used in cloud computing to protect cloud users from the untrusted cloud providers or untrusted employees in a circular chain protection model. This model is proposed over an existing model, AdjointVM, which uses three types of technologies (trusted computing, host-based IDS, virtual machine monitor based IDS) to tackle external and internal threats in cloud systems. The proposed model claims to overcome one of the weakest points of AdjointVM model, and aims to build a more secure cloud environment for the users by adding additional security mechanism between VMs. In the proposed model, responsibility of confidentiality is not giving up only to the providers or cloud administrators, a VM can protect another VM in a circular manner and this results a chain structure and constructs a circular structure to enhance global security of the system. At the same time, users can also manage and monitor their own confidentiality by themselves.
Keywords :
cloud computing; data integrity; security of data; trusted computing; virtual machines; AdjointVM; circular chain VM protection model; cloud administrators; cloud computing security level; cloud providers; corporate areas; external threats; host-based IDS; information availability; information confidentiality; information integrity; information security; internal threats; intrusion detection system service; private areas; trusted computing; untrusted cloud providers; untrusted employees; virtual machine monitor-based IDS; Authentication; Computational modeling; Computer hacking; Cryptography; Military computing; Monitoring; AdjointVM; cloud computing; intrusion detection; security; trusted computing; virtual machine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on
Conference_Location :
Konya
Print_ISBN :
978-1-4673-5612-1
Type :
conf
DOI :
10.1109/TAEECE.2013.6557202
Filename :
6557202
Link To Document :
بازگشت