DocumentCode :
670188
Title :
A circular chain intrusion detection for cloud computing based on improved AdjointVM approach
Author :
Oktay, Ucman ; Aydin, Muhammed Ali ; Sahingoz, Ozgur Koray
Author_Institution :
Turkish Air Force Acad. (TuAFA), Istanbul, Turkey
fYear :
2013
fDate :
19-21 Nov. 2013
Firstpage :
201
Lastpage :
206
Abstract :
Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
Keywords :
cloud computing; computer centres; data privacy; security of data; trusted computing; AdjointVM approach; capex; capital expenditure; circular chain intrusion detection; cloud computing; confidentiality; data centers; information security; protection architecture defenselessness; untrusted cloud providers; untrusted employees; Cloud computing; Hardware; Kernel; Monitoring; Security; Virtual machine monitors; Virtualization; AdjointVM; cloud computing; intrusion detection; security; trusted computing; virtual machine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Informatics (CINTI), 2013 IEEE 14th International Symposium on
Conference_Location :
Budapest
Print_ISBN :
978-1-4799-0194-4
Type :
conf
DOI :
10.1109/CINTI.2013.6705192
Filename :
6705192
Link To Document :
بازگشت