DocumentCode
691382
Title
Secured architecture for inter-VM traffic in a Cloud environment
Author
Benzidane, Karim ; Khoudali, Saad ; Sekkaki, Abderrahim
Author_Institution
Fac. of Sci. Ain Chock, Comput. Sci. Dept., Univ. Hassan II, Casablanca, Morocco
fYear
2013
fDate
9-10 Dec. 2013
Firstpage
23
Lastpage
28
Abstract
Cloud Computing (CC) is a large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. On the other hand, one of the key enablers for building Cloud environments is Virtualization. It offers a great level of efficiency and scalability that makes the complex processing of the Cloud possible. However, with these advantages come certain limitations, especially in relation to security. Virtualization vulnerabilities and more specifically isolation, creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. Hence, without strict controls put in place within the Cloud, guests could violate and bypass security policies, intercept unauthorized client data, and initiate or become the target of security attacks. This article discusses the security and the visibility issues of inter-VM traffic, by proposing a solution for it within the Cloud context. The proposed approach provides Virtual Machines (VMs) authentication, communication integrity, and enforces trusted transactions, through security mechanisms, structures, policies, and various intrusion detection techniques.
Keywords
authorisation; cloud computing; trusted computing; virtual machines; CC; Internet; cloud computing; cloud context; cloud environment; communication integrity; inter-VM traffic; interconnection points; intrusion detection techniques; large-scale distributed computing paradigm; managed computing power; secured architecture; security attacks; security mechanisms; security policies; trusted transactions; unauthorized client data; virtual machine authentication; virtualization; visibility issues; Databases; IP networks; Payloads; Security; Subscriptions; Virtual machine monitors; Virtualization; Cloud Computing; Intrusion management; Intrusion managementloud Computing; Security; Virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing and Communications (LatinCloud), 2nd IEEE Latin American Conference on
Conference_Location
Maceio
Type
conf
DOI
10.1109/LatinCloud.2013.6842218
Filename
6842218
Link To Document