• DocumentCode
    3863532
  • Title

    Security modeling and analysis of an intrusion tolerant cloud data center

  • Author

    Iman El Mir;Dong Seong Kim;Abdelkrim Haqiq

  • Author_Institution
    Computer, Networks, Mobility and Modeling laboratory, FST, Hassan 1 University, Settat, Morocco
  • fYear
    2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    It is important to protect a Cloud Data Center even if there are attacks by an adversary. In order to improve the security of a Cloud Data Center (CDC) in particular, system availability, a proactive approach named SCIT (Self-Cleansing Intrusion Tolerance) may be adopted to the CDC. In this paper, we present a general analytic model of the SCIT approach for the CDC. We first introduce an architecture and its flow of an intrusion tolerant CDC. We focus on a SCIT approach for a virtual machine (VM) in a CDC. We model and implement the SCIT in SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator) and carry out numerical analysis. Our numerical results show that the SCIT approach can increase the system availability.
  • Keywords
    "Servers","Cloud computing","Security","Computer architecture","Numerical models","Computational modeling","Data models"
  • Publisher
    ieee
  • Conference_Titel
    Complex Systems (WCCS), 2015 Third World Conference on
  • Type

    conf

  • DOI
    10.1109/ICoCS.2015.7483264
  • Filename
    7483264