AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19544Keywords:
Cloud computing, Authentication, Encryption, Confidentiality, VirtualizationAbstract
Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, virtualization†is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.
Â
Downloads
References
Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff L, et al. Eucalyptus Open-Source Cloud Computing Infrastructure-An Overview. In: Proceeding IEEE/ACM International Symposium Cluster Computing Grid; 2009. p. 124-31.
Bari MF. Datacenter network virtualization: A survey. IEEE Commun Surv Tutor 2013;15(2):909-28.
Wei B, Lin C, Kong XZ. Dependability Modeling and Analysis for
the Virtual Data Center of Cloud Computing, In Proceeding IEEE 13 International Conference High Performance Computing and Communications (HPCC), Banff, AB, Canada; 2011. p. 784-9. th
VM Escape.†Available from: http://www.zdnet.com/blog/security/uscert-warns-of-guest-to-host-vm-escape-vulnerability/12471.
Duan H, Chen C. Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems. Future Gener Comput Syst 2016;???:???.
Juncheng P, Huimin D, Yinghui S, Dong L. Potential attacks against k-anonymity on LBS and solutions for defending the attacks. In: Advanced in Computer Science and its Applications. Berlin, Heidelberg:
Springer; 2014. p. 877-83.
Lombardi F, Pietro RD. Secure virtualization for cloud computing. J Netw Comput Appl 2011;34(4):1113-22.
Li J, Li B, Wo T, Hu C, Huai J, Liu L, et al. Cyber-guarder: A virtualization security assurance architecture for green cloud computing. Future Gener Comput Syst 2012;28(2):379-90.
Wu H, Ding Y, Winer C, Yao L. Network Security for Virtual Machine in Cloud Computing. In: 5 International Conference on Computer Sciences and Convergence Information Technology; 2010. p. 18-21.th
He X, Chomsiri T, Nanda P, Tan Z. Improving cloud network security using the tree-rule firewall. Future Gener Comput Syst 2014;30:116-26.
Xing T, Huang D, Xu L, Chung C, Khatkar P. Snortflow: A OpenflowBased Intrusion Prevention System in Cloud Environment. In: IEEE Research and Educational Experiment Workshop; 2013. p. 89-92.
Wei J, Zhang X, Ammons G, Bala V, Ning P. Managing Security of Virtual Machine Images in a Cloud Environment. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security; 2009. p. 91-6.
Kazim M, Masood R, Shibli MA. Securing the Virtual Machine Images in Cloud Computing. In: Proceedings of the ACM 6 International Conference on Security of Info and Networks; 2013. p. 425-8. th
Emura K, Miyaji A, Nomura A. A Ciphertextpolicy Attribute-based Encryption Scheme with Constant Ciphertext Length, Information Security Practice and Experience-Fifth International Conference. In:
Bao F, Li H,Wang G, editors. Lecture Notes in Computer Science F5451. Berlin, Heidelberg: Springer; 2009. p. 13-23.
Dinda PA. The statistical properties of host load. Sci Program 1999;7(3):211-29.
Barnsley MF, Harrington AN. The calculus of fractal interpolation functions. J Approx Theory 989;57(1):14-34.
Umamaheswari E. Cloud testing Vs. Conventional software testing over a web service. Int J Sci Res 2015;4(9):???.
Umamaheswari E, Bhalaji N, Ghosh DK. Evaluating metrics at class and method level for java programs using knowledge based systems ARPN J Eng Appl Sci 2015;10(5):2047-52.
Bobba R, Khurana H, Prabhakaran M. Attribute-sets: A practically motivated enhancement to attribute-based encryption. In: Computer Security ESORICS. Berlin, Heidelberg: Springer; 2009. p. 587-604.
Kim DS, Machida F, Trivedi KS. Availability Modeling and Analysis of a Virtualized System. In: Proceedings 15 IEEE Rim International Symposium Dependent on Computers. Shanghai, China; 2009. p. 365-71.
th 21. Gomes L, Costa A. Cloud Based Development Framework Using IOPT Petri Nets for Embedded Systems Teaching. In: Proceeding 2014 IEEE 23 International Symposium Industrial Electron (ISIE). Istanbul,Turkey. p. 2202-6. rd
Umamaheswari E, Ghosh DK. Developing a reliability prediction system using multivariate analysis theory on software quality metrics. Int J Emerg Technol Comput Sci Electron 2013;3(1):11-4.
Ajay DM, Umamaheswari E. Why, how cloud computing - How not, and cloud security issues. Glob J Pure Appl Math 2016;12(1):1-8.
Ajay DM, Umamaheswari E. An Initiation for Testing the Security of a Cloud Service Provider, Proceedings of the 3 International Symposium on Big Data and Cloud Computing Challenges (ISBCC-16); 2016. rd
Ghosh DK, Bhalaji N, Umamaheswari E. Software engineering measures using radial basis function neural network. Int J Appl Eng Res 2014;9(23):???.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.