Secure Model for Virtualization Layer in Cloud Infrastructure

نویسندگان

  • Sina Manavi
  • Sadra Mohammadalian
  • Nur Izura Udzir
  • Azizol Abdullah
چکیده

cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this research is focused on virtualization vulnerabilities. In addition it is attempted to propose a model to secure and proper mechanism to react reasonable against the detected attack by intrusion detection system. With the secured model (SVM), virtual machines will be resist more efficiency against the attacks in cloud computing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql

Cloud computing security (sometimes referred to simply as "cloud security") is an evolving subdomain of Computer security, Network security and, more broadly, Information security It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security softwar...

متن کامل

Emerging Security Challenges of Cloud Virtual Infrastructure

The cloud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services. IaaS allows customers to increase their computing resources on the fly wit...

متن کامل

A Study on Cloud Security Issues and Challenges

Cloud computing is one of the today’s most exciting technology because of its cost-reducing associated with computing while increasing flexibility and scalability for computer processes. In the past few years, cloud computing has growing from being a promising business idea to one of the fastest growing parts of the IT industry. Even there are great benefits to be gained from cloud computing, i...

متن کامل

Secure virtualization for cloud computing

Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components. In particular, we propose a novel architecture, Advanced Cloud Protec...

متن کامل

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre

This paper is about deploying Distributed Honeypot System that captures and analyze the attacks on different operating system on Eucalyptus Iaas cloud. The file based security is proposed and implemented on data to make data access secure on virtual machines and physical system in cloud. This makes the private cloud deployment secure enough due to three layers of security provided by virtualiza...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012