Security Policy Enforcement in Cloud Infrastructure
نویسندگان
چکیده
Cloud computing is a computing environment consisting of different facilitating components like hardware, software, firmware, networking, and services. Internet or a private network provides the required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand, customized resource availability and performance management” are overpowered by the associated security risks to the cloud system, particularly to the cloud users or clients. Existing traditional IT and enterprise security are not adequate to address the cloud security issues. In order to deploy different cloud applications, it is understood that security concerns of cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and vulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
منابع مشابه
Enhancing Cloud Security with Context-aware Usage Control Policies
Cloud environments strongly rely on virtualization infrastructure that provides virtual resources by abstracting from the physical hardware. Thus, cloud providers can cost-efficiently share physical hardware among multiple tenants, and a single virtual resource may span multiple physical resources at different geo-locations. From a tenant’s perspective, the uncertainty about location and contex...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملTowards automated security policy enforcement in multi-tenant virtual data centers
Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge in allaying such ...
متن کاملA Security Architecture for Server-Side JavaScript: Extended Abstract
Node.js is a popular JavaScript server-side framework with an efficient runtime for cloud-based eventdriven architectures. Its strength is the presence of thousands of third party libraries which allow developers to quickly build and deploy applications. These very libraries are a source of security threats as a vulnerability in one library can (and in some cases did) compromise one’s entire se...
متن کاملBalancing Utility and Security: Securing Cloud Federations of Public Entities
Following their practical needs and legal constraints, recent application of the cloud paradigm among public administrations has been focused on the deployment of private clouds. Due to the increasing amount of data and processing requirements, many organizations are considering possibilities to additionally optimize their infrastructures and collaborative processes by employing private cloud f...
متن کامل