Protecting Private Space of Users Leaning on Virtualizing Security in Center of Cloud Calculations Data
نویسنده
چکیده
In cloud computing, “security” and “trust” can involve such concerns as maintaining the confidentiality of sensitive data, and offering mechanisms for monitoring cloud computing servers. Trust can be developed for clients by service providers, third parties through an agreement, or special security services. This creates a considerable level of risk in maintaining the privacy and security of processed data by virtual machines. This article presented a new management solution for maintaining the security of personal data in data centers through virtualization, which could be accomplished by opting for a trusted platform and deleting personal data after releasing the intended platform. Using a new concept known as “a quarantined host”, this method assisted in increasing the security level of the infrastructure layer. Results demonstrated that, the presented method was effective in identifying and responding to attacks without inducing any noticeable change in the level of migration or consumed power, which, in turn, pointed to the adequacy of the presented method.
منابع مشابه
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کامل