Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model

Cloud computing has reduced the large capital outlays for hardware storage and the human expense needed for its operation. As more institutions and organizations read and write (upload and download private data remotely on computer networks through an Internet connection, eliminating the need for local computer storage, data encryption from unauthorized access (intrusive hackers) becomes a priority. Tertiary institutions need for storage is a wide one, so the need for storing of data in the cloud arises simplifying data management and easing the workflow and pipeline of the staff, non-staff and students. The paper explores various research efforts, reviewed to introduce cloud to Tertiary institutions and employable methods for addressing the biggest fear of cloud adoption in educational organizations. This paper focuses on the security of data stored on the private cloud environment for tertiary institutions, proposing a security architecture for its infrastructure to employ for the satisfaction of such needs. For the purpose of this paper, the security of the private cloud is discussed with more focus on the Virtualization Infrastructure as a Service. This adopted security Architecture is integrated into the Proposed Tertiary Institution Cloud Computing Environment and ready for testing.

[1]  No License,et al.  Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .

[2]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[3]  Mohammad Hammoudeh,et al.  A Survey on Data Confidentiality and Privacy in Cloud Computing , 2017, ICFNDS.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Karen Mercedes Goertzel Enhancing the Development Life Cycle To Produce Secure Software , 2008 .

[6]  Ruby B. Lee,et al.  New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.

[7]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[8]  M. Aramudhan,et al.  Security Issues: Public vs Private vs Hybrid Cloud Computing , 2012 .

[9]  Jennifer Rexford,et al.  NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.

[10]  B. Joshi,et al.  Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.

[11]  Xiaodi Huang,et al.  Cloud Computing for Higher Education: A roadmap , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[12]  John Grundy,et al.  TOSSMA: A Tenant-Oriented SaaS Security Management Architecture , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[13]  Tanupriya Choudhury,et al.  Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[14]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[15]  Anca Ioana Andreescu,et al.  Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis , 2011 .

[16]  Jennifer Rexford,et al.  Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.

[17]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[18]  John Liederbach,et al.  Digital Crime and Digital Terrorism , 2005 .

[19]  Diana Bohm,et al.  Computer And Information Security Handbook , 2016 .

[20]  Nureni Ayofe Azeez,et al.  Security and privacy issues in e-health cloud-based system: A comprehensive content analysis , 2019, Egyptian Informatics Journal.