Securing virtual machine images of cloud by encryption through Kerberos

The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VM) images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.

[1]  Samir Tout,et al.  Cloud Computing and its Security in Higher Education , 2009 .

[2]  Yaser Fuad Al-Dubai A PROPOSED MODEL FOR DATA STORAGE SECURITY IN CLOUD COMPUTING USING KERBEROS AUTHENTICATION SERVICE , 2013 .

[3]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[6]  Peng Ning,et al.  Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.

[7]  Muhammad Awais Shibli,et al.  Securing the virtual machine images in cloud computing , 2013, SIN.

[8]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[9]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[10]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[11]  Jaehyuk Huh,et al.  Architectural support for secure virtualization under a vulnerable hypervisor , 2011, 2011 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).

[12]  Peng Ning,et al.  Always up-to-date: scalable offline patching of VM images in a compute cloud , 2010, ACSAC '10.

[13]  Xuejie Zhang,et al.  Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.