Efficient access of Cloud Resources through virtualization techniques

Cloud computing depends on Virtualization for service implementation and distribute resources to the end users over the web as web services. The major issue of Virtualization is a security which has been examined as an unproven commodity when user stipulates for cloud resources. The existing cloud protection systems provide improved security with the guest virtual machine, but retards in performance while accessing the resources through Virtualization. This paper proposes a novel architecture Efficient Cloud Protection System (ECPS) which detects the guest-to-guest attack in the Virtualization environment and provides efficient access of cloud resources to the users by providing easy access to the commonly used resources that saves the time spent in accessing frequently used resources. This architecture will integrate the functions of cloud security components like interceptor, warning recorder, etc., to reduce the computation thereby enhancing the security of the cloud protection system.

[1]  A. Volokyta,et al.  Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.

[2]  Michael W. Hicks,et al.  Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.

[3]  Xuxian Jiang,et al.  Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.

[4]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[5]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[6]  Kevin A. Kwiat,et al.  A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..

[7]  Frank Siebenlist Challenges and opportunities for virtualized security in the clouds , 2009, SACMAT '09.

[8]  J. IBMT.,et al.  virtualization and hardware-based security , 2009 .

[9]  Yoshiyasu Takefuji,et al.  A novel approach for a file-system integrity monitor tool of Xen virtual machine , 2007, ASIACCS '07.

[10]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[11]  William J. Caelli,et al.  Mutual Protection in a Cloud Computing Environment , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[12]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[13]  Wenke Lee,et al.  Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[14]  Rafael R. Obelheiro,et al.  Overlay Network Topology Reconfiguration in Byzantine Settings , 2007 .

[15]  P. Sai Kiran,et al.  Issues in Cloud Computing , 2011 .

[16]  Eddy Caron,et al.  Cloud Computing Resource Management through a Grid Middleware: A Case Study with DIET and Eucalyptus , 2009, 2009 IEEE International Conference on Cloud Computing.

[17]  Adam Lackorzynski,et al.  Virtual machines jailed: virtualization in systems with small trusted computing bases , 2009, VDTS '09.

[18]  Miguel Correia,et al.  Resilient Intrusion Tolerance through Proactive and Reactive Recovery , 2007, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007).

[19]  Zhoujun Li,et al.  VM-based Architecture for Network Monitoring and Analysis , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[20]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[21]  Gustavo Alonso,et al.  Engineering the cloud from software modules , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[22]  Roberto Di Pietro,et al.  A Security Management Architecture for the Protection of Kernel Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.