Secure VM Backup and Vulnerability Removal in Infrastructure Clouds

被引:0
|
作者
Kaur, Prabhjeet [1 ]
Somani, Gaurav [1 ]
机构
[1] Cent Univ Rajasthan, Kishangarh 305801, Ajmer, India
关键词
Virtualization; Snapshots; VM-Clone; VM-SAVER;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The multi-tenant nature of cloud and provision of resources in terms of virtual machines (VM's) establishes an immense need of rethinking about the applicability of earlier backup and recovery methods in virtual machines based infrastructure cloud platforms. In this work, we have proposed a complete backup and recovery framework, VM-SAVER, which provides a flexible and scalable backup and recovery models for virtualized physical servers inside a multi-tenant cloud. VM-SAVER incorporates the basic state saving methods of various hypervisors and proposes various approaches and scenarios where the virtualized servers backup and recovery is ensured. In addition to this, our framework also has a novel feature of vulnerability detection and removal from the running VM's and past backups. This novel framework is flexible, reconfigurable and can work with a range of hypervisors making it suitable for the present day infrastructure clouds.
引用
收藏
页码:1217 / 1226
页数:10
相关论文
共 50 条
  • [1] Enhanced Secure Mechanism for VM Migration in Clouds
    Janjua, Kanwal
    Ali, Waris
    [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 135 - 140
  • [2] HPC-Aware VM Placement in Infrastructure Clouds
    Gupta, Abhishek
    Kale, Laxmikant V.
    Milojicic, Dejan
    Faraboschi, Paolo
    Balle, Susanne M.
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 11 - 20
  • [3] Enabling Secure VM-vTPM Migration in Private Clouds
    Danev, Boris
    Masti, Ramya Jayaram
    Karame, Ghassan O.
    Capkun, Srdjan
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 187 - 196
  • [4] Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A
    Kim, MyoungSu
    Lee, Kyungroul
    Yim, Kangbin
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 386 - 391
  • [5] Secure VM management with strong user binding in semi-trusted clouds
    Inokuchi, Keisuke
    Kourai, Kenichi
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [6] Dependability Models for Eucalyptus Infrastructure Clouds Considering VM Life-cycle
    Brilhante, Jonathan
    Silva, Bruno
    Maciel, Paulo
    Zimmermann, Armin
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 1336 - 1341
  • [7] Secure VM management with strong user binding in semi-trusted clouds
    Keisuke Inokuchi
    Kenichi Kourai
    [J]. Journal of Cloud Computing, 9
  • [8] A Novel Approach to Automated, Secure, Reliable, & Distributed Backup of MER Tactical Data on Clouds
    Chang, George
    Shams, Khawaja
    Callas, John
    Kern, Alex
    [J]. 2012 IEEE AEROSPACE CONFERENCE, 2012,
  • [9] FIFE: an Infrastructure-as-Code Based Framework for Evaluating VM Instances from Multiple Clouds
    Lin, Yuhui
    Briggs, Jack
    Barker, Adam
    [J]. 2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 91 - 100
  • [10] Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds
    Saxena, Deepika
    Gupta, Rishabh
    Singh, Ashutosh Kumar
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, : 1 - 15