AN AUTHORIZED SECURITY MIDDLEWARE FOR MANAGING ON DEMAND INFRASTRUCTURE IN CLOUD

被引:0
|
作者
Manishankar, S. [1 ]
Arjun, C. S. [1 ]
Kumar, Arun P. R. [1 ]
机构
[1] Amrita Univ, Dept Comp Sci, Mysore, Karnataka, India
关键词
VM; cloud stack; IAAS; On-demand security; Dual-Authorization; Auto scalability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent increases in the field of infrastructure has led to the emerging of cloud computing a virtualized computing platform. This technology provides a lot of pros like rapid elasticity, ubiquitous network access and on-demand access etc. Compare to other technologies cloud computing provides many essential services. As the elasticity and scalability increases the chance for vulnerability of the system is also high. There are many known and unknown security risks and challenges present in this environment. In this research an environment is proposed which can handle security issues and deploys various security levels. The system handles the security of various infrastructure like VM and also handles the Dynamic infrastructure request control. One of the key feature of proposed approach is Dual authorization in which all account related data will be authorized by two privileged administrators of the cloud. The auto scalability feature of the cloud is be made secure for on-demand service request handling by providing an on-demand scheduler who will process the on-demand request and assign the required infrastructure. Combining these two approaches provides a secure environment for cloud users as well as handle On-demand Infrastructure request.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Security infrastructure for on-demand provisioned cloud infrastructure services
    System and Network Engineering Group, University of Amsterdam, Amsterdam, Netherlands
    不详
    不详
    [J]. Proc. - IEEE Int. Conf. Cloud Comput. Technol. Sci., CloudCom, (255-263):
  • [2] Cloud Infrastructure Security
    Velev, Dimiter
    Zlateva, Plamena
    [J]. OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 140 - +
  • [3] Managing infrastructure security risk
    Rees, DC
    Rubin, KI
    [J]. PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 1333 - 1338
  • [4] MIMO -: An infrastructure for monitoring and managing distributed middleware environments
    Rackl, G
    Lindermeier, M
    Rudorfer, M
    Süss, B
    [J]. MIDDLEWARE 2000, 2000, 1795 : 71 - 87
  • [5] Security Problems in Cloud Infrastructure
    Djenna, Amir
    Batouche, Mohamed
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS, 2014,
  • [6] Security Middleware Infrastructure for Medical Imaging System Integration
    Ma, Weina
    Sartipi, Kamran
    Sharghigoorabi, Mohammadhassan
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 353 - 357
  • [7] Security middleware for enhancing interoperability of Public Key infrastructure
    Lam, KY
    Chung, SL
    Gu, M
    Sun, JG
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 535 - 546
  • [8] Managing Security of Critical Information Infrastructure
    Erokhin, S. D.
    [J]. 2019 SYSTEMS OF SIGNAL SYNCHRONIZATION, GENERATING AND PROCESSING IN TELECOMMUNICATIONS (SYNCHROINFO), 2019,
  • [9] On-demand Middleware Delivery Services for Cloud Computing
    Hatakeyama, Takahisa
    Shinoda, Naohiro
    Onda, Tomoyuki
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2011, 47 (03): : 342 - 348
  • [10] On-demand Provisioning of Infrastructure, Middleware and Services for Simulation Workflows
    Vukojevic-Haupt, Karolina
    Karastoyanova, Dimka
    Leymann, Frank
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2013, : 91 - 98