CloudI: Cloud Security based on Cloud Introspection

被引:0
|
作者
Zhang, Jian [1 ]
Wang, Wenxu [1 ]
Gong, Liangyi [1 ]
Gu, Zhaojun [2 ]
机构
[1] Tianjin Univ Technol, 391 Binshui Xidao Rd, Tianjin, Peoples R China
[2] Civil Aviat Univ China, Informat Secur Evaluat Ctr Civil Aviat, 2898 North Rd, Tianjin, Peoples R China
关键词
Cloud Security; Cloud Introspection Technology; Cloud Probe; Introspection Cloud;
D O I
10.1145/3195106.3195134
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the extensive application of cloud computing technology, the government, enterprises and individuals have migrated their IT applications and sensitive data to the cloud. The cloud security issues have been paid more and more attention by academics and industry. At present, the cloud security solutions are mainly implemented in the user cloud platform, such as the internal part of guest virtual machine, high privileged domain, and virtual machine monitor (VMM) or hardware layer. Through the monitoring of the tenant virtual machine to find out malicious attacks and abnormal state, which ensures the security of user cloud to a certain extent. However, this kind of method has the following shortcomings: firstly, it will increase the cloud platform overhead and interfere with the normal cloud services. Secondly, it could only obtain a limited type of security state information, so the function is single and difficult to expand. Thirdly, there will cause false information if the user cloud platform has been compromised, which will affect the effectiveness of cloud security monitoring. This paper proposes a cloud security model based on cloud introspection technology. In the user cloud platform, we deploy cloud probes to obtain the user cloud state information, such as system memory, network communication and disk storage, etc. Then we synchronize the cloud state information to the introspection cloud, which is deployed independent. Finally, through bridging the semantic gap and data analysis in the introspection cloud, we can master the security state of user cloud. At the same time, we design and implement the prototype system of CloudI (Cloud Introspection). Through the comparison with the original cloud security technology by a series of experiments, CloudI has characteristics of high security, high performance, high expandability and multiple functions.
引用
收藏
页码:341 / 346
页数:6
相关论文
共 50 条
  • [1] Towards virtual machine introspection based security framework for cloud
    Borisaniya, Bhavesh
    Patel, Dhiren
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02):
  • [2] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    [J]. Sādhanā, 2019, 44
  • [3] Agentless and Uniform Introspection for Various Security Services in IaaS Cloud
    Zhou, Huaizhe
    Ba, Haihe
    Ren, Jiangchun
    Wang, Yongjun
    Li, Yunshi
    Chen, Yong
    Wang, Zhiying
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 140 - 144
  • [4] NODEGUARD: A Virtualized Introspection Security Approach for the Modern Cloud Data Center
    Shamseddine, Maha
    Al-Dulaimy, Auday
    Itani, Wassim
    Nolte, Thomas
    Papadopoulos, Alessandro, V
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 790 - 797
  • [5] Virtual Machine Introspection based Cloud Monitoring Platform
    Lauren, Samuel
    Leppanen, Ville
    [J]. COMPUTER SYSTEMS AND TECHNOLOGIES (COMPSYSTECH'18), 2018, 1641 : 104 - 109
  • [6] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [7] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [8] ESI-Cloud: Extending Virtual Machine Introspection for Integrating Multiple Security Services
    Ren, Jiangchun
    Liu, Ling
    Zhang, Da
    Zhou, Huaizhe
    Zhang, Qi
    [J]. PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 804 - 807
  • [9] Cloud Security Can the cloud be secured?
    Karnad, Kiran
    Nagenthram, Saravanan
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
  • [10] A focus on future cloud: machine learning-based cloud security
    Subramanian, E. K.
    Tamilselvan, Latha
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (03) : 237 - 249