Secure Virtual Layer Management in Clouds

被引:0
|
作者
Abbadi, Imad M. [1 ]
Alawneh, Muntaha [2 ]
Martin, Andrew [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
[2] Royal Holloway Univ London, Informat Secur Grp, Egham, Surrey, England
关键词
D O I
10.1109/TrustCom.2011.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Clouds are composed of enormous resources and are associated with attractive properties, e.g. scalability and resilience. Such properties are the result of Clouds dynamic nature. Cloud dynamism is desirable property for different reasons such as resilience, resource consolidation, and maintenance windows. However, such dynamism exposes many security and management concerns for Cloud providers as well as for Cloud users. For example how can Cloud providers assure users that: (a.) dependent applications running on different VMs (Virtual Machines) are hosted within physical proximity (performance reasons); (b.) mutually exclusive VMs are not hosted at the same physical server (e. g. availability and security reasons); and (c.) when migrating VMs the new allocated physical servers satisfy users application requirements and security and privacy criteria. In this paper we explore this important problem. We then propose a framework, which at this foundation stage focuses on providing secure environment for the management of Clouds' virtual layer. It also helps in establishing trust in Clouds operational management. We also propose our planned implementation layout using OpenStack.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [41] New secure communication layer standard for medical image management (ISCL)
    Kita, K
    Nohara, T
    Hosoba, M
    Yachida, M
    Yamaguchi, M
    Ohyama, N
    [J]. MEDICAL IMAGING 1999 - PACS DESIGN AND EVALUATION: ENGINEERING AND CLINICAL ISSUES, 1999, 3662 : 120 - 129
  • [42] Multi-layer key management for secure multimedia multicast communications
    Sun, Y
    Liu, KJR
    [J]. 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 205 - 208
  • [43] Key Management Scheme for Multi-Layer Secure Group Communication
    Aparna, R.
    Amberker, B. B.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 218 - +
  • [44] Secure Key Management for 5G Physical Layer Security
    Mazin, Asim
    Davaslioglu, Kemal
    Gitlin, Richard D.
    [J]. 2017 IEEE 18TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON), 2017,
  • [45] UVBond: Strong User Binding to VMs for Secure Remote Management in Semi-Trusted Clouds
    Inokuchi, Keisuke
    Kourai, Kenichi
    [J]. 2018 IEEE/ACM 11TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2018, : 213 - 222
  • [46] POBRES: Policy-Based Re-Encryption Schema for Secure Resource Management in Clouds
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    [J]. 17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, 2017, : 15 - 21
  • [47] Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds
    Saxena, Deepika
    Gupta, Rishabh
    Singh, Ashutosh Kumar
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 21 (04) : 1 - 15
  • [48] Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough
    Futagami, Shota
    Unoki, Tomoya
    Kourai, Kenichi
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 430 - 440
  • [49] A framework of cloud-based virtual phones for secure intelligent information management
    Ding, Jiun-Hung
    Chien, Roger
    Hung, Shih-Hao
    Lin, Yi-Lan
    Kuo, Che-Yang
    Hsu, Ching-Hsien
    Chung, Yeh-Ching
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (03) : 329 - 335
  • [50] Design and Implementation of a Portable ID Management Framework for a Secure Virtual Machine Monitor
    Hirano, Manabu
    Okuda, Takeshi
    Kawai, Eiji
    Yamaguchi, Suguru
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 211 - 216