A Framework for Monitoring and Security Authentication in Cloud based on Eucalyptus

被引:0
|
作者
Gao, Zefeng [1 ]
Li, Xiaoyong [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing, Peoples R China
关键词
Cloud Computing; Eucalyptus; KVM; XEN;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the cloud computing was proposed, the research of cloud instantaneously swept the world and all kinds of cloud products have appeared in public eyes. But if the cloud platform security is not guaranteed, companies or individuals will not run and store their own data in the cloud, especially since the Hollywood nude-picture scandal event put the cloud computing to the point of a struggle. So how to put these cloud product promotion out and make interest to the company becomes the company's biggest problem, and the credible cloud's service has become an urgency to implement. In this paper, we are concerned with trust in the cloud computing. Paper mainly launches the discussion from the application layer and infrastructure layer. The monitoring system collects data from cloud system real time, and makes the corresponding judgment according to the analysis results. At the same time, the system will report the data to the third party to record and modify the system rules timely. By these means, the cloud system can improve the stability of the service and make it more credible.
引用
收藏
页码:349 / 353
页数:5
相关论文
共 50 条
  • [31] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [32] Formal Security Framework For Agent Based Cloud Systems
    Masmoudi, Fatma
    Loulou, Monia
    Kacem, Ahmed Hadj
    [J]. 2014 3RD INTERNATIONAL WORKSHOP ON ADVANCED INFORMATION SYSTEMS FOR ENTERPRISES (IWAISE'14), 2014, : 15 - 21
  • [33] Location-Based Security Framework for Cloud Perimeters
    Jaiswal, Chetan
    Nath, Mahesh
    Kumar, Vijay
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (03): : 56 - 64
  • [34] Container Based On-Premises Cloud Security Framework
    Bhowmik, Soumya
    Bhanu, S. Mary Saira
    Rajendran, Balaji
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 773 - 778
  • [35] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [36] A Taxonomy for SLA-based Monitoring of Cloud Security
    Petcu, Dana
    [J]. 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 640 - 641
  • [37] Monitoring-Based Certification of Cloud Service Security
    Krotsiani, Maria
    Spanoudakis, George
    Kloukinas, Christos
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2015 CONFERENCES, 2015, 9415 : 644 - 659
  • [38] Security Monitoring in the Cloud: an SLA-based approach
    Casola, Valentina
    De Benedictis, Alessandra
    Rak, Massimiliano
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 749 - 755
  • [39] A novel framework paradigm for EMR management cloud system authentication using blockchain security network
    Thilagavathy, R.
    Renjith, P. N.
    Lalitha, R. V. S.
    Murthy, Mantripragada Yaswanth Bhanu
    Sucharitha, Yadala
    Narayanan, S. Lakshmi
    [J]. SOFT COMPUTING, 2023,
  • [40] Finger Print Authentication For Improved Cloud Security
    Venakatesan, N.
    Kumar, M. Rathan
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 434 - 439