Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud

被引:7
|
作者
Toumi, Hicham [1 ]
Fagroud, Fatima Zahra [2 ]
Zakouni, Amiyne [1 ]
Talea, Mohamed [2 ]
机构
[1] Chouaib Doukkali Univ, Higher Sch Technol Sidi Bennour, El Jadida 24000, Morocco
[2] Hassan II Univ, Fac Sci Ben Msik, Casablanca, Morocco
关键词
Cloud Computing; Security; Firewall; Availability; Mobile Agents; ISSUES; CHALLENGES;
D O I
10.1016/j.procs.2019.11.005
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The growth in customer requirements, big data analysis and pressures on response time, high costs of network platforms pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. The increase of Cloud users and their interactions with the Cloud infrastructure raise the risk of resources faults. Such a problem can lead to a bad reputation of the Cloud environment, which slows down the evolution of this paradigm. The dynamic architecture and the complex system of the Cloud should be taken into account. In fact, this paradigm Cloud requires that resources protection and healing must be effective, transparent and without external intervention. Thus, it is essential the use fundamental aspects of autonomic Computing in the Cloud to deal with the self-healing of Cloud security. The high degree of match between autonomic Computing systems and multi-agent systems permit to create an intelligent architecture Cloud that support autonomic aspects. Therefore, we propose a cooperative framework based on Hybrid intrusion detection system (Hy-IDS), mobile Agents and Firewall, which permit to detect both insider and outsider attacks with high detection accuracy in Cloud environment. In this paper, we propose a Cloud Computing framework offering the access security, ease of resources management using mobile agents and service availability in a reliable structure with lower cost. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:819 / 824
页数:6
相关论文
共 5 条
  • [1] Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
    Li, Yanhuang
    Cuppens-Boulahia, Nora
    Crom, Jean-Michel
    Cuppens, Frederic
    Frey, Vincent
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 105 - 118
  • [2] Enhance Security of Cloud Computing through Fork Virtual Machine
    Elham, Hafida
    Lebbat, Adil
    Medromi, Hicham
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 448 - 451
  • [3] MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment
    Anitha, H. M.
    Jayarekha, P.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 615 - 623
  • [4] vmiTLP: A Security Protocol Towards a Trusted Launch Process of a User Generic Virtual Machine Image on a Public Cloud IaaS Platform
    Balmany, M. El
    Asimi, Ahmed
    Tbatou, Dr.
    [J]. IAENG International Journal of Computer Science, 2022, 49 (01) : 166 - 176
  • [5] Cloud data security and integrity protection model based on distributed virtual machine agents
    Xu, Xiaolong
    Liu, Guangpei
    Zhu, Jie
    [J]. 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 6 - 13