Cloud data security and integrity protection model based on distributed virtual machine agents

被引:21
|
作者
Xu, Xiaolong [1 ]
Liu, Guangpei [2 ]
Zhu, Jie [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing, Jiangsu, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud computing; data integrity; virtual machine agent;
D O I
10.1109/CyberC.2016.11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, cloud users' data bring about many security issues, including data leakage and data tampering. Now, the security and integrity of cloud data usually depend on a trusted third party auditors. Although the introduction of a third-party mechanism can reduce the cost of computing and communication costs in the client, the mechanism increases the threat of data leakage to a third party and we will be unable to avoid the conspiracy threat of cloud service providers and third-party mechanism. In this paper, we propose the model of distributed virtual machine agent, and the model provides a unique and credible monitoring of virtual machines for each user in the cloud, so that even the sole administrator of the cloud server monitoring mechanism cannot bypass it and obtain protected sensitive data, preventing data from being tampered. In addition, based on virtual machine agent auditing data, we utilize a data integrity protocol to make sure the users' data availability and integrity. Security analysis proves that the protocol can defend three kinds of attack from cloud service provider in our security model.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [1] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [2] DATA LOSS PROTECTION AND DATA SECURITY USING AGENTS FOR CLOUD ENVIRONMENT
    Carolin, S. Petcy
    Somasundaram, M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [3] Towards virtual machine introspection based security framework for cloud
    Borisaniya, Bhavesh
    Patel, Dhiren
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02):
  • [4] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    [J]. Sādhanā, 2019, 44
  • [5] Blockchain data-based cloud data integrity protection mechanism
    Wei, PengCheng
    Wang, Dahu
    Zhao, Yu
    Tyagi, Sumarga Kumar Sah
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 902 - 911
  • [6] Geography Aware Virtual Machine Migrations for Distributed Cloud Data Centers
    Pritom, Sakif Shahriar
    Lutfiyya, Hanan
    [J]. 2015 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2015, : 219 - 222
  • [7] An Edge Cloud Data Integrity Protection Scheme Based on Blockchain
    Duan, Weihua
    Jiang, Yu
    Xu, Xiaolong
    Zhang, Ziming
    Liu, Guanpei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Security and Integrity of a Distributed File Storage in a Virtual Environment
    Sala, Gaspare
    Sgandurra, Daniele
    Baiardi, Fabrizio
    [J]. SISW 2007: FOURTH INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2007, : 58 - +
  • [9] Increasing virtual machine security in cloud environments
    Schwarzkopf, Roland
    Schmidt, Matthias
    Strack, Christian
    Martin, Simon
    Freisleben, Bernd
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1
  • [10] ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING
    Zhang, Chaochao
    Bai, Ling
    Chen, Su
    Jiang, Hai
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 75 - 79