Cloud data security and integrity protection model based on distributed virtual machine agents

被引:21
|
作者
Xu, Xiaolong [1 ]
Liu, Guangpei [2 ]
Zhu, Jie [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing, Jiangsu, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud computing; data integrity; virtual machine agent;
D O I
10.1109/CyberC.2016.11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, cloud users' data bring about many security issues, including data leakage and data tampering. Now, the security and integrity of cloud data usually depend on a trusted third party auditors. Although the introduction of a third-party mechanism can reduce the cost of computing and communication costs in the client, the mechanism increases the threat of data leakage to a third party and we will be unable to avoid the conspiracy threat of cloud service providers and third-party mechanism. In this paper, we propose the model of distributed virtual machine agent, and the model provides a unique and credible monitoring of virtual machines for each user in the cloud, so that even the sole administrator of the cloud server monitoring mechanism cannot bypass it and obtain protected sensitive data, preventing data from being tampered. In addition, based on virtual machine agent auditing data, we utilize a data integrity protocol to make sure the users' data availability and integrity. Security analysis proves that the protocol can defend three kinds of attack from cloud service provider in our security model.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [11] Analysing Virtual Machine Security in Cloud Systems
    Al Said, Taimur
    Rana, Omer F.
    [J]. INTELLIGENT CLOUD COMPUTING, 2015, 8993 : 137 - 151
  • [12] Increasing virtual machine security in cloud environments
    Roland Schwarzkopf
    Matthias Schmidt
    Christian Strack
    Simon Martin
    Bernd Freisleben
    [J]. Journal of Cloud Computing: Advances, Systems and Applications, 1 (1):
  • [13] Priority Based Virtual Machine Allocation and Scheduling for Security in Cloud Computing
    Radhika, T. V.
    Gouda, Krushna Chandra
    Kumar, S. Sathish
    [J]. SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 617 - 625
  • [14] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [15] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    [J]. Tsinghua Science and Technology, 2019, 24 (05) : 520 - 534
  • [16] A Novel Framework for Cloud based Virtual Machine Security by Change Management using Machine
    Radharani, S.
    Narasimha, V. B.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 658 - 666
  • [17] Distributed Machine Learning Oriented Data Integrity Verification Scheme in Cloud Computing Environment
    Zhao, Xiao-Ping
    Jiang, Rui
    [J]. IEEE ACCESS, 2020, 8 : 26372 - 26384
  • [18] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [19] Virtual Public Cloud Model in Honeypot for Data Security: A New Technique
    Saxena, Ms Apurva
    Ubnare, Gaurav
    Dubey, Anubha
    [J]. ICCAI '19 - PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE, 2019, : 66 - 71
  • [20] Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security
    Subha, T.
    Jayashri, S.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 55 - 60