Securing Virtual Machine Images of Cloud by Encryption through Kerberos

被引:0
|
作者
Islam, S. M. Neamul [1 ]
Rahman, Md Mahbubur [2 ]
机构
[1] Bangladesh Univ Profess, Dept Informat & Commun Technol, Dhaka 1216, Bangladesh
[2] Mil Inst Sci & Technol, Dept Comp Sci & Engn, Dhaka 1216, Bangladesh
关键词
Cloud Computing Security; Virtual Machine Image; Kerberos; Encrypted Storage;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VIM images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.
引用
收藏
页码:1074 / 1079
页数:6
相关论文
共 50 条
  • [21] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033
  • [22] Securing textual and image data on cloud using searchable encryption
    Baliga B.S.
    Medepalli R.
    Muralikrishna S.N.
    International Journal of Information Technology, 2021, 13 (3) : 1111 - 1117
  • [23] Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption
    Cilardo, Alessandro
    Argenziano, Domenico
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1622 - 1627
  • [24] Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing
    Al-Attab, Basel Saleh
    Fadewar, H. S.
    Hodeish, Mahmoud E.
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 105 - 121
  • [25] Searchable Encryption with Pattern Matching for Securing Data on Cloud Server
    Pramanick, Neha
    Ali, Syed Taqi
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [26] Rubik's Cube Encryption for Securing Cloud Stored Data
    Anusree, T. T.
    Swaraj, K. P.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 679 - 685
  • [27] Optimized Adaboost Support Vector Machine-Based Encryption for Securing IoT-Cloud Healthcare Data
    Abushark, Yoosef B.
    Hassan, Shabbir
    Khan, Asif Irshad
    SENSORS, 2025, 25 (03)
  • [28] Enhance Security of Cloud Computing through Fork Virtual Machine
    Elham, Hafida
    Lebbat, Adil
    Medromi, Hicham
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 448 - 451
  • [29] Virtual machine placement in cloud systems through migration process
    Li, Kangkang
    Zheng, Huanyang
    Wu, Jie
    Du, Xiaojiang
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2015, 30 (05) : 393 - 410
  • [30] Securing Cloud Computing Through IT Governance
    Faizi, Salman M.
    Rahman, Shawon
    INFORMATION TECHNOLOGY IN INDUSTRY, 2019, 7 (01): : 1 - 14