Securing Virtual Machine Images of Cloud by Encryption through Kerberos

被引:0
|
作者
Islam, S. M. Neamul [1 ]
Rahman, Md Mahbubur [2 ]
机构
[1] Bangladesh Univ Profess, Dept Informat & Commun Technol, Dhaka 1216, Bangladesh
[2] Mil Inst Sci & Technol, Dept Comp Sci & Engn, Dhaka 1216, Bangladesh
关键词
Cloud Computing Security; Virtual Machine Image; Kerberos; Encrypted Storage;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VIM images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.
引用
收藏
页码:1074 / 1079
页数:6
相关论文
共 50 条
  • [31] Securing Cloud Infrastructure through PKI
    Ijaz, Imran
    Aslam, Abroo
    Bukhari, Bushra
    Javed, Rabia
    Anees, Sumaira
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [32] Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines
    Hu, Yaohui
    Panhale, Sanket
    Li, Tianlin
    Kaynar, Emine
    Chan, Danny
    Deshpande, Umesh
    Yang, Ping
    Gopalan, Kartik
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 613 - 620
  • [33] Securing biometric images using encryption - Capstone Experience Project
    Amer, Suhair
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1048 - 1052
  • [34] An Authentication Framework for Securing Virtual Machine Migration
    Majhi, Santosh Kumar
    Dhal, Sunil Kumar
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1283 - 1286
  • [35] SECURING VIRTUAL EXECUTION ENVIRONMENTS THROUGH MACHINE LEARNING-BASED INTRUSION DETECTION
    Azmandian, Fatemeh
    Kaeli, David R.
    Dy, Jennifer G.
    Aslam, Javed A.
    2015 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2015,
  • [36] Securing Virtual Network Function (VNF) in telco cloud
    Ravichandran B.
    Journal of ICT Standardization, 2020, 8 (03): : 235 - 246
  • [37] Ant Colony Optimization Algorithm for Building Virtual Machine Images in Cloud Systems
    Shukhman, Alexander E.
    Polezhaev, Petr N.
    Legashev, Leonid V.
    Ushakov, Yury A.
    Bolodurina, Irina P.
    PROCEEDINGS OF THE 2018 3RD RUSSIAN-PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC), 2018,
  • [38] Exploiting the Locality of Virtual-Machine Images to Boost the Performance of a Cloud Platform
    Chen, Shuo-Han
    Chen, Tseng-Yi
    Lee, Chi-Heng
    Wei, Hsin-Wen
    Hsu, Tsan-Sheng
    Shih, Wei-Kuan
    2016 IEEE 37TH SARNOFF SYMPOSIUM, 2016,
  • [39] Live deduplication storage of virtual machine images in an open-source cloud
    Ng, Chun-Ho
    Ma, Mingcao
    Wong, Tsz-Yeung
    Lee, Patrick P. C.
    Lui, John C. S.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 7049 LNCS : 81 - 100
  • [40] Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud
    Ng, Chun-Ho
    Ma, Mingcao
    Wong, Tsz-Yeung
    Lee, Patrick P. C.
    Lui, John C. S.
    MIDDLEWARE 2011, 2011, 7049 : 81 - 100