Secure Virtualised Environment

被引:0
|
作者
Chouhan, Pushpinder Kaur [1 ]
Sezer, Sakir [1 ]
Choi, Yangseo [2 ]
Kim, Ikkyun [2 ]
Jung, Chunghwan [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast BT7 1NN, Antrim, North Ireland
[2] Elect & Telecommun Res Inst, Daejeon, South Korea
[3] Ahnlab Inc, Seoul, South Korea
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a technological advancement that provide resources through internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment. In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hypervisor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques. SVSS consists of four modules: Anti-Virus Control Module, Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module. A SVSS prototype has been deployed to validate its feasibility, efficiency and accuracy on Xen virtualised environment.
引用
收藏
页码:112 / 117
页数:6
相关论文
共 50 条
  • [31] A lightweight and secure protocol for teleworking environment
    Algarni, Fahad
    Jan, Saeed Ullah
    PLOS ONE, 2024, 19 (03):
  • [32] Secure protocol in mobile agent environment
    EL Rhazi, A
    Pierre, S
    Boucheneb, H
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 777 - 780
  • [33] Secure distributed computing in a commercial environment
    Golle, P
    Stubblebine, S
    FINANCIAL CRYTOGRAPHY, PROCEEDINGS, 2002, 2339 : 289 - 304
  • [34] Secure Environment Establishment for Multipath Routing
    John, Saju P.
    Simpson, Serin V.
    Niveditha, P. S.
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 1, 2023, 473 : 19 - 28
  • [35] Secure game development for IoT environment
    MyounJae, Lee
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (03): : 125 - 130
  • [36] Why SIEM is Irreplaceable in a Secure IT Environment?
    Podzins, Oskars
    Romanovs, Andrejs
    2019 OPEN CONFERENCE OF ELECTRICAL, ELECTRONIC AND INFORMATION SCIENCES (ESTREAM), 2019,
  • [37] Establishing a secure database application environment
    Zhao, LA
    Li, JC
    Xu, WJ
    Zhang, Y
    Niu, XM
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 5801 - 5803
  • [38] Secure Wipe Out in BYOD Environment
    Tiwari, Poorva
    Skanda, C. S.
    Sanjana, U.
    Arena, S.
    Honnavalli, Prasad
    2020 5TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2020), 2020, : 113 - 118
  • [40] Extensible environment for evaluating secure MANET
    Zhang, YG
    Huang, YA
    Lee, WK
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 339 - 350