Secure Virtualised Environment

被引:0
|
作者
Chouhan, Pushpinder Kaur [1 ]
Sezer, Sakir [1 ]
Choi, Yangseo [2 ]
Kim, Ikkyun [2 ]
Jung, Chunghwan [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast BT7 1NN, Antrim, North Ireland
[2] Elect & Telecommun Res Inst, Daejeon, South Korea
[3] Ahnlab Inc, Seoul, South Korea
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a technological advancement that provide resources through internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment. In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hypervisor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques. SVSS consists of four modules: Anti-Virus Control Module, Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module. A SVSS prototype has been deployed to validate its feasibility, efficiency and accuracy on Xen virtualised environment.
引用
收藏
页码:112 / 117
页数:6
相关论文
共 50 条
  • [41] Secure access of products in a process environment
    Chou, SC
    Lai, CW
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (02): : 197 - 203
  • [42] A SECURE RUNNING ENVIRONMENT FOR MULTIPLE PLATFORMS
    Savola, Reijo M.
    ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 129 - 134
  • [43] Secure Communications for PACS in a Cloud Environment
    Rostrom, Tim
    Teng, Chia-Chi
    2011 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2011, : 8219 - 8222
  • [44] Enabling secure discovery in a pervasive environment
    Trabelsi, Slim
    Pazzaglia, Jean-Christophe
    Roudier, Yves
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 18 - 31
  • [45] Management of diabetes within a secure environment
    Booles, Keith
    PRACTICAL DIABETES, 2014, 31 (02) : 62 - 66
  • [46] Secure Peripherals in a Converged Mobile Environment
    du Toit, Jaco
    Ellefsen, Ian
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 296 - 308
  • [47] Reliability of computational experiments on virtualised hardware
    Kotthoff, Lars
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 33 - 49
  • [48] TVLAN: Trusted and Virtualised Local Area Networks
    Tupakula, Udaya
    Varadharajan, Vijay
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 606 - 612
  • [49] Trusted and secure clustering in mobile pervasive environment
    Gaur, Madhu Sharma
    Pant, Bhaskar
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [50] Authorized Deduplication: an Approach for Secure Cloud Environment
    Waghmare, Vivek
    Kapse, Smita
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 815 - 823