On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience

被引:12
|
作者
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Fac Sci, Adv Cyber Secur Res Ctr, Sydney, NSW, Australia
关键词
Integrated security architecture; access control; intrusion detection; trusted computing; resilience;
D O I
10.1109/TCC.2016.2535320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates access control security policies for secure interactions between applications and virtual machines in different physical virtualized servers. It provides intrusion detection and trusted attestation techniques to detect and counteract dynamic attacks in an efficient manner. We demonstrate how this integrated security architecture is used to secure the life cycle of virtual machines including dynamic hosting and allocation of resources as well as migration of virtual machines across different physical servers. We discuss the implementation of the developed architecture and show how the architecture can counteract attack scenarios involving malicious users exploiting vulnerabilities to achieve privilege escalation and then using the compromised machines to generate further attacks. The feedback between the various security components of our security architecture plays a critical role in detecting sophisticated, dynamically changing attacks, thereby increasing the resilience of the overall secure system.
引用
收藏
页码:375 / 389
页数:15
相关论文
共 50 条
  • [1] Design and implementation of cloud-edge integrated security authentication system
    Chen, Cai-Sen
    Ji, Bo-Gong
    Kou, Ying-Zhan
    Du, Jia-Xing
    Journal of Computers (Taiwan), 2021, 32 (04) : 179 - 186
  • [2] Design and Implementation of a Cloud PACS Architecture
    Kawa, Jacek
    Pycinski, Bartlomiej
    Smolinski, Michal
    Bozek, Pawel
    Kwasecki, Marek
    Pietrzyk, Bartosz
    Szymanski, Dariusz
    SENSORS, 2022, 22 (21)
  • [3] Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health
    Zhang, Tianwei
    Lee, Ruby B.
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (06) : 799 - 815
  • [4] Cloud edge integrated security architecture of new cloud manufacturing system
    ZHAO Longbo
    LI Bohu
    YUAN Haitao
    Journal of Systems Engineering and Electronics, 2024, 35 (05) : 1177 - 1189
  • [5] Cloud Edge Integrated Security Architecture of New Cloud Manufacturing System
    Zhao, Longbo
    Li, Bohu
    Yuan, Haitao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2024, 35 (05) : 1177 - 1189
  • [6] Hierarchy Architecture Security Design for Energy Cloud
    Hong, Yoon-Kee
    Nam, Hong-Soon
    Lee, Seok-Jin
    Kim, Taehyung
    Jeong, Youn-Kwae
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1187 - 1189
  • [7] Design and Implementation of Security Cloud Storage Framework
    Yang Wei
    Zhao Jianpeng
    Zhu Junmao
    Zhong Wei
    Yao Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 323 - 326
  • [8] Design and Implementation of cloud storage security system
    Zhou, Meirong
    Jiang, Zhengtao
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2325 - 2329
  • [9] Design and Implementation of Security System for Cloud Storage
    Chueh, Ju-Shu
    Sun, Min-Te
    2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 129 - 134
  • [10] An Architecture of Virtual Desktop Cloud: Design and Implementation
    Liu, Zhan-wei
    Fan, Tong-rang
    Zhao, Zheng-xu
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 243 - 248