On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience

被引:12
|
作者
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Fac Sci, Adv Cyber Secur Res Ctr, Sydney, NSW, Australia
关键词
Integrated security architecture; access control; intrusion detection; trusted computing; resilience;
D O I
10.1109/TCC.2016.2535320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates access control security policies for secure interactions between applications and virtual machines in different physical virtualized servers. It provides intrusion detection and trusted attestation techniques to detect and counteract dynamic attacks in an efficient manner. We demonstrate how this integrated security architecture is used to secure the life cycle of virtual machines including dynamic hosting and allocation of resources as well as migration of virtual machines across different physical servers. We discuss the implementation of the developed architecture and show how the architecture can counteract attack scenarios involving malicious users exploiting vulnerabilities to achieve privilege escalation and then using the compromised machines to generate further attacks. The feedback between the various security components of our security architecture plays a critical role in detecting sophisticated, dynamically changing attacks, thereby increasing the resilience of the overall secure system.
引用
收藏
页码:375 / 389
页数:15
相关论文
共 50 条
  • [21] Architecture Design and Implementation of a Security Threat Data Sharing Platform
    Lamkin, Chase
    Akter, Mst Shapna
    Shahriar, Hossain
    Francia, Guillermo
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1502 - 1503
  • [22] Design and implementation of security architecture based on enterprise computer network
    Han, Hui-Lian
    Xu, Li
    Gong, Qing-Yong
    Dai, Xiu-Jiao
    Huabei Gongxueyuan Xuebao/Journal of North China Institute of Technology, 2005, 26 (03): : 187 - 192
  • [23] The Research of the Cloud Security Architecture
    Hu Xiangyi
    Ma Zhanguo
    Liu Yu
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 379 - 385
  • [24] Cloud Implementation Security Challenges
    Bamiah, Mervat
    Brohi, Sarfraz
    Chuprat, Suriayati
    Brohi, Muhammad Nawaz
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 174 - 178
  • [25] Survey on Implementation of Security in Cloud
    Garg, Deepak
    Sidhu, Jagpreet
    INTELLIGENT COMMUNICATION, CONTROL AND DEVICES, ICICCD 2017, 2018, 624 : 1587 - 1594
  • [26] Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
    Tiwari S.K.
    Neogi S.G.
    SN Computer Science, 4 (5)
  • [27] CONCEPTION, DESIGN AND IMPLEMENTATION OF AN INTERFACE FOR SECURITY IN CLOUD CONTROLLED BY THE END USER
    Hyseni, Dhurate
    Cico, Betim
    Selimi, Besnik
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2016, 8 (02): : 35 - 44
  • [28] ISSUES IN THE DESIGN AND IMPLEMENTATION OF A SYSTEM ARCHITECTURE FOR COMPUTER INTEGRATED MANUFACTURING
    JONES, A
    BARKMEYER, E
    DAVIS, W
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 1989, 2 (02) : 65 - 76
  • [29] Design and Implementation of a Network Security Chip with Improved Compression Approach
    Rajak, Abdul
    Gaidhane, Vilas H.
    D'costa, Aaron
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2020, 13 (04) : 507 - 515
  • [30] The Design and Implementation of Patent Collaboration Managing Platform Based on Cloud Architecture
    Wang, Xiang
    Yang, Yong
    Lin, Xiaoguang
    Chen, Yongyuan
    Zhang, Ju
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 872 - 875