On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience

被引:12
|
作者
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Fac Sci, Adv Cyber Secur Res Ctr, Sydney, NSW, Australia
关键词
Integrated security architecture; access control; intrusion detection; trusted computing; resilience;
D O I
10.1109/TCC.2016.2535320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates access control security policies for secure interactions between applications and virtual machines in different physical virtualized servers. It provides intrusion detection and trusted attestation techniques to detect and counteract dynamic attacks in an efficient manner. We demonstrate how this integrated security architecture is used to secure the life cycle of virtual machines including dynamic hosting and allocation of resources as well as migration of virtual machines across different physical servers. We discuss the implementation of the developed architecture and show how the architecture can counteract attack scenarios involving malicious users exploiting vulnerabilities to achieve privilege escalation and then using the compromised machines to generate further attacks. The feedback between the various security components of our security architecture plays a critical role in detecting sophisticated, dynamically changing attacks, thereby increasing the resilience of the overall secure system.
引用
收藏
页码:375 / 389
页数:15
相关论文
共 50 条
  • [31] Design and Implementation of a Slice as a Service Architecture on the Edge Cloud with Resource Constraints
    Azevedo, Rodrigo Ferraz
    de Paula, Luciano Bernardes
    Verdi, Fabio Luciano
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 380 - 384
  • [32] Design and Implementation of a Remote Monitoring System for the Elderly Based on Cloud Architecture
    Zhao, Y. Q.
    Yu, Z. Q.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2015), 2015, 123 : 110 - 112
  • [33] Improved Cloud Computing Security
    Hameed, Rasha Talal
    Hussain, Abdulatif Ali
    Mohamad, Omar Abdulwahabe
    Zidan, Khamis A.
    Hamid, Omar Talal
    Salman, Saba Abdulbaqi
    2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 170 - 175
  • [34] Design and Implementation of a Security Control Architecture for Software-Defined Networking
    Liu, Tie-jun
    Lin, Zhao-wen
    Xu, Jie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 779 - 785
  • [35] Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
    Martignon, Fabio
    Paris, Stefano
    Capone, Antonio
    COMPUTER NETWORKS, 2009, 53 (12) : 2192 - 2207
  • [36] Design and implementation of a hardware assisted security architecture for software integrity monitoring
    Morgan, Benoit
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    Averlant, Guillaume
    2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 189 - 198
  • [37] Cloud Slicing A new Architecture for Cloud Security Monitoring
    Aldribi, Abdulaziz
    Traore, Issa
    Letourneau, Gabriel
    2015 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2015, : 18 - 22
  • [38] Integrated security architecture for WLAN
    Carli, M
    Rossetti, A
    Neri, A
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 943 - 947
  • [39] An integrated perspective on resilience and food security
    Vonthron, Simon
    Dury, Sandrine
    Fallot, Abigail
    Alpha, Arlene
    Bousquet, Francois
    CAHIERS AGRICULTURES, 2016, 25 (06):
  • [40] The design of XML-based Internet Security Integrated System architecture
    Kim, KH
    Kim, TK
    Kim, DS
    Chung, TM
    COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 463 - 472