5,514 Hits in 7.0 sec

Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud [article]

Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard
2020 arXiv   pre-print
In this way, the enterprises can monitor the performance of the security offerings of the cloud and have a choice to decide and select potential response strategies more appropriate to the enterprise in  ...  Using our proposed secure protocol, which is based on authentication and key exchange mechanism, the enterprises can send a secure request to the cloud provider to perform a selected defensive strategy  ...  (ii) to plan and select a desirable response strategy such as VM-LM technique to reduce risk and defend against the malicious co-resident VMs.  ... 
arXiv:2009.01604v1 fatcat:bxbmpknfr5ef5bqb52vr5hbjke

A Measurement Method of Threat for Co-Residency Detection Based On Cloud Model

Rui-xiang DU, Hong RONG, Ming XIAN, Jun GU, Wen WANG
2017 DEStech Transactions on Computer Science and Engineering  
Unfortunately, the absence of physical isolation inevitably give opportunities to number of security threats. in this paper, A cloud modelbased method for measuring potential threat of virtual machine  ...  of the detection and defense of the virtual machine in the cloud environment.  ...  Virtual machine co-residency detection is a necessary precondition steps to deployment malicious co-resident virtual machine to implement covert information stealing and resource destruction, if we can  ... 
doi:10.12783/dtcse/cmee2016/5355 fatcat:rsxswvcszjdrrnwljnrn2et6ua

Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges

Boubakeur Annane, Osman Ghazali
2019 International Journal of Interactive Mobile Technologies  
relevant virtualization security techniques existing in the literature.  ...  The new challenge is to develop secure methods in order to authenticate high sensitive digital content.  ...  A personalized security system [5] enables to handle the large scale of virtual machines and intensive applications management in cloud systems.  ... 
doi:10.3991/ijim.v13i04.10515 fatcat:hhf7lpny2feoblfesbxsfpop2i

A new secure proxy-based distributed virtual machines management in mobile cloud computing

Boubakeur Annane, Osman Ghazali, Adel Alti
2019 International Journal of Advanced Computer Research  
Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs).  ...  control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks).  ...  The authors would like to thank the Ministry of Education Malaysia and Universiti Utara Malaysia for supporting and funding this research.  ... 
doi:10.19101/ijacr.pid10 fatcat:4lblzjqoobhnbe4swjijcir76y

Integrating a network IDS into an open source Cloud Computing environment

Claudio Mazzariello, Roberto Bifulco, Roberto Canonico
2010 2010 Sixth International Conference on Information Assurance and Security  
To this purpose, we propose to investigate the consequences of the use of a distributed strategy to detect and block attacks, or other malicious activities, originated by misbehaving customers of a Cloud  ...  This paper presents the installation and deployment experience of a distributed defence strategy and illustrates the preliminary results of the performance evaluation.  ...  Hence, a proper defense strategy needs to be distributed. In this paper, we propose to deploy lightweight Network IDSs in each physical machine hosting customers' virtual machines.  ... 
doi:10.1109/isias.2010.5604069 dblp:conf/IEEEias/MazzarielloBC10 fatcat:62i2h2coibfy3m5kypbtjnf42y

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense [article]

Matheus Torquato, Marco Vieira
2019 arXiv   pre-print
To overcome this challenge, we intend to propose a set of models to evaluate the availability and security of MTD in cloud computing environments.  ...  MTD makes use of dynamic reconfiguration in virtualized environments to "confuse" attackers or to nullify their knowledge about the system state.  ...  In the cloud computing context, MTD techniques can be used to thwart or reduce the impact of security attacks as co-residency attacks [8] and Distributed Denial of Service attacks [9] .  ... 
arXiv:1909.01392v1 fatcat:7nmrbspd3bajpd4lt2hnpepv4e

Previously-Selected-Server-First based Scalable VM Placement Algorithm for Mitigating Side Channel Attacks in Cloud Computing

Adi Maheswara Reddy G, K Venkata Rao, JVR Murthy
2018 International Journal of Wireless and Microwave Technologies  
A secure Dynamic VM placement approach is presented for the VM allocations into different servers in the cloud.  ...  In this paper, the authors attempted to solve the issues by enhancing the VM Placement policies in such a way that, it is complex for the invaders to collocate their object.  ...  In [4] , employing side channel attack, it could be very flexible to obtain the confidential data from a machine as it is appreciable notion to provide security in contrast to side channel attack in cloud  ... 
doi:10.5815/ijwmt.2018.01.06 fatcat:eqvnxcx3grhz7gtguwsis63tti

Research gaps based virtualization in mobile cloud computing

Boubakeur Annane, Adel Alti, Osman Ghazali
2020 International Journal of Advanced Computer Research  
In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that  ...  on the virtual machines (VMs).  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2020.1048101 fatcat:tyqsmtqf5zdftb5pt4juhatxw4

An overview on Cloud Security and Proposed Solutions

Jamuna K M
2017 International Journal Of Engineering And Computer Science  
The benefits such as reduced costs, rapid application deployment, and elastic resources, have made many organizations to utilize cloud resources or host much of their data in the cloud.  ...  Recent studies shown that more than 70 percent of the world's businesses now operate some of their operations in the cloud. But the security of the data stored  ...  Co-residency has many threats since machines can be placed in a honored position relative to one another.  ... 
doi:10.18535/ijecs/v6i6.54 fatcat:5pnen5n72vd6bj6omm7refl274

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) [chapter]

Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
2020 Lecture Notes in Computer Science  
In this paper, we take the first step toward modeling and mitigating security threats unique to NFV. Specifically, we model both cross-layer and co-residency attacks on the NFV stack.  ...  As NFV relies on virtualization, and as an NFV stack typically involves several levels of abstraction and multiple co-resident tenants, this new technology also unavoidably leads to new security threats  ...  In contrast to clouds, NFV may have an increased attack surface in terms of co-residency attacks.  ... 
doi:10.1007/978-3-030-49669-2_1 fatcat:aon2pyvkdfhebpdwjueqr4k6ge

A Comprehensive Vision on Cloud Computing Environment: Emerging Challenges and Future Research Directions [article]

Sakshi Chhabra, Ashutosh Kumar Singh
2022 arXiv   pre-print
Through virtualization, which produces a virtual instance of a computer system running in an abstracted hardware layer, it has made it possible for us to share resources among many users.  ...  Contrary to early distributed computing models, it guarantees limitless computing resources through its expansive cloud datacenters, and it has been immensely popular in recent years because to its constantly  ...  physical machines that are security aware VMs for task deployment.  ... 
arXiv:2207.07955v1 fatcat:hvyobb7amvax7dq5i2k6l4keb4

Cloud Security Engineering: Theory, Practice and Future Research

Kim-Kwang Raymond Choo, Omer F. Rana, Muttukrishnan Rajarajan
2017 IEEE Transactions on Cloud Computing  
Permanent repository link: Link to published version: http://dx.  ...  Seeking to contribute to the challenge of assessing the likelihood of malicious co-residency in public cloud services, Ezhilchelvan and Mitrani (2016) present two allocation policies for assigning virtual  ...  A key focus is on the integration of theoretical foundations with practical deployment of security strategies that make cloud systems more secure for both end users and providers -enabling end users to  ... 
doi:10.1109/tcc.2016.2582278 fatcat:ozund3ulovbmjphjgagbvffzdq

Sift - An Efficient Method for Co-residency Detection on Amazon EC2

Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu
2016 Proceedings of the 2nd International Conference on Information Systems Security and Privacy  
But security has been a major barrier for its adoption to enterprise, as being placed with other tenants on the same physical machine (i.e. co-residency or co-location) poses a particular risk.  ...  Former research has shown how side channels in shared hardware may enable attackers to exfiltrate sensitive data across virtual machines (VMs).  ...  It is mentioned above that coresidency attacks in public clouds involve two steps: a launch strategy and co-residency detection.  ... 
doi:10.5220/0005742004230431 dblp:conf/icissp/ChenSLLYW16 fatcat:beuu6rejsbea7epmcqh53msh3y

VNF and Container Placement: Recent Advances and Future Trends [article]

Wissal Attaoui, Essaid Sabir, Halima Elbiaze, Mohsen Guizani
2022 arXiv   pre-print
Virtualization is not limited to simply replacing physical machines with virtual machines or VNFs, but may also include micro-services, containers, and cloud-native systems.  ...  This decoupling allows network services, referred to as Virtualized Network Functions (VNFs), to be hosted on commodity hardware which simplifies and enhances service deployment and management for providers  ...  In [75] , authors propose a Secure Container Deployment Strategy named SecCDS based on Genetic Algorithm (GA) to cope with co-resident attacks in container clouds.  ... 
arXiv:2204.00178v1 fatcat:giwlibsaknbkdnuvkao6nhkdnq

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud

Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu
2018 EAI Endorsed Transactions on Security and Safety  
However, some "stealthy bridges" could be established to break such isolation due to two features of the public cloud: virtual machine image sharing and virtual machine co-residency.  ...  The cloud becomes a public space where multiple "tenants" reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other.  ...  by leveraging virtual machine co-residency.  ... 
doi:10.4108/eai.4-1-2018.153526 fatcat:6ouo66adybgbbkuum2gczlgw7i
« Previous Showing results 1 — 15 out of 5,514 results