Securing Virtual Machine Images of Cloud by Encryption through Kerberos

被引:0
|
作者
Islam, S. M. Neamul [1 ]
Rahman, Md Mahbubur [2 ]
机构
[1] Bangladesh Univ Profess, Dept Informat & Commun Technol, Dhaka 1216, Bangladesh
[2] Mil Inst Sci & Technol, Dept Comp Sci & Engn, Dhaka 1216, Bangladesh
来源
2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT) | 2017年
关键词
Cloud Computing Security; Virtual Machine Image; Kerberos; Encrypted Storage;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VIM images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.
引用
收藏
页码:1074 / 1079
页数:6
相关论文
共 50 条
  • [1] A Hybrid Encryption Scheme for Securing Images in the Cloud
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 795 - 800
  • [2] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589
  • [3] Securing Cloud Virtual Machine Image Using Ethereum Blockchain
    Basu, Srijita
    Karmakar, Sandip
    Bera, Debasish
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [4] Smart encryption channels for securing virtual machine-based networked applications
    Itani, Wassim
    Kayssi, Ayman
    Chehab, Ali
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 507 - 518
  • [5] Securing Virtual Machines on Cloud through Game Theory Approach
    Prabhakar, Kashish
    Dutta, Kaushik
    Jain, Rachana
    Sharma, Mayank
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 859 - 863
  • [6] Data Encryption in Virtual Machine Transfer over Cloud Network
    Mukhopadhyay, Raja
    Mukhopadhyay, I.
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [7] A survey on securing the virtual cloud
    Denz, Robert
    Taylor, Stephen
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2013, 2 (01):
  • [8] Applying Homomorphic Encryption For Securing Cloud Database
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 658 - 664
  • [9] When Cloud Virtual Machine Images Need to Be Updated
    Netto, Marco A. S.
    Assuncao, Marcos D.
    Renganarayana, Lakshminarayanan
    Young, Chris
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 884 - 887
  • [10] Software Bundling Selection for Cloud Virtual Machine Images
    Netto, Marco A. S.
    Assuncao, Marcos D.
    Renganarayana, Lakshminarayanan
    Young, Chris
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 575 - 581