Trusted Model for Virtual Machine Security in Cloud Computing

被引:4
|
作者
Narayana, K. Sathya [1 ]
Pasupuleti, Syam Kumar [2 ]
机构
[1] Univ Hyderabad UoH, Sch Comp Sci & Informat Sci SCIS, Hyderabad, India
[2] Inst Dev & Res Banking Technol IDRBT, Hyderabad, India
来源
PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017 | 2018年 / 710卷
关键词
Cloud computing; Virtual machine (VM); Confidentiality; Integrity and availability; Hypervisor;
D O I
10.1007/978-981-10-7871-2_63
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With growing of cloud computing, security of virtual machines also increases due to malicious insiders and external attackers. Virtual machines (VMs) in cloud computing need to be protected, since they are hosting critical data. In this paper, we propose trusted model for VM security in cloud computing. In our model, we encrypt the VM image and store in cloud, and it stops inside attackers from violating the confidentiality. Then, trusted third party (TTP) keeps on monitoring the VMs in cloud for integrity of VMs. Further, we are improving the availability of virtual machines using snapshot technique. Snapshot is very useful when VM is lost. Through security analysis, we prove confidentiality, integrity, and availability of VM. We evaluate the performance of our scheme in performance analysis.
引用
收藏
页码:655 / 665
页数:11
相关论文
共 50 条
  • [1] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [2] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [3] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [4] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [5] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [6] ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING
    Zhang, Chaochao
    Bai, Ling
    Chen, Su
    Jiang, Hai
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 75 - 79
  • [7] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [8] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [9] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [10] Power Model for Virtual Machine in Cloud Computing
    Chinprasertsuk, Satit
    Gertphol, Sethavidh
    2014 11TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2014, : 140 - 145