Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization

被引:0
作者
Mjihil, Oussama [1 ]
Kim, Dong Seong [2 ]
Haqiq, Abdelkrim [1 ,3 ]
机构
[1] Hassan 1st Univ, Comp Networks Mobil & Modeling Lab, FST, Settat, Morocco
[2] Univ Canterbury, Dept Comp Sci & Software Engn, Cyber Secur, Christchurch 1, New Zealand
[3] E NGN Res Grp, Llanelli, Wales
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2016年 / 11卷 / 02期
关键词
Attack Graphs; Attack Representation Models; Cloud Computing; Security Analysis; Distributed Systems; Virtualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security, and they also have become more exigent in terms of extensibility and flexibility of their Information Technology infrastructures. Cloud computing is introduced as an evolution of information technology that offers major solutions and techniques to meet the evolving requirements of both tenants and clients. Therefore, extensibility and dynamic adjustment, which are among the most essential Cloud advantages, can make the security analysis a very hard task. There have been many approaches to analyze automatically the cyber security of traditional IT infrastructures without taking into account the dynamic nature of Cloud computing and it's new features, such as the nested virtualization. Until now, there is a few work to assess the security of Cloud computing. In this paper, we propose a novel approach to design and develop Model-based Automated Security Assessment Tool for Cloud Computing named MASAT.
引用
收藏
页码:87 / 96
页数:10
相关论文
共 35 条
[1]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]  
[Anonymous], 2011, NIST DEFINITION CLOU
[4]  
Beale J, 2004, NESSUS NETWORK AUDIT
[5]  
Ben-Yehuda M., 2010, P 9 USENIX C OPERATI, VVolume 10, P423
[6]   Study on the security models and strategies of cloud computing [J].
Che, Jianhua ;
Duan, Yamin ;
Zhang, Tao ;
Fan, Jie .
PEEA 2011, 2011, 23
[7]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[8]  
Christodorescu M., 2009, P 2009 ACM WORKSH CL, P97, DOI DOI 10.1145/1655008.1655022
[9]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[10]  
Flake G. W., 2004, INTERNET MATH, V1, P385, DOI DOI 10.1080/15427951.2004.10129093