Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization

被引:0
|
作者
Mjihil, Oussama [1 ]
Kim, Dong Seong [2 ]
Haqiq, Abdelkrim [1 ,3 ]
机构
[1] Hassan 1st Univ, Comp Networks Mobil & Modeling Lab, FST, Settat, Morocco
[2] Univ Canterbury, Dept Comp Sci & Software Engn, Cyber Secur, Christchurch 1, New Zealand
[3] E NGN Res Grp, Llanelli, Wales
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2016年 / 11卷 / 02期
关键词
Attack Graphs; Attack Representation Models; Cloud Computing; Security Analysis; Distributed Systems; Virtualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security, and they also have become more exigent in terms of extensibility and flexibility of their Information Technology infrastructures. Cloud computing is introduced as an evolution of information technology that offers major solutions and techniques to meet the evolving requirements of both tenants and clients. Therefore, extensibility and dynamic adjustment, which are among the most essential Cloud advantages, can make the security analysis a very hard task. There have been many approaches to analyze automatically the cyber security of traditional IT infrastructures without taking into account the dynamic nature of Cloud computing and it's new features, such as the nested virtualization. Until now, there is a few work to assess the security of Cloud computing. In this paper, we propose a novel approach to design and develop Model-based Automated Security Assessment Tool for Cloud Computing named MASAT.
引用
收藏
页码:87 / 96
页数:10
相关论文
共 50 条
  • [1] Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization
    Mjihil, Oussama
    Kim, Dong Seong
    Haqiq, Abdelkrim
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (05): : 283 - 292
  • [2] Framework for Management of Multi-tenant Cloud Environments
    Beranek, Marek
    Kovar, Vladimir
    Feuerlicht, George
    CLOUD COMPUTING - CLOUD 2018, 2018, 10967 : 309 - 322
  • [3] Design and Implementation of a Cloud SaaS Framework for Multi-Tenant Applications
    Morakos, Petros
    Meliones, Apostolos
    5TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS, IISA 2014, 2014, : 273 - 278
  • [4] A Framework of Scientific Workflow Management Systems for Multi-Tenant Cloud Orchestration Environment
    Rimal, Bhaskar Prasad
    El-Refaey, Mohamed A.
    19TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2010), 2010, : 88 - 93
  • [5] Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing
    Chen, Zhen
    Dong, Wenyu
    Li, Hang
    Zhang, Peng
    Chen, Xinming
    Cao, Junwei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (01) : 82 - 94
  • [6] Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing
    Zhen Chen
    Wenyu Dong
    Hang Li
    Peng Zhang
    Xinming Chen
    Junwei Cao
    TsinghuaScienceandTechnology, 2014, 19 (01) : 82 - 94
  • [7] New Solution for Isolation of Multi-tenant in cloud computing
    Yang, Manzhi
    Zhou, Huixiang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 334 - 337
  • [8] Analyzing Multi-Tenant Cloud Services' Accountability
    Masmoudi, Fatma
    Sellami, Mohamed
    Loulou, Monia
    Kacem, Ahmed Hadj
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2015, : 239 - 244
  • [9] Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing
    Deochake, Saurabh
    Channapattan, Vrushali
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [10] Accountability management for multi-tenant cloud services
    Masmoudi, Fatma
    Sellami, Mohamed
    Loulou, Monia
    Kacem, Ahmed Hadj
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) : 141 - 158