Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Computing Virtualization Security Management

MohamedA. Elfiky, Nashwa Abdelbaki

Abstract


The cloud concept was used to denote the segregation point between the responsibility of the provider and the user. Cloud computing overcome this border to cover servers as well as the network infrastructure. Virtualization is one of the most significant technologies to impact computing in the last few years. It is the backbone for cloud computing. Virtualization systems is exposed to some threats inherited from regular computerized systems for example Denial-of-Service (DoS) attacks, Zombies and honeypots.  Some types of threats and vulnerabilities is dedicated to virtual machines. The core of VM vulnerabilities comes from a compromised VM can be attack other VMs on the same hypervisor or can be attack the hypervisor itself because they are in the same physical hardware layer. Co-location of multiple VMs increases the attack surface and risk of VM to VM compromise. In this paper, we introduce our novel security management system between virtual machines. We introduce our innovative pilot project to enhance the security between virtual machines and monitor the traffic between VMs. We design three VMs server with different platforms (OS). We implement virtual Endian FirewallvEFW and IDS from converting physical open source EFW to virtual EFW and we deployed it to monitor traffic between virtual servers and allow or deny the traffic between virtual machines and outside the system.


Keywords


Cloud Computing, Virtualization, Architecture, Security Management.

Full Text:

PDF

References


V. Winkler, “Securing the Cloud - Cloud Computer Security Techniques and Tactics,” Technical Editor Bill Meine, Elsevier, 2011.

R. Krutz and R.Vines,“Cloud Security A Comprehensive Guide to SecureCloud Computingecure,” Wiley Publishing, Inc., 2010.

Vmware, “vSphere-esxi-vcenter-server-50-networking-guide,” http://www.vmware.com/support/, 2011.

Framework for Secure Virtualized Environment, Mrs. G.Madhu Priya1, R.Monesha, International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013 1 ISSN 2250-3153, www.ijsrp.org .

Le Garber "The Challenges of Securing the Virtualized Environment" IEEE Transactions on parallel and Distributed Systems,vol.16, no.9, pp.799- 813,september,2012.

Chris Greamo and Anup Invincea ," Sandboxing and Virtualization Modern Tools For Combating Malware" , IEEE Computer and Reliability Societies,Vol.19, No.79 to 83,2011.

Flavio Lombardi and Roberto Di Pietro," Secure virtualization for Cloud Computing", Journal of Network and computer Applications,Elsevier,vol.17,no.5,pp.403-418, 2010 .

V. Anitha and N. Keerthana , An Overview: Security in Virtualization Technology , Journal of Artificial Intelligence 6 (1): 112-116,2013 ISSN 1994-5450 I DOl: 1O.3923/jai.2013.112.116, © 2013 Asian Network for Scientific Information,

Garber, L., 2012. The challenges of securing the virtualized environment. Computer, 45: 17-20. Huang, J.H., J. Huang, R. Li and X.M. Li, 2012. Virtualization-based recovery approach for intrusion tolerance. Inform. Technol. J.,

Uddin, M., AA Rahman, A. Shah and J. Memon, 2012. Virtualization implementation strategy for data centers to maximize performance and efficiency. Asian J. Sci. Res., 5: 45-57.

Ding, B., X.Y. Yu and L.J. Sun, 2012. A cloud-based collaborative manufacturing resource sharing services. Inform. Technol. J., 11: 125S-1264.

Garber, L., 2012. The challenges of securing the virtualized environment. Computer, 45: 17-20.

Huang, J.H., J. Huang, R. Li and X.M. Li, 2012. Virtualization-based recovery approach for intrusion tolerance. Inform. Technol. J.

Yinqian Zhang Michael K. Reiter, University of North Carolina, Ari JuelsRSA Laboratories, Thomas Ristenpart University of Wisconsin Madison, WI, USA, Cross-VM Side Channels and Their Use to Extract Private Keys november 2012.

Cisco ASA 1000V Cloud Firewall Getting Started Guide.

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.

Reiner Sailer, jaegert,rvaldez,caceres,ronpz,stefanb,jlg,leendert, Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor, IBM T. J. Watson Research Center, Hawthorne, NY 10532 USA.

Sadia Syed, M. Ussenaiah, Virtual Cloud Security by Using Hypervisor-Based Technology, International Journal of Research in Information Technology (IJRIT), ISSN 2001-5569, 2014

vsphere-esxi-vcenter-server-50-basics-guide

http://www.endian.com

vsphere-esxi-vcenter-server-50-security-guide., 2013.


Refbacks

  • There are currently no refbacks.