Title :
Secure virtualised environment
Author :
Chouhan, Pushpinder Kaur ; Sezer, Sakir ; Yangseo Choi ; Ikkyun Kim ; Chunghwan Jung
Author_Institution :
Centre for Secure Inf. Technol., Queens Univ. of Belfast, Belfast, UK
Abstract :
Cloud computing is a technological advancement that provide resources through Internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment. In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hypervisor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques. SVSS consists of four modules: Anti-Virus Control Module, Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module. A SVSS prototype has been deployed to validate its feasibility, efficiency and accuracy on Xen virtualised environment.
Keywords :
cloud computing; computer network security; computer viruses; telecommunication traffic; virtual machines; virtualisation; SVSS; Xen virtualised environment; antivirus control module; cloud computing; computing resource consolidation; effectiveness enhancement; efficiency enhancement; elastic framework; hypervisor; malicious activity detection module; malicious activity detection techniques; network traffic analysis techniques; pay-as-you-go model; resource utilization rate; secure virtualised environment; server virtualisation security system; system resource utilization analysis techniques; traffic behavior monitoring module; trusted cloud computing; virtual machines; virtualisation layer; virtualisation security management module; virtualisation technology; Cloud computing; Malware; Monitoring; Operating systems; Virtual machine monitors; Virtual machining;
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for
Conference_Location :
London
DOI :
10.1109/ICITST.2014.7038788