Title :
Hierarchical secure virtualization model for cloud
Author :
Manavi, Sina ; Mohammadalian, Sadra ; Udzir, Nur Izura ; Abdullah, Azizol
Author_Institution :
Fac. of Comput. Sci. & Inf. Technol., Univ. Putra Malaysia, Serdang, Malaysia
Abstract :
Cloud services are providing on-demand resources via virtualization technologies. This will make cloud computing a potential target for cyber attacks. Most proposed security models for virtualization are working above virtualization on host OS. Almost all proposed cloud security models suffers from this problem in that these models have very limited control over virtualization. In this paper a Hierarchical Secure Virtualization Model (HSVM) is proposed to provide threat quarantine and conquer in addition to complete control on virtualization. HSVM needs to be implemented under the virtualization level and eventually moving up to the guest OS. This security model has the potential to protect various cloud service models implemented by cloud vendors, such as IaaS, PaaS, dSaaS, and SaaS, and improves cloud vendor control level in IaaS. To the best of our knowledge, there is no similar model or implementation like HSVM, able to protect the cloud from DDoS attack, unauthorized access, data leakage as well.
Keywords :
Web services; cloud computing; security of data; DDoS attack; HSVM; IaaS; PaaS; SaaS; cloud computing; cloud security models; cloud service models; cloud vendor control level; cyber attacks; dSaaS; data leakage; data storage as a service; guest OS; hierarchical secure virtualization model; host OS; infrastructure as a service; on-demand resources; platform as a service; service as a software; threat quarantine; unauthorized access; Cloud computing; Computational modeling; Intrusion detection; Monitoring; Virtual machine monitors; Virtual machining; Cloud computing; Virtual Machine; Virtual Machine Monitor; intrusion detection system; secure virtualication; security;
Conference_Titel :
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-1425-1
DOI :
10.1109/CyberSec.2012.6246117