Trusted Framework for Secured Information Storage over Cloud Environment
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : P. Pothuraju; Dasari Rajesh;
Page : 1695-1698
Keywords : Cloud security; security architecture; security and privacy;
Abstract
Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond users requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems.
Other Latest Articles
- An Adopted Business Model Driven Framework Based Analysis Over SOA
- Context Aware Location Identification in Social Media Environment
- Mitigation of NSC and Alleviate of Magnetic Inrush Currents in Indian Traction System
- An Efficient Cluster-Based Power Saving Scheme for Wireless Sensor Networks
- A Crypto Framed Data Protection for Trusted Aware Email System
Last modified: 2021-07-01 14:26:37