ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Trusted Framework for Secured Information Storage over Cloud Environment

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1695-1698

Keywords : Cloud security; security architecture; security and privacy;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond users requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems.

Last modified: 2021-07-01 14:26:37