Downloads: 108
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju | Dasari Rajesh [6]
Abstract: Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond users requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems.
Keywords: Cloud security, security architecture, security and privacy
Edition: Volume 4 Issue 11, November 2015,
Pages: 1695 - 1698
Similar Articles with Keyword 'Cloud security'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023
Pages: 998 - 1004AI-Infused Threat Detection and Incident Response in Cloud Security
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar | Dr. Margi Patel [2]