Downloads: 108 | Views: 321
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.6 / 10
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Abstract: Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond users requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems.
Keywords: Cloud security, security architecture, security and privacy
Edition: Volume 4 Issue 11, November 2015
Pages: 1695 - 1698
Make Sure to Disable the Pop-Up Blocker of Web Browser