UPM Institutional Repository

Hierarchical secure virtualization model for cloud.


Citation

Manavi, Sina and Mohammadalian, Sadra and Udzir, Nur Izura and Abdullah, Azizol (2012) Hierarchical secure virtualization model for cloud. In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 219-224).

Abstract

Cloud services are providing on-demand resources via virtualization technologies. This will make cloud computing a potential target for cyber attacks. Most proposed security models for virtualization are working above virtualization on host OS. Almost all proposed cloud security models suffers from this problem in that these models have very limited control over virtualization. In this paper a Hierarchical Secure Virtualization Model (HSVM) is proposed to provide threat quarantine and conquer in addition to complete control on virtualization. HSVM needs to be implemented under the virtualization level and eventually moving up to the guest OS. This security model has the potential to protect various cloud service models implemented by cloud vendors, such as IaaS, PaaS, dSaaS, and SaaS, and improves cloud vendor control level in IaaS. To the best of our knowledge, there is no similar model or implementation like HSVM, able to protect the cloud from DDoS attack, unauthorized access, data leakage as well.


Download File

[img] PDF
ID 27402.pdf
Restricted to Repository staff only

Download (321kB)

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Computer Science and Information Technology
Notes: Full text are available at Special Collection Division Office
Keywords: Cloud computing; Security; Intrusion detection system; Virtual Machine; Secure virtualication; Virtual machine. Monitor
Depositing User: Erni Suraya Abdul Aziz
Date Deposited: 29 Mar 2014 14:55
Last Modified: 13 Jun 2014 07:28
URI: http://psasir.upm.edu.my/id/eprint/27402
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item