Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523514.2523576acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
poster

Securing the virtual machine images in cloud computing

Published: 26 November 2013 Publication History

Abstract

The convergence of virtualization with Cloud computing has brought many benefits to organizations including ease of deployment, reduced costs and high availability of resources over internet. Extensive research has been carried out to increase the security of Cloud virtualization environment. However, addressing the security concerns of disk images used by virtual machines is still an open challenge. Compromising the disk images can result in loss of data integrity and confidentiality. This paper proposes a novel security scheme "Encrypted Virtual Disk Images in Cloud (EVDIC)" for the protection of stored disk images in Cloud by encryption. EVDIC also includes the security of key management and key exchange process. We integrate EVDIC with OpenStack, which is an open source Cloud platform largely used around the world.

References

[1]
Storage made easy: Openstack swift object storage. http://www.storagemadeeasy.com/OpenStack/. Last Accessed: 2013-02-24.
[2]
Piston cloud computing. http://www.pistoncloud.com. Last Accessed: 2013-02-24.
[3]
Openstack. http://www.openstack.org. Last Accessed: 2013-06-28.
[4]
Openstack compute: Administration guide. http://docs.openstack.org/trunk/openstack-compute/admin/bk-compute-adminguide-trunk.pdf. Last Accessed: 2013-06-22.
[5]
Openstack swift architecture. http://swiftstack.com/openstack-swift/. Last Accessed: 2013-08-12.
[6]
G. Brunette, R. Mogull, et al. Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, pages 1--76, 2009.
[7]
E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running commodity operating systems on scalable multiprocessors. ACM Transactions on Computer Systems (TOCS), 15(4): 412--447, 1997.
[8]
V. S. I. G. P. S. S. Council. Pci dss virtualization guidelines v2.0. pages 1--39, 2011.
[9]
P. Hoffman, K. Scarfone, and M. Souppaya. Guide to security for full virtualization technologies. National Institute of Standards and Technology (NIST), pages 800--125, 2011.
[10]
M. Turan, E. Barker, W. Burr, and L. Chen. Special publication 800-132: Recommendation for password-based key derivation. Technical report, Tech. rep., NIST, Computer Security Division, Information Technology Laboratory, 2010.

Cited By

View all
  • (2022)Securing Cloud Virtual Machine Image Using Ethereum BlockchainInternational Journal of Information Security and Privacy10.4018/IJISP.29586816:1(1-22)Online publication date: 1-Apr-2022
  • (2021)BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00055(344-351)Online publication date: Sep-2021
  • (2019)An Exhaustive Survey on Security Concerns and Solutions at Different Components of VirtualizationACM Computing Surveys10.1145/328730652:1(1-38)Online publication date: 13-Feb-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Check for updates

Author Tags

  1. cloud computing
  2. cloud security
  3. disk images
  4. encryption

Qualifiers

  • Poster

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Securing Cloud Virtual Machine Image Using Ethereum BlockchainInternational Journal of Information Security and Privacy10.4018/IJISP.29586816:1(1-22)Online publication date: 1-Apr-2022
  • (2021)BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00055(344-351)Online publication date: Sep-2021
  • (2019)An Exhaustive Survey on Security Concerns and Solutions at Different Components of VirtualizationACM Computing Surveys10.1145/328730652:1(1-38)Online publication date: 13-Feb-2019
  • (2019)On cloud security requirements, threats, vulnerabilities and countermeasuresComputer Science Review10.1016/j.cosrev.2019.05.00233:C(1-48)Online publication date: 1-Aug-2019
  • (2018)TVGuarderCyber Security and Threats10.4018/978-1-5225-5634-3.ch034(638-658)Online publication date: 2018
  • (2018)Security Issues with Virtualization in Cloud Computing2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)10.1109/ICACCCN.2018.8748405(487-491)Online publication date: Oct-2018
  • (2018)Trusted Model for Virtual Machine Security in Cloud ComputingProgress in Computing, Analytics and Networking10.1007/978-981-10-7871-2_63(655-665)Online publication date: 11-Apr-2018
  • (2018)Security Threats and Solutions for Virtualization and Migration in Virtual MachinesProceedings of International Symposium on Sensor Networks, Systems and Security10.1007/978-3-319-75683-7_18(235-244)Online publication date: 24-May-2018
  • (2017)Securing virtual machine images of cloud by encryption through Kerberos2017 2nd International Conference for Convergence in Technology (I2CT)10.1109/I2CT.2017.8226293(1074-1079)Online publication date: Apr-2017
  • (2017)Cloud security issues and challengesJournal of Network and Computer Applications10.1016/j.jnca.2016.11.02779:C(88-115)Online publication date: 1-Feb-2017
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media