Infrastructure as a service: Exploring network access control challenges

Shadha Mohamed Al Amri, L. Guan
{"title":"Infrastructure as a service: Exploring network access control challenges","authors":"Shadha Mohamed Al Amri, L. Guan","doi":"10.1109/SAI.2016.7556042","DOIUrl":null,"url":null,"abstract":"Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this article's exploration, we endorse an IaaS access control system built on a computational intelligent approach.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 SAI Computing Conference (SAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAI.2016.7556042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this article's exploration, we endorse an IaaS access control system built on a computational intelligent approach.
基础设施即服务:探索网络访问控制挑战
云计算基础设施即服务(IaaS)是外包IT基础设施的一个很好的模型。它的构建是为了提供令人着迷的特性来支持业务开发,例如弹性、多租户、可配置性和动态性。然而,由于IaaS的灵活性,它也面临着安全方面的挑战。在本文中,我们研究了IaaS的特征,并调查了与之相关的安全挑战。然后,我们通过探索实时虚拟机迁移的安全威胁来详细阐述这些安全挑战,因为它是主要的IaaS操作之一。我们发现,适当的访问控制技术和模型是增强IaaS和减轻已确定的安全威胁的关键因素。因此,我们调查并对比了IaaS中已实现的和建议的防火墙体系结构,因为防火墙是执行访问控制的基本安全设备。我们还探讨并对比了IaaS中提出的访问控制模型。发现传统的防火墙和访问控制模型对于IaaS来说是不够的。因此,有必要开发适当的访问控制模型和实施技术,以减轻IaaS安全威胁。基于安全领域的研究趋势和本文的研究成果,我们提出了一种基于计算智能方法的IaaS访问控制系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信