Two Layer Cloud Security Set Architecture On Hypervisor

Nivedha Sathyanarayanan, M. Nanda
{"title":"Two Layer Cloud Security Set Architecture On Hypervisor","authors":"Nivedha Sathyanarayanan, M. Nanda","doi":"10.1109/ICAECC.2018.8479440","DOIUrl":null,"url":null,"abstract":"In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC.2018.8479440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.
Hypervisor上的两层云安全集架构
在高度发达的技术世界中,需要以最少的服务提供者交互来配置和提供管理员的间歇性需求。这在“云计算”中被模糊地设想过。当将组织的关键信息委托给地理上分散的云平台时,安全性是最重要的关注因素,而云平台不受该组织的直接控制。[1]在这种情况下,开发一种既能提供综合控制又能提供高水平安全性的设备是必不可少的。为了减轻管理程序中过度劫持的风险,正在开发各种新想法。我们提出的解决方案是一个两层安全集架构,当它感知到过度劫持时,它会封锁、跟踪和响应。体系结构中的两层是预防阶段(进一步分为身份验证和加密/解密阶段)和检测阶段(包括检测,然后使用Honeyd进行响应)。在预防的主要层中,要存储的数据使用挑战握手认证协议进行身份验证,然后使用高级加密标准使用Rijndael密码进行加密/解密,以确保安全存储。[8]虽然这提供了彻底的安全性,但考虑到预防阶段失败的可能性,下一阶段的检测和响应是通过使用蜜罐(Honeypot)实现的。这个阶段模拟类似于操作系统的特性,处理外部渗透,并作为主机本身与恶意用户交互。[5]因此,除了保护数据外,该系统还可以通过监视和提醒用户可能的网络入侵来伪装,以增强其安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信