{"title":"Two Layer Cloud Security Set Architecture On Hypervisor","authors":"Nivedha Sathyanarayanan, M. Nanda","doi":"10.1109/ICAECC.2018.8479440","DOIUrl":null,"url":null,"abstract":"In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC.2018.8479440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.