混合安全旁观者:通过混合虚拟机分割实现云数据中心的端到端安全

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Saravanan Kumarasamy, Santhosh Rajendran
{"title":"混合安全旁观者:通过混合虚拟机分割实现云数据中心的端到端安全","authors":"Saravanan Kumarasamy,&nbsp;Santhosh Rajendran","doi":"10.1002/ett.70136","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Cloud computing is an innovative technology that provides computing services over the internet and replaces the requirement to own physical hardware or software. Security threats present a wide range of risks to cloud computing, and a security threat defense plays a significant role in cloud computing. Virtual machines (VM) serve as the backbone, providing flexible and scalable resources for running and storing data. Moving Target Defense (MTD) and Blockchain enhance security and privacy by reducing the chances of successful attacks and minimizing the impact of security attacks. To address these issues, we propose integrating MTD and blockchain technologies within the cloud computing environment named Hybrid Secure Onlooker (HSO). The proposed work involves several entities, including Cloud Users (CUs), Centralized Subnet Manager (CSM), Distributed Group Manager (DGM), Consortium Block Module (CBM) and Private Block Module (PBM). Initially, we perform Multi-Factor Authentication (MFA) to establish secure communication and to avoid malicious traffic. Followed by this, we utilize the Komoda Miliphir optimization (KMO) algorithm to perform CUs' task scheduling based upon the task types, task sensitivity, and task size. Entrenched in the scheduled tasks, the CSM performs classification and grouping of cloud VMs, assigning them to their capacity, security protocols, and availability, utilizing the Residual Flowed Capsule Network (RFC-Net). The grouped subsets are overseen and managed by the DGM, which handles MTD operations such as virtual switch placement and VM migration within the subsets. Finally, the transactions are stored in the hybrid blockchain layer with CBM and PBM to ensure privacy and security. The is the implementation tool for realizing the proposed HSO model. The proposed model can be examined based on several metrics with state-of-the-art work comparisons. The results show that the proposed HSO model outperforms the state-of-the-art models.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hybrid Secure Onlooker: Enabling End-to-End Security for Cloud Data Center by Hybrid VM Segmentation\",\"authors\":\"Saravanan Kumarasamy,&nbsp;Santhosh Rajendran\",\"doi\":\"10.1002/ett.70136\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Cloud computing is an innovative technology that provides computing services over the internet and replaces the requirement to own physical hardware or software. Security threats present a wide range of risks to cloud computing, and a security threat defense plays a significant role in cloud computing. Virtual machines (VM) serve as the backbone, providing flexible and scalable resources for running and storing data. Moving Target Defense (MTD) and Blockchain enhance security and privacy by reducing the chances of successful attacks and minimizing the impact of security attacks. To address these issues, we propose integrating MTD and blockchain technologies within the cloud computing environment named Hybrid Secure Onlooker (HSO). The proposed work involves several entities, including Cloud Users (CUs), Centralized Subnet Manager (CSM), Distributed Group Manager (DGM), Consortium Block Module (CBM) and Private Block Module (PBM). Initially, we perform Multi-Factor Authentication (MFA) to establish secure communication and to avoid malicious traffic. Followed by this, we utilize the Komoda Miliphir optimization (KMO) algorithm to perform CUs' task scheduling based upon the task types, task sensitivity, and task size. Entrenched in the scheduled tasks, the CSM performs classification and grouping of cloud VMs, assigning them to their capacity, security protocols, and availability, utilizing the Residual Flowed Capsule Network (RFC-Net). The grouped subsets are overseen and managed by the DGM, which handles MTD operations such as virtual switch placement and VM migration within the subsets. Finally, the transactions are stored in the hybrid blockchain layer with CBM and PBM to ensure privacy and security. The is the implementation tool for realizing the proposed HSO model. The proposed model can be examined based on several metrics with state-of-the-art work comparisons. The results show that the proposed HSO model outperforms the state-of-the-art models.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 5\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70136\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70136","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

云计算是一种创新技术,它通过互联网提供计算服务,取代了对拥有物理硬件或软件的要求。安全威胁给云计算带来了广泛的风险,安全威胁防御在云计算中发挥着重要作用。虚拟机(Virtual machine, VM)作为主干,为数据的运行和存储提供灵活、可扩展的资源。移动目标防御(MTD)和区块链通过减少成功攻击的机会和最小化安全攻击的影响来增强安全性和隐私性。为了解决这些问题,我们建议在名为混合安全围观者(HSO)的云计算环境中集成MTD和区块链技术。拟议的工作涉及多个实体,包括云用户(CUs)、集中式子网管理器(CSM)、分布式组管理器(DGM)、财团块模块(CBM)和私有块模块(PBM)。最初,我们使用多因素认证(MFA)来建立安全通信并避免恶意流量。在此基础上,利用Komoda Miliphir优化(KMO)算法,根据任务类型、任务灵敏度和任务大小对cu进行任务调度。在计划任务中,CSM对云虚拟机进行分类和分组,利用残余流胶囊网络(RFC-Net)为它们分配容量、安全协议和可用性。分组的子集由DGM监督和管理,DGM处理MTD操作,如子集内的虚拟交换机放置和VM迁移。最后,将交易存储在CBM和PBM的混合区块链层中,以确保隐私和安全。它是实现HSO模型的实现工具。提出的模型可以根据几个指标与最先进的工作比较来检查。结果表明,所提出的HSO模型优于现有的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Hybrid Secure Onlooker: Enabling End-to-End Security for Cloud Data Center by Hybrid VM Segmentation

Hybrid Secure Onlooker: Enabling End-to-End Security for Cloud Data Center by Hybrid VM Segmentation

Cloud computing is an innovative technology that provides computing services over the internet and replaces the requirement to own physical hardware or software. Security threats present a wide range of risks to cloud computing, and a security threat defense plays a significant role in cloud computing. Virtual machines (VM) serve as the backbone, providing flexible and scalable resources for running and storing data. Moving Target Defense (MTD) and Blockchain enhance security and privacy by reducing the chances of successful attacks and minimizing the impact of security attacks. To address these issues, we propose integrating MTD and blockchain technologies within the cloud computing environment named Hybrid Secure Onlooker (HSO). The proposed work involves several entities, including Cloud Users (CUs), Centralized Subnet Manager (CSM), Distributed Group Manager (DGM), Consortium Block Module (CBM) and Private Block Module (PBM). Initially, we perform Multi-Factor Authentication (MFA) to establish secure communication and to avoid malicious traffic. Followed by this, we utilize the Komoda Miliphir optimization (KMO) algorithm to perform CUs' task scheduling based upon the task types, task sensitivity, and task size. Entrenched in the scheduled tasks, the CSM performs classification and grouping of cloud VMs, assigning them to their capacity, security protocols, and availability, utilizing the Residual Flowed Capsule Network (RFC-Net). The grouped subsets are overseen and managed by the DGM, which handles MTD operations such as virtual switch placement and VM migration within the subsets. Finally, the transactions are stored in the hybrid blockchain layer with CBM and PBM to ensure privacy and security. The is the implementation tool for realizing the proposed HSO model. The proposed model can be examined based on several metrics with state-of-the-art work comparisons. The results show that the proposed HSO model outperforms the state-of-the-art models.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信