ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Secure Virtualised Environment
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Pushpinder Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung
Issue Date
2014-12
Citation
International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICITST.2014.7038788
Abstract
Cloud computing is a technological advancement that provide resources through internet on pay-as-you-go basis. Cloud computing uses virtualisation technology to enhance the efficiency and effectiveness of its advantages. Virtualisation is the key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment. In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hypervisor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques. SVSS consists of four modules: Anti-Virus Control Module, Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module. A SVSS prototype has been deployed to validate its feasibility, efficiency and accuracy on Xen virtualised environment.
KSP Keywords
Activity Detection, Behavior Monitoring, Computing resources, Malicious Activity, Monitoring Module, Multiple instances, Network Traffic Analysis, Pay-as-you-go, Resource utilization, Security Management, Security solutions