Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond users requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems.
Keywords: Cloud security, security architecture, security and privacy
Edition: Volume 4 Issue 11, November 2015
Pages: 1695 - 1698
How to Cite this Article?
P. Pothuraju, Dasari Rajesh, "Trusted Framework for Secured Information Storage over Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151117, Volume 4 Issue 11, November 2015, 1695 - 1698
Similar Articles with Keyword 'Cloud security'
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Similar Articles with Keyword 'security architecture'
A Survey on Security Issues and Attacks in Cloud Environment
Varsha Narole, Anil Jaiswal, Narendra Narole
Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Similar Articles with Keyword 'Cloud'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi
Similar Articles with Keyword 'security'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana