skip to main content
10.1145/3018896.3018911acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

A new approach to mitigate security threats in cloud environment

Published:22 March 2017Publication History

ABSTRACT

The cloud is a computing platform which provides a plenty of services such as network, storage, applications and even servers, allocated and released according to the service request using a minimal effort for managing and administrating the system. However, in such shared environment, and due to the highly confidential nature of information circulating flows, security is a crucial issue that should evolve with companies and particular needs, protecting them from malicious individual or groups wanting to steal, interrupt or even destroy those sensitive information.

Moreover, in this paper, we present briefly some security known issues and we give an overview of recent proposed solutions in the literature. Then, we propose a new architecture that provides a security mechanism by including a virtual firewall to protect cloud infrastructure from attacks and an IDS/IPS (Intrusion Detection and Prevention System) in order to secure the virtual environment. To prove the effectiveness of our approach, we conducted experiments using open source solution called Open Source Security Event Correlator (OSSEC), we tested its ability to oversee the stat of virtual machines. Monitoring log files, File integrity checking, Website Attack, Brute force attack, and Anomaly Detection are conducted and they are successfully detected by OSSEC.

References

  1. Cloud Security Alliance, "Cloud Computing Top Threats in 2013", February 2013, unpublishedGoogle ScholarGoogle Scholar
  2. A. Mazhar, U. Khan, V. Vasilakos, "Security in cloud computing: Opportunities and challenges", ScienceDirect, Elsevier Information Sciences 305 357--383, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. OWASP Top 10 "The Open Web Application Security Project", 2013.Google ScholarGoogle Scholar
  4. R. Claycomb, A. Nicoll, "Insider Threats to Cloud Computing: Directions for New Research Challenges", CERT Program, 2012.Google ScholarGoogle Scholar
  5. S. Raghavendra, S. Lakshmi, S. Venkateswarlu, "Security Issues and Trends in Cloud Computing", International Journal of Computer Science and Information Technologies, Vol. 6 (2), 1156--1159, 2015.Google ScholarGoogle Scholar
  6. V. Varadharajan "Security as a Service Model for Cloud Environment", IEEE transactions on network and service management, VOL. 11, NO. 1, 2014.Google ScholarGoogle Scholar
  7. D. Sharmaa, C. Dhote, M. Potey, "Identity and Access Management as Security-as-a-Service from Clouds", Proceedings of International Conference on Communication, Computing and Virtualization, 2016Google ScholarGoogle Scholar
  8. F. Guenane "Gestion de la sécurité des réseaux à l'aide d'un service innovant de Cloud Based Firewall", https://tel.archives-ouvertes.fr/tel-01149112, 2015.Google ScholarGoogle Scholar
  9. S. Yu, R. Doss, W. Zhou, S. Guo "A General Cloud Firewall Framework with Dynamic Resource Allocation", IEEE, Communication and Information Systems Security Symposium, 2013.Google ScholarGoogle Scholar
  10. W. Yassin, I. Udzir, Z. Muda, A. Abdullah, T. Abdullah, "A cloud based intrusion detection service framework" in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference on, pp. 213--218, 2012.Google ScholarGoogle Scholar
  11. S. Roschke, F. Cheng, C. Meinel "Intrusion Detection in the Cloud", IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nogol Memari, "Scalable honeynet based on artificial intelligence utilizing cloud computing", International Journal of Research in Computer Science, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  13. Al. Zayed, H. Mostafa, A. Mamouni « Cloud Computing et Sécurité: Approches et Solutions », International Journal of Research in Computer Science, 2015Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
    March 2017
    1349 pages
    ISBN:9781450347747
    DOI:10.1145/3018896

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader