ABSTRACT
The cloud is a computing platform which provides a plenty of services such as network, storage, applications and even servers, allocated and released according to the service request using a minimal effort for managing and administrating the system. However, in such shared environment, and due to the highly confidential nature of information circulating flows, security is a crucial issue that should evolve with companies and particular needs, protecting them from malicious individual or groups wanting to steal, interrupt or even destroy those sensitive information.
Moreover, in this paper, we present briefly some security known issues and we give an overview of recent proposed solutions in the literature. Then, we propose a new architecture that provides a security mechanism by including a virtual firewall to protect cloud infrastructure from attacks and an IDS/IPS (Intrusion Detection and Prevention System) in order to secure the virtual environment. To prove the effectiveness of our approach, we conducted experiments using open source solution called Open Source Security Event Correlator (OSSEC), we tested its ability to oversee the stat of virtual machines. Monitoring log files, File integrity checking, Website Attack, Brute force attack, and Anomaly Detection are conducted and they are successfully detected by OSSEC.
- Cloud Security Alliance, "Cloud Computing Top Threats in 2013", February 2013, unpublishedGoogle Scholar
- A. Mazhar, U. Khan, V. Vasilakos, "Security in cloud computing: Opportunities and challenges", ScienceDirect, Elsevier Information Sciences 305 357--383, 2015.Google ScholarDigital Library
- OWASP Top 10 "The Open Web Application Security Project", 2013.Google Scholar
- R. Claycomb, A. Nicoll, "Insider Threats to Cloud Computing: Directions for New Research Challenges", CERT Program, 2012.Google Scholar
- S. Raghavendra, S. Lakshmi, S. Venkateswarlu, "Security Issues and Trends in Cloud Computing", International Journal of Computer Science and Information Technologies, Vol. 6 (2), 1156--1159, 2015.Google Scholar
- V. Varadharajan "Security as a Service Model for Cloud Environment", IEEE transactions on network and service management, VOL. 11, NO. 1, 2014.Google Scholar
- D. Sharmaa, C. Dhote, M. Potey, "Identity and Access Management as Security-as-a-Service from Clouds", Proceedings of International Conference on Communication, Computing and Virtualization, 2016Google Scholar
- F. Guenane "Gestion de la sécurité des réseaux à l'aide d'un service innovant de Cloud Based Firewall", https://tel.archives-ouvertes.fr/tel-01149112, 2015.Google Scholar
- S. Yu, R. Doss, W. Zhou, S. Guo "A General Cloud Firewall Framework with Dynamic Resource Allocation", IEEE, Communication and Information Systems Security Symposium, 2013.Google Scholar
- W. Yassin, I. Udzir, Z. Muda, A. Abdullah, T. Abdullah, "A cloud based intrusion detection service framework" in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference on, pp. 213--218, 2012.Google Scholar
- S. Roschke, F. Cheng, C. Meinel "Intrusion Detection in the Cloud", IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. Google ScholarDigital Library
- Nogol Memari, "Scalable honeynet based on artificial intelligence utilizing cloud computing", International Journal of Research in Computer Science, 2014.Google ScholarCross Ref
- Al. Zayed, H. Mostafa, A. Mamouni « Cloud Computing et Sécurité: Approches et Solutions », International Journal of Research in Computer Science, 2015Google Scholar
Recommendations
A review on cloud security issues and solutions
Cloud computing provides computing resources, platforms, and applications as a service in a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and many other fields in recent years, which prompted researchers to look ...
Security as a Service for Public Cloud Tenants(SaaS)
AbstractCloud computing is a novel paradigm that is known for its elasticity and diversity in terms of the services provided to the end users. Although these services offer many benefits such as availability, cost-reduction, flexible payment plans, ...
Performance Evaluation of Hypervisors for Cloud Computing
The virtualization of IT infrastructure enables consolidation and pooling of IT resources so they are shared over diverse applications to offset the limitation of shrinking resources and growing business needs. Virtualization provides a logical ...
Comments