Skip to main content

A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing

  • Conference paper
  • First Online:
Advances in Ubiquitous Networking (UNet 2015)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 366))

Included in the following conference series:

Abstract

Cloud computing is a new model of computing which provides scalability, flexibility and on-demand service. Virtualization is one of the main components of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). First, we expose the different network modes based on Xen Hypervisor, and then we analyses vulnerabilities and security issues within these kind of environment. Finally, we present in details new secure architecture and demonstrate how it can face the main security network attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chirag, M., Patel, D., et al.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). Springer

    Article  Google Scholar 

  2. Salah, K., et al.: Using Cloud Computing to Implement a Security Overlay Network. Security & Privacy 11(1), 44–53 (2013). IEEE

    Google Scholar 

  3. Vangie, B.: (website visited April 2015). http://www.webopedia.com/TERM/V/virtualization.html

  4. National vulnerability database version 2.2.NIST (website visited mars 2015). http://web.nvd.nist.gov/view/vuln/searchresults?query=virtual&search%_type=all&cves=on

  5. Mariam, K.: A Methodology for Cloud Security Risks Management. Cloud Computing: Challenges, Limitations and R&D Solutions, 75–104 (2014). Springer

    Google Scholar 

  6. Grover, J., Shikha, Sharma, M.: Cloud computing and its security issues — a review. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–5. IEEE (2014)

    Google Scholar 

  7. Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a secure address resolution protocol. In: Proceedings of the 19th Annual Computer Security Applications Conference, 2003, pp. 66–74. IEEE (2003)

    Google Scholar 

  8. Chin, T.S., Singh, Y.P.: Single-hop wavelength assignment using an ant algorithm in WDM MESH network. WSEAS Transactions on Computers 5(7), 294–300 (2006)

    Google Scholar 

  9. Zheng, W., Li, C.: An Algorithm Against Attacks Based on ARP Spoofing. Journal of Southern Yangtze University (Natural Science Edition) 2(6), 167–1696 (2003)

    Google Scholar 

  10. Tian, Z.H., Fang, B.X., Li, B., et al.: Avulnerability-driven approach to active alert verification for accurate and efficient intrusion detection. WSEAS Transactions on Communications 4(10), 1002–1009 (2005)

    Google Scholar 

  11. Chaganti, P.: Xen Virtualization, p. 74 (2007)

    Google Scholar 

  12. Wu, H., et al.: Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE (2010)

    Google Scholar 

  13. CERT Training and Education, Carnegie Mellon University (2009). http://science.hamptonu.edu/compsci/docs/iac/packet_sniffing.pdf

  14. Hayriye, A., Sven, K., Henry, L., et al.: Securing layer 2 in local area networks. In: Networking - ICN 2005, 4th International Conference on Networking, Reunion Island, France, Proceedings, Part II, pp. 699–706. Springer (2005)

    Google Scholar 

  15. http://www.netsecurity.org/software.php?id=4 (website visited March 2015)

  16. Open vswitch. http://openvswitch.org/ (website visited April 2015)

  17. http://www.omnisecu.com/cisco-certified-network-associate-ccna/advantages-of-vlan.php (website visited April 2015)

  18. Vmweare Virtual Networking Concept (2007). http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf

  19. Vlan configuration. http://openvswitch.org/support/config-cookbooks/vlan-configuration-cookbook/ (website visited April 2015)

  20. Justin, P., et al.: Virtual Switching in an Era of Advanced Edges. http://benpfaff.org/papers/adv-edge.pdf (website visited July 2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Elghazi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Elmrabet, Z., Elghazi, H., Sadiki, T., Elghazi, H. (2016). A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-990-5_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-989-9

  • Online ISBN: 978-981-287-990-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics